CN113342653B - 5G smart card testing method, device and medium based on key agreement - Google Patents

5G smart card testing method, device and medium based on key agreement Download PDF

Info

Publication number
CN113342653B
CN113342653B CN202110632718.2A CN202110632718A CN113342653B CN 113342653 B CN113342653 B CN 113342653B CN 202110632718 A CN202110632718 A CN 202110632718A CN 113342653 B CN113342653 B CN 113342653B
Authority
CN
China
Prior art keywords
data
key
smart card
public key
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110632718.2A
Other languages
Chinese (zh)
Other versions
CN113342653A (en
Inventor
孙奥
袁外平
黄卫文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinghan Intelligent Technology Co ltd
Original Assignee
Xinghan Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinghan Intelligent Technology Co ltd filed Critical Xinghan Intelligent Technology Co ltd
Priority to CN202110632718.2A priority Critical patent/CN113342653B/en
Publication of CN113342653A publication Critical patent/CN113342653A/en
Application granted granted Critical
Publication of CN113342653B publication Critical patent/CN113342653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Abstract

The invention relates to a technical scheme of a 5G intelligent card testing method, a device and a medium based on key agreement, which comprises the following steps: assembling a plurality of algorithms for encryption to obtain first encrypted data; calling a packaging function corresponding to the card reader, and presetting a function for acquiring a data instruction of the intelligent card; and according to SUCI generated by different sources, encrypting by adopting a corresponding test case to obtain second encrypted data, and comparing the first encrypted data with the second encrypted data to obtain a test result. The invention has the beneficial effects that: and the encrypted combined output of the card is realized by automatically analyzing the 5G data acquisition instruction and combining with algorithms such as asymmetry and the like. The time and accuracy for manually encrypting and decrypting the analysis program are greatly saved.

Description

5G smart card testing method, device and medium based on key agreement
Technical Field
The invention relates to the field of communication and computers, in particular to a method, a device and a medium for testing a 5G intelligent card based on key agreement.
Background
According to a telecommunication standard protocol, a card is combined and encrypted through algorithms such as x25519 and ECDH and sends a get identity instruction to obtain a piece of data which is combined and output, and a traditional test method issues the instruction through a corresponding tool and performs series of operations such as encryption splicing step by step, so that the data accuracy is not facilitated, and the time cost is high.
Disclosure of Invention
The invention aims to solve at least one technical problem in the prior art, and provides a 5G smart card testing method, a device and a medium based on key agreement, so that time is saved, and data accuracy is ensured.
The technical scheme of the invention comprises a 5G intelligent card testing method based on key agreement, which is characterized by comprising the following steps: a data encryption step, a card reader processing step and a test case step; the data encryption step comprises: assembling a plurality of algorithms for encryption to obtain first encrypted data; the card reader processing steps include: calling a packaging function corresponding to the card reader, and presetting a function for acquiring a data instruction of the intelligent card; the test case steps include: and according to SUCI generated by different sources, executing encryption by adopting a corresponding test case to obtain second encrypted data, and comparing the first encrypted data with the second encrypted data to obtain a test result.
According to the 5G smart card testing method based on key agreement, the data encryption step comprises the execution of corresponding encryption processing by using a first configuration file and a second configuration file, wherein the first configuration file comprises the following steps: packaging an x25519 algorithm, generating and returning a shared key through a self-defined public key and a private key generated by the smart card; packaging an ANSI-X9.63-KDF algorithm, generating and returning EK, ICB and MK according to the shared secret key and the public key of the smart card; an AES-128 algorithm is packaged, and MSIN data ciphertext is generated and returned through the MSIN/NAI, the ICB and the EK; packaging an HMAC _ SHA _256 algorithm, generating and returning a mac value through the obtained ciphertext and MK; splicing, assembling and outputting the public key, the data ciphertext and the mac value of the smart card; the second configuration file includes: packaging an ECDH algorithm, generating and returning a shared key according to the self-defined public key and a private key generated by the smart card; packaging an ANSI-X9.63-KDF algorithm, generating and returning EK, ICB and MK according to the shared secret key and the public key of the smart card; an AES-128 algorithm is packaged, and a ciphertext is generated and returned through the MSIN/NAI, the ICB and the EK; packaging an HMAC _ SHA _256 algorithm, generating and returning a mac value through the obtained ciphertext and MK; and splicing, assembling and outputting the public key, the data ciphertext and the mac value of the intelligent card.
According to the 5G smart card testing method based on key agreement, the test case step comprises the following steps: and acquiring the data of the intelligent card through a function for the intelligent card according to the SUCI generated by the IMSI or the NAI and the first configuration file and the second configuration file, and testing according to the acquired data and the instruction.
According to the 5G intelligent card testing method based on key agreement, the testing of SUCI generated by IMSI comprises the following steps: executing according to the first configuration file and the second configuration file: the intelligent card is operated through an instruction and a function, the startup is reset, the UST value of the related file of the intelligent card is modified, the related values of the operator public key (one group or a plurality of groups), EF _ AD and IMSI/NAI are preset, the UST value is modified again, the get identification is issued, the intelligent card is operated to obtain data, and the data are obtained for testing.
According to the 5G smart card testing method based on key agreement, the testing of SUCI generated by NAI comprises the following steps: the method comprises the steps of operating the intelligent card through an instruction and a function, resetting starting, modifying the UST value of the intelligent card, presetting one or more groups of operator public keys, EF _ AD and related values of network specific identifiers, modifying the UST value again, issuing a get identity to operate the intelligent card to obtain data, and obtaining and testing the data.
According to the 5G smart card testing method based on key agreement, the second configuration file executing SUCI testing comprises the following steps: the operator public key is generated by using an ECDH (elliptic curve cryptography) key negotiation algorithm, the generated operator public key is compressed or uncompressed, and the compression state of the operator public key can be set according to the requirements of customers.
According to the 5G smart card testing method based on key agreement, when the testing of the public key of the operator is not configured, the testing comprises the following steps: the operator public key is not set or the key index corresponding to the operator public key is 0, a NULL scheme is used, the operator public key is not required to be set, and IMSI data is not required to be used.
According to the 5G smart card testing method based on key agreement, the method further comprises the following steps: and when the SUCI is calculated, acquiring the returned status bytes and the response value of the command parameter abnormal test data, and comparing the response value with the assembly data to verify whether encryption is successful or not.
The technical scheme of the invention also comprises a 5G intelligent card testing device based on key agreement, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, and is characterized in that any one of the method steps is realized when the processor executes the computer program.
The present invention also includes a computer-readable storage medium, in which a computer program is stored, wherein the computer program, when executed by a processor, implements any of the method steps.
The invention has the beneficial effects that: and the encrypted combined output of the card is realized by automatically analyzing the 5G data acquisition instruction and combining with algorithms such as asymmetry and the like. The time and accuracy for manually encrypting and decrypting the analysis program are greatly saved.
Drawings
The invention is further described below with reference to the accompanying drawings and examples;
FIG. 1 shows a general flow diagram according to an embodiment of the invention.
FIG. 2 is a block diagram of a system according to an embodiment of the present invention.
FIG. 3 is a flowchart illustrating a test case according to an embodiment of the present invention.
Fig. 4 shows a diagram of an apparatus according to an embodiment of the invention.
Detailed Description
Reference will now be made in detail to the present embodiments of the present invention, preferred embodiments of which are illustrated in the accompanying drawings, wherein the drawings are provided for the purpose of visually supplementing the description in the specification and so forth, and which are not intended to limit the scope of the invention.
In the description of the present invention, unless otherwise specifically limited, the terms such as set forth and the like should be construed broadly, and those skilled in the art can reasonably determine the specific meanings of the above terms in combination with the detailed contents of the technical solutions.
The noun explains:
SUCI, SUBSCRIPTION CONCEALED IDENTIFIER, user hidden identification, namely SUPI after encryption;
SUPI, a unique permanent identity for a user in a 5G network;
EK,Eph.enc key;
MK,Eph.mac key;
EF_AD,Administrative Data,
MSIN, eight bits behind the IMSI-plaintext data;
NAI, network specific identifier-plaintext data;
get identification, an instruction to get data.
FIG. 1 shows a general flow diagram according to an embodiment of the invention. The process comprises the following steps: data encryption, card reader processing and test case testing; the data encryption step comprises: assembling a plurality of algorithms for encryption to obtain first encrypted data; the card reader processing steps include: calling a packaging function corresponding to the card reader, and presetting a function for acquiring a data instruction of the intelligent card; the test case comprises the following steps: and according to SUCI generated by different sources, encrypting by adopting a corresponding test case to obtain second encrypted data, and comparing the first encrypted data with the second encrypted data to obtain a test result.
FIG. 2 is a block diagram of a system according to an embodiment of the present invention. FIG. 2, wherein the data encryption module combines the correlation algorithms to assemble and output the required data; and the card reader module is connected with the card, acquires and presets the relevant file information of the card and prepares for testing. And the test case module automatically issues instructions and assembles output data through the first two modules, and compares the output data with the data in the first step to judge whether encryption is successful or not.
Specifically, the encrypting of the data encryption module comprises: and packaging a key algorithm to obtain assembly data schemeout, and simulating a customer to self-define and generate one or more groups of operators public and private keys for testing.
ProfileA:
(1) And packaging the x25519 algorithm, generating a share key by the self-defined public key and the private key generated by the card, and returning the share key.
(2) And encapsulating an ANSI-X9.63-KDF algorithm, generating the shared key generated in the sequence and the card public key, and returning the EK, the ICB and the MK.
(3) And encapsulating an AES-128 algorithm, generating and returning ciphertext Cipher _ text by the MSIN/NAI, the ICB and the EK.
(4) The packed HMAC _ SHA _256 algorithm, which generates and returns the mac value from Cipher _ text and MK.
(5) And splicing, assembling and outputting the card public key, the data ciphertext and the mac. Eventually returning data schemeout.
ProfileB:
(1) And packaging the ECDH algorithm, generating by the self-defined public key and the private key generated by the card, and returning to the share key.
(2) The subsequent algorithm is consistent with profileA. Eventually returning data schemeout.
The card reader module includes: here, a contact smart card reader is needed, and a packaged usim module (including a series of operation functions such as connection, reset, read-write update) is called, so that a function for acquiring relevant data and instructions of a card is conveniently preset.
The workflow of the test case module is shown in fig. 3, and includes: due to the diversity of encryption schemes, different scenarios will be devised to differentiate the acquisition of SUCI.
(1) Calculating IMSI to generate SUCI, and setting a group of key test methods:
and (4) resetting the starting, carrying out related verification, modifying the UST value, presetting the operator public key (controlling the public key index tag to be 00), EF _ AD, IMSI and other related values. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the acquired data and the first encrypted data.
And the ProfileA is used for resetting the startup, carrying out related verification, modifying the UST value, presetting the operator public key (controlling the public key index tag to correspond to the correct key), EF _ AD, IMSI and other related values. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the obtained data and the first encrypted data.
The process of the ProfileB is consistent with that of the ProfileA, and the difference is that when the operator public key is generated, an ECDH key negotiation related algorithm is used, so that the public key is compressed and uncompressed, and the public key needs to be generated differently according to the requirements of clients. (the following test methods are all the same)
(2) Calculating NAI to generate SUCI, and setting a group of key test methods:
and (4) resetting the starting, carrying out related verification, modifying the UST value, presetting the operator public key (controlling the public key index tag to be 00), EF _ AD, IMSI and other related values. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the obtained data and the first encrypted data.
And the ProfileA is used for resetting the starting, carrying out related verification, modifying the UST value, presetting the related values of an operator public key (controlling the public key index tag to correspond to the correct key), EF _ AD, a network specific identifier and the like. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the obtained data and the first encrypted data.
ProfileB (same as above)
(3) Test method for setting multiple groups of keys by using IMSI when SUPI TYPE is calculated to be 0
The method comprises the following steps of profile A, resetting starting, carrying out related verification, modifying UST values, presetting operator public keys (a plurality of groups of files related to the files are 4F07 files, corresponding bytes under an updated value 'A0' Tag represent the number of subsequent calculation using groups of HomePublickeys, and the testing method controls HomePublickeys of different groups to participate in calculation by modifying the bytes), EF _ AD, IMSI and other related values. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the obtained data and the first encrypted data.
ProfileB (same as above)
(4) Test method for setting multiple groups of keys by using NAI when SUPI TYPE is calculated to be 1
And (2) Profile A, resetting and starting, carrying out related verification, modifying the UST value, presetting operator public keys (multiple groups of which are related to 4F07 files, wherein the corresponding bytes under the updated value 'A0' Tag represent the next several groups of HomePublickeys for calculation, and the test method controls HomePublickeys of different groups to participate in calculation by modifying the bytes), EF _ AD, network specific identifiers and other related values. And modifying the UST value again to enable the usim to operate the get identity instruction, and comparing and analyzing the acquired data and the first encrypted data.
ProfileB (same as above)
(5) In addition to this, various abnormal test cases are also devised. For example, when the USIM card is used to compute the SUCI, the ME get 4F07 file returns 698 status bytes, instruction parameter exception testing, and the like.
And comparing the obtained response value with schemeout (planned output) to verify whether encryption is successful.
Fig. 4 shows a schematic view of an apparatus according to an embodiment of the invention. The apparatus comprises a memory 100 and a processor 200, wherein the processor 200 stores a computer program for performing: data encryption, card reader processing and test case testing; the data encryption step comprises: assembling a plurality of algorithms for encryption to obtain first encrypted data; the card reader processing steps include: calling a packaging function corresponding to the card reader, and presetting a function for acquiring a data instruction of the intelligent card; the test case comprises the following steps: and according to SUCIs generated by different sources, encrypting by adopting the corresponding test cases to obtain second encrypted data, and comparing the first encrypted data with the second encrypted data to obtain a test result. The memory 100 is used for storing data.
It should be recognized that the method steps in embodiments of the present invention may be embodied or carried out by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The method may use standard programming techniques. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable connection, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, or the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (7)

1. A5G smart card testing method based on key agreement is characterized by comprising the following steps:
data encryption, card reader processing and test case testing;
the data encryption step comprises: assembling a plurality of algorithms for encryption to obtain first encrypted data;
the card reader processing step comprises: calling a packaging function corresponding to the card reader, and presetting a function for acquiring a data instruction of the intelligent card;
the test case steps include: according to SUCI generated by different sources, encrypting by adopting a corresponding test case to obtain second encrypted data, and comparing the first encrypted data with the second encrypted data to obtain a test result;
the data encryption step includes performing corresponding encryption processing using a first configuration file and a second configuration file, wherein
The first configuration file includes: packaging an x25519 algorithm, generating and returning a shared key through a self-defined public key and a private key generated by the smart card; packaging an ANSI-X9.63-KDF algorithm, generating and returning EK, ICB and MK according to the shared secret key and the public key of the smart card; an AES-128 algorithm is packaged, and a data ciphertext is generated and returned through the MSIN/NAI, the ICB and the EK; packaging an HMAC _ SHA _256 algorithm, generating and returning a mac value through a data ciphertext and MK; splicing, assembling and outputting the public key, the ciphertext data and the mac value of the intelligent card;
the second configuration file includes: packaging an ECDH algorithm, generating and returning a shared key according to the user-defined public key and a private key generated by the smart card; packaging an ANSI-X9.63-KDF algorithm, generating and returning EK, ICB and MK according to the shared secret key and the public key of the smart card; an AES-128 algorithm is packaged, and a ciphertext is generated and returned through the MSIN/NAI, the ICB and the EK; packaging an HMAC _ SHA _256 algorithm, generating and returning a mac value through the ciphertext and the MK; splicing, assembling and outputting the public key, the ciphertext data and the mac value of the smart card;
the test case steps include:
according to SUCI generated by IMSI or NAI, through the first configuration file and the second configuration file, the intelligent card data is obtained through the function, and the test is carried out according to the obtained data and the issued instruction; when the value of the first encrypted data SUPI TYPE is 0, the testing of the SUCI generated by the IMSI includes:
executing the following steps according to the first configuration file and the second configuration file: operating the smart card through an instruction and a function, resetting the start, modifying the UST value of the smart card, presetting the relevant values of the operator public key, EF _ AD and IMSI, modifying the UST value again, issuing a get identity to operate the smart card to obtain data, and obtaining the data for testing;
when the value of the first encryption data SUPI TYPE is 1, the test of sui generated by NAI includes:
executing the following steps according to the first configuration file and the second configuration file: the method comprises the steps of operating the intelligent card through an instruction and a function, resetting starting, modifying the UST value of the intelligent card, presetting one or more groups of operator public keys, EF _ AD and related values of network specific identifiers, modifying the UST value again, issuing a get identity to operate the intelligent card to obtain data, and obtaining and testing the data.
2. The 5G smart card testing method based on key agreement according to claim 1, wherein the second configuration file executing the SUCI obtaining test comprises:
the operator public key is generated by using an ECDH (elliptic curve cryptography) key negotiation algorithm, the generated operator public key is compressed or uncompressed, and the compression state of the operator public key can be set in a self-defined manner.
3. The 5G smart card testing method based on key agreement according to claim 1, wherein the testing comprises:
when the value of the SUPI TYPE is 0, the test method for setting a plurality of groups of public keys and private keys by using the IMSI comprises the following steps:
executing the following steps according to the first configuration file and the second configuration file: operating the smart card through an instruction and a function, resetting the start, modifying the UST value of the smart card, presetting one or more groups of related values of the operator public key, EF _ AD and IMSI, modifying the UST value again, issuing a get identity to operate the smart card to obtain data, and obtaining the data for testing;
when the value of the SUPI TYPE is 1, the test method for setting multiple groups of public keys and private keys by using the NAI comprises the following steps:
executing the following steps according to the first configuration file and the second configuration file: the intelligent card is operated through an instruction and a function, the starting is reset, the UST value of the intelligent card is modified, multiple groups of related values of the operator public key, the EF _ AD and the network specific identifier are preset, the UST value is modified again, the get identification is issued, the intelligent card is operated to obtain data, and the data are obtained to be tested.
4. The 5G smart card testing method based on key agreement according to claim 1, characterized in that the method further comprises:
the operator public key is not set or the key index corresponding to the operator public key is 0, a NULL scheme is used, the operator public key is not required to be set, and IMSI data is not required to be used.
5. The key agreement based 5G smart card testing method according to claim 1, further comprising:
and when the SUCI is calculated, acquiring the returned status bytes and the response value of the command parameter abnormal test data, and comparing the response value with the assembly data to verify whether encryption is successful or not.
6. A key agreement based 5G smart card testing device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method steps of any of claims 1-5 when executing the computer program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of claims 1 to 5.
CN202110632718.2A 2021-06-07 2021-06-07 5G smart card testing method, device and medium based on key agreement Active CN113342653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110632718.2A CN113342653B (en) 2021-06-07 2021-06-07 5G smart card testing method, device and medium based on key agreement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110632718.2A CN113342653B (en) 2021-06-07 2021-06-07 5G smart card testing method, device and medium based on key agreement

Publications (2)

Publication Number Publication Date
CN113342653A CN113342653A (en) 2021-09-03
CN113342653B true CN113342653B (en) 2022-11-29

Family

ID=77475015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110632718.2A Active CN113342653B (en) 2021-06-07 2021-06-07 5G smart card testing method, device and medium based on key agreement

Country Status (1)

Country Link
CN (1) CN113342653B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN111163470A (en) * 2019-12-31 2020-05-15 联想(北京)有限公司 Core network element communication method and device, computer storage medium and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934310B (en) * 2017-02-24 2019-09-13 飞天诚信科技股份有限公司 A kind of method and card reader of testing smart card
US11706617B2 (en) * 2019-01-03 2023-07-18 Cisco Technology, Inc. Authenticating radio access network components using distributed ledger technology
CN110188011A (en) * 2019-05-28 2019-08-30 东信和平科技股份有限公司 A kind of smart card national secret algorithm test method and device
CN110442487A (en) * 2019-08-13 2019-11-12 东信和平科技股份有限公司 A kind of smart card communication protocol test method, device, system and readable medium
CN110933027A (en) * 2019-10-23 2020-03-27 南京瑞思其智能科技有限公司 Lighting system AKA authentication method based on 5G network
CN111049831B (en) * 2019-12-13 2022-03-18 中国联合网络通信集团有限公司 Generation control method and device of user hidden identifier and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN111163470A (en) * 2019-12-31 2020-05-15 联想(北京)有限公司 Core network element communication method and device, computer storage medium and electronic equipment

Also Published As

Publication number Publication date
CN113342653A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
CN109040090B (en) A kind of data ciphering method and device
CN112291190B (en) Identity authentication method, terminal and server
AU2019271965A1 (en) POS System with white box encryption key sharing
WO2018090763A1 (en) Method and device for configuring terminal master key
CN103562922A (en) Establishing unique key during chip manufacturing
US9961057B2 (en) Securing a cryptographic device against implementation attacks
CN113065857A (en) Data processing method, device, equipment, medium and product in payment process
CN107872315B (en) Data processing method and intelligent terminal
CN110011959B (en) Data storage method, data query method and system
CN113722741A (en) Data encryption method and device and data decryption method and device
CN113342653B (en) 5G smart card testing method, device and medium based on key agreement
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN104636662A (en) Data processing method and terminal device
CN109255225A (en) Hard disc data security control apparatus based on dual-identity authentication
KR20190097083A (en) Back-calculation fuzzy extractor and method for authentication
CN113489723A (en) Data transmission method, system, computer device and storage medium
US20220327046A1 (en) Testing system, testing method, and testing program
CN112311536A (en) Key hierarchical management method and system
CN111641497A (en) Method and device for automatically decrypting sensitive parameters
CN104506311A (en) Method for achieving check-in function
KR102404156B1 (en) Quantum security communication device integrated plc/hmi control system and method
CN109656562A (en) A kind of DC control protective program remote compilation method and system
US11552796B2 (en) Cryptographic processing events for encrypting or decrypting data
KR102404138B1 (en) Quantum security communication device integrated autonomous moving body movement record system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant