CN118694688A - A test method, system and test equipment for secure transmission - Google Patents
A test method, system and test equipment for secure transmission Download PDFInfo
- Publication number
- CN118694688A CN118694688A CN202411179183.8A CN202411179183A CN118694688A CN 118694688 A CN118694688 A CN 118694688A CN 202411179183 A CN202411179183 A CN 202411179183A CN 118694688 A CN118694688 A CN 118694688A
- Authority
- CN
- China
- Prior art keywords
- target
- file
- main
- configuration information
- information table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 116
- 238000012360 testing method Methods 0.000 title claims abstract description 57
- 238000010998 test method Methods 0.000 title claims description 27
- 238000000034 method Methods 0.000 claims abstract description 44
- 230000008569 process Effects 0.000 claims abstract description 25
- 238000012545 processing Methods 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 19
- 230000004913 activation Effects 0.000 claims description 45
- 238000011156 evaluation Methods 0.000 claims description 3
- 238000011076 safety test Methods 0.000 abstract 2
- 238000010586 diagram Methods 0.000 description 9
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- KDYFGRWQOYBRFD-UHFFFAOYSA-N succinic acid Chemical compound OC(=O)CCC(O)=O KDYFGRWQOYBRFD-UHFFFAOYSA-N 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及加密测试技术领域,尤其涉及一种安全传输的测试方法、系统、测试设备及计算机可读存储介质。The present invention relates to the field of encryption testing technology, and in particular to a secure transmission testing method, system, testing equipment and computer-readable storage medium.
背景技术Background Art
近年来,随着移动通信的普及,移动通信中的安全问题正受到越来越多的关注,设备厂商的竞争越来越激烈,通信网络传输的安全问题被提到了首要位置。In recent years, with the popularization of mobile communications, security issues in mobile communications are receiving more and more attention, competition among equipment manufacturers is becoming increasingly fierce, and the security of communication network transmission has been given top priority.
但目前的安全传输认证存在效率低、操作复杂、安全性不足的问题,且不同设备之间需要使用不同的安全传输认证方法,导致安全传输认证的兼容性差,用户使用起来不方便。However, the current secure transmission authentication has problems such as low efficiency, complex operation, and insufficient security. In addition, different secure transmission authentication methods need to be used between different devices, resulting in poor compatibility of secure transmission authentication and inconvenience for users.
因此,现有技术还有待于改进和发展。Therefore, the prior art still needs to be improved and developed.
发明内容Summary of the invention
本发明的主要目的在于提供一种安全传输的测试方法、系统、测试设备及计算机可读存储介质,旨在解决现有技术中不同设备之间需要使用不同安全传输认证方法,从而导致完全传输认证兼容性差以及安全传输认证效率低的问题。The main purpose of the present invention is to provide a secure transmission testing method, system, testing equipment and computer-readable storage medium, aiming to solve the problem in the prior art that different secure transmission authentication methods need to be used between different devices, resulting in poor compatibility of complete transmission authentication and low efficiency of secure transmission authentication.
为实现上述目的,本发明提供一种安全传输的测试方法,所述安全传输的测试方法包括如下步骤:To achieve the above object, the present invention provides a method for testing secure transmission, the method comprising the following steps:
建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;Establishing a network connection with a target main device and a target secondary device, obtaining main device information of the target main device and secondary device information of the target secondary device, and establishing a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information;
将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;Sending the activation instruction input by the user to the target primary device and the target secondary device respectively, and receiving the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction;
将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;Sending the encryption instruction in the master configuration information table to the target master device, receiving the target file sent by the target master device, and controlling the target master device to send the target file to the target slave device, wherein the target file is obtained by the target master device encrypting the stored transmission file;
将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。The decryption instruction in the secondary configuration information table is sent to the target secondary device, and the target secondary device is controlled to perform decryption processing on the target file and evaluate the decryption processing process to obtain a decryption result.
可选地,所述的安全传输的测试方法,其中,所述建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接,具体包括:Optionally, the test method for secure transmission, wherein the establishing a network connection with a target main device and a target secondary device, obtaining the main device information of the target main device and the secondary device information of the target secondary device, and establishing a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information, specifically includes:
建立与目标主设备的网络连接,并获取所述目标主设备的主设备IP地址和主设备ID;Establish a network connection with the target master device, and obtain the master device IP address and master device ID of the target master device;
建立与目标副设备的网络连接,并获取所述目标副设备的副设备IP地址和副设备ID;Establishing a network connection with a target secondary device, and obtaining a secondary device IP address and a secondary device ID of the target secondary device;
根据所述主设备IP地址、所述主设备ID、所述副设备IP地址和所述副设备ID,控制所述目标主设备和所述目标副设备建立通信连接。According to the master device IP address, the master device ID, the slave device IP address and the slave device ID, the target master device and the target slave device are controlled to establish a communication connection.
可选地,所述的安全传输的测试方法,其中,所述将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表,具体包括:Optionally, the test method for secure transmission, wherein the sending of the activation instruction input by the user to the target primary device and the target secondary device respectively, and receiving the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction, specifically comprises:
获取用户输入的激活指令,将所述激活指令分别发送到所述目标主设备和目标副设备;Acquire an activation instruction input by a user, and send the activation instruction to the target primary device and the target secondary device respectively;
分别接收预先存储在所述目标主设备的主配置信息表和预先存储在所述目标副设备中的副配置信息表。A main configuration information table pre-stored in the target main device and a sub-configuration information table pre-stored in the target sub-device are received respectively.
可选地,所述的安全传输的测试方法,其中,所述分别接收预先存储在所述目标主设备的主配置信息表和预先存储在所述目标副设备中的副配置信息表,之后还包括:Optionally, the test method for secure transmission, wherein the step of respectively receiving a main configuration information table pre-stored in the target main device and a sub-configuration information table pre-stored in the target sub-device, further comprises:
对比所述主配置信息表和所述副配置信息表,若所述主配置信息表和所述副配置信息表不匹配,则生成第一预警信息,以提示用户修改所述主配置信息表或所述副配置信息表。The main configuration information table and the secondary configuration information table are compared. If the main configuration information table and the secondary configuration information table do not match, a first warning message is generated to prompt a user to modify the main configuration information table or the secondary configuration information table.
可选地,所述的安全传输的测试方法,其中,所述将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,具体包括:Optionally, the test method for secure transmission, wherein the step of sending the encryption instruction in the master configuration information table to the target master device, receiving the target file sent by the target master device, and controlling the target master device to send the target file to the target slave device, specifically includes:
获取用户的传输指令,根据所述传输指令确定存储在所述目标主设备中需要发送的传输文件;Obtaining a transmission instruction from a user, and determining a transmission file stored in the target host device that needs to be sent according to the transmission instruction;
将所述主配置信息表中的加密指令发送到所述目标主设备,控制所述目标主设备对所述传输文件进行加密处理,得到目标文件;Sending the encryption instruction in the master configuration information table to the target master device, controlling the target master device to encrypt the transmission file to obtain the target file;
将所述传输指令发送到所述目标主设备,控制所述目标主设备将所述目标文件发送到所述目标副设备。The transmission instruction is sent to the target master device, and the target master device is controlled to send the target file to the target slave device.
可选地,所述的安全传输的测试方法,其中,所述将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果,具体包括:Optionally, the test method for secure transmission, wherein sending the decryption instruction in the secondary configuration information table to the target secondary device, controlling the target secondary device to perform decryption processing on the target file and evaluating the decryption processing process to obtain the decryption result, specifically includes:
接收所述目标副设备发送的文件接收信息后,将所述副配置信息表的解密指令发送到所述目标副设备,其中,所述文件接收信息由所述目标副设备根据接收到的所述目标文件生成;After receiving the file receiving information sent by the target secondary device, sending the decryption instruction of the secondary configuration information table to the target secondary device, wherein the file receiving information is generated by the target secondary device according to the received target file;
控制所述目标副设备对所述目标文件进行解密处理,并接收所述目标副设备发送的解密时间和解密文件,其中,所述解密时间和所述解密文件由所述目标副设备对所述目标文件进行解密时生成;Controlling the target secondary device to decrypt the target file, and receiving a decryption time and a decryption file sent by the target secondary device, wherein the decryption time and the decryption file are generated when the target secondary device decrypts the target file;
分析所述解密时间和所述解密文件,得到解密评分。The decryption time and the decrypted file are analyzed to obtain a decryption score.
可选地,所述的安全传输的测试方法,其中,所述控制所述目标副设备对所述目标文件进行解密处理,并接收所述目标副设备发送的解密时间和解密文件,之后还包括:Optionally, the test method for secure transmission, wherein the step of controlling the target secondary device to decrypt the target file and receiving the decryption time and the decrypted file sent by the target secondary device, further comprises:
对比所述解密文件与所述传输文件,若所述解密文件与所述传输文件不一致,则生成第二预警信息。The decrypted file is compared with the transmission file, and if the decrypted file is inconsistent with the transmission file, a second warning message is generated.
此外,为实现上述目的,本发明还提供一种安全传输的测试系统,其中,所述安全传输的测试系统包括:In addition, to achieve the above-mentioned purpose, the present invention further provides a test system for secure transmission, wherein the test system for secure transmission comprises:
设备连接模块,用于建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;A device connection module, used to establish a network connection with a target main device and a target secondary device, obtain the main device information of the target main device and the secondary device information of the target secondary device, and establish a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information;
指令配置模块,用于将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;An instruction configuration module, used to send the activation instruction input by the user to the target primary device and the target secondary device respectively, and receive the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction;
文件加密模块,用于将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;a file encryption module, used to send the encryption instruction in the master configuration information table to the target master device, receive the target file sent by the target master device, and control the target master device to send the target file to the target slave device, wherein the target file is obtained by the target master device encrypting the stored transmission file;
解密评估模块,用于将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。The decryption evaluation module is used to send the decryption instruction in the secondary configuration information table to the target secondary device, control the target secondary device to perform decryption processing on the target file and evaluate the decryption processing process to obtain a decryption result.
此外,为实现上述目的,本发明还提供一种测试设备,其中,所述测试设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的安全传输的测试程序,所述安全传输的测试程序被所述处理器执行时实现如上所述的安全传输的测试方法的步骤。In addition, to achieve the above-mentioned purpose, the present invention also provides a testing device, wherein the testing device includes: a memory, a processor, and a secure transmission test program stored in the memory and executable on the processor, wherein the secure transmission test program implements the steps of the secure transmission test method as described above when executed by the processor.
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,其中,所述计算机可读存储介质存储有安全传输的测试程序,所述安全传输的测试程序被处理器执行时实现如上所述的安全传输的测试方法的步骤。In addition, to achieve the above-mentioned purpose, the present invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores a secure transmission test program, and when the secure transmission test program is executed by a processor, the steps of the secure transmission test method as described above are implemented.
本发明中,建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。本发明通过连接进行数据传输的两个设备,以控制指令的形式控制设备对传输文件进行加密、传输以及解密处理,并评估加解密的过程,在快速准确地完成对设备之间的安全测试基础上,保证了设备之间传输的安全性,并且也简化了安全测试的操作,使得用户使用起来更加方便,提升了用户的使用体验。In the present invention, a network connection is established with a target main device and a target secondary device, and the main device information of the target main device and the secondary device information of the target secondary device are obtained, and a communication connection is established between the target main device and the target secondary device based on the main device information and the secondary device information; an activation instruction input by a user is sent to the target main device and the target secondary device respectively, and a main configuration information table sent by the target main device according to the activation instruction and a secondary configuration information table sent by the target secondary device according to the activation instruction are received; an encryption instruction in the main configuration information table is sent to the target main device, a target file sent by the target main device is received, and the target main device is controlled to send the target file to the target secondary device, wherein the target file is obtained by the target main device encrypting a stored transmission file; a decryption instruction in the secondary configuration information table is sent to the target secondary device, and the target secondary device is controlled to decrypt the target file and evaluate the decryption process to obtain a decryption result. The present invention connects two devices performing data transmission, controls the devices to encrypt, transmit and decrypt transmission files in the form of control instructions, and evaluates the encryption and decryption process. On the basis of quickly and accurately completing the security test between the devices, the security of transmission between the devices is ensured, and the operation of the security test is also simplified, making it more convenient for users to use and improving the user experience.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本发明安全传输的测试方法的较佳实施例的流程图;FIG1 is a flow chart of a preferred embodiment of a test method for secure transmission of the present invention;
图2是本发明安全传输的测试方法的较佳实施例的配置信息示意图;FIG2 is a schematic diagram of configuration information of a preferred embodiment of a test method for secure transmission of the present invention;
图3是本发明安全传输的测试方法的较佳实施例的设备连接示意图;3 is a schematic diagram of equipment connection of a preferred embodiment of the test method for secure transmission of the present invention;
图4是本发明安全传输的测试方法的较佳实施例的通信示意图;4 is a communication diagram of a preferred embodiment of the test method for secure transmission of the present invention;
图5是本发明安全传输的测试方法的较佳实施例的测试示意图;5 is a test schematic diagram of a preferred embodiment of the test method for secure transmission of the present invention;
图6是本发明安全传输的测试方法的较佳实施例的信息接收展示图;6 is a diagram showing information reception of a preferred embodiment of the test method for secure transmission of the present invention;
图7是本发明安全传输的测试方法的较佳实施例的文件导入图;7 is a file import diagram of a preferred embodiment of the test method for secure transmission of the present invention;
图8是本发明安全传输的测试方法的较佳实施例的结果展示图;FIG8 is a result display diagram of a preferred embodiment of the test method for secure transmission of the present invention;
图9是本发明安全传输的测试系统的较佳实施例的原理示意图;9 is a schematic diagram of the principle of a preferred embodiment of the test system for secure transmission of the present invention;
图10为本发明测试设备的较佳实施例的运行环境示意图。FIG. 10 is a schematic diagram of the operating environment of a preferred embodiment of the testing device of the present invention.
具体实施方式DETAILED DESCRIPTION
为使本发明的目的、技术方案及优点更加清楚、明确,以下参照附图并举实施例对本发明进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the purpose, technical solution and advantages of the present invention clearer and more specific, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are only used to explain the present invention and are not used to limit the present invention.
本发明较佳实施例所述的安全传输的测试方法,如图1所示,所述安全传输的测试方法包括以下步骤:The test method for secure transmission according to a preferred embodiment of the present invention is shown in FIG1 , and the test method for secure transmission comprises the following steps:
步骤S10、建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接。Step S10, establish a network connection with the target main device and the target secondary device, obtain the main device information of the target main device and the secondary device information of the target secondary device, and establish a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information.
具体地,建立与目标主设备的网络连接,并获取所述目标主设备的主设备IP地址和主设备ID;建立与目标副设备的网络连接,并获取所述目标副设备的副设备IP地址和副设备ID;根据所述主设备IP地址、所述主设备ID、所述副设备IP地址和所述副设备ID,控制所述目标主设备和所述目标副设备建立通信连接。Specifically, a network connection is established with a target main device, and the main device IP address and main device ID of the target main device are obtained; a network connection is established with a target secondary device, and the secondary device IP address and secondary device ID of the target secondary device are obtained; and according to the main device IP address, the main device ID, the secondary device IP address and the secondary device ID, the target main device and the target secondary device are controlled to establish a communication connection.
其中,如图2所示,可以打开CMD(命令提示符)窗口输入指令以控制目标主设备和目标副设备,分别与目标主设备和目标副设备建立网络连接,并将数据采集分析文件导入这两个设备,以便于目标主设备和目标副设备进行传输数据的分析和验证,同时获取两设备的主设备信息和副设备信息,从而使得目标主设备和目标副设备相互连接,从而实现有针对性的数据传输。As shown in FIG. 2 , a CMD (command prompt) window can be opened to input commands to control the target main device and the target sub-device, respectively establish network connections with the target main device and the target sub-device, and import data acquisition and analysis files into the two devices, so that the target main device and the target sub-device can analyze and verify the transmitted data, and simultaneously obtain the main device information and sub-device information of the two devices, so that the target main device and the target sub-device can be connected to each other, thereby realizing targeted data transmission.
步骤S20、将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表。Step S20: Send the activation instruction input by the user to the target primary device and the target secondary device respectively, and receive the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction.
具体地,获取用户输入的激活指令,将所述激活指令分别发送到所述目标主设备和目标副设备;分别接收预先存储在所述目标主设备的主配置信息表和预先存储在所述目标副设备中的副配置信息表。Specifically, an activation instruction input by a user is obtained, and the activation instruction is sent to the target main device and the target secondary device respectively; and a main configuration information table pre-stored in the target main device and a secondary configuration information table pre-stored in the target secondary device are received respectively.
其中,如图3和图4所示,利用测试工具(例如,softbus_tool),通过输入激活指令,可以查看目标主设备的相关提示:OpenSession succ,sessionId = 1,从而判断目标主设备激活成功,对于目标副设备也可以采取相同的操作,此时在目标主设备和目标副设备的CMD窗口中,均会显示对应的主配置信息表和副配置信息表,以帮助用户了解测试过程,简化了用户进行安全传输测试的复杂性,提高了用户的使用体验。Among them, as shown in Figures 3 and 4, by using a test tool (for example, softbus_tool), by entering an activation command, you can view the relevant prompts of the target master device: OpenSession succ, sessionId = 1, thereby judging that the target master device is successfully activated. The same operation can be taken for the target slave device. At this time, the corresponding main configuration information table and slave configuration information table will be displayed in the CMD windows of the target master device and the target slave device to help users understand the test process, simplify the complexity of users performing secure transmission tests, and improve the user experience.
进一步地,对比所述主配置信息表和所述副配置信息表,若所述主配置信息表和所述副配置信息表不匹配,则生成第一预警信息,以提示用户修改所述主配置信息表或所述副配置信息表。Furthermore, the main configuration information table and the secondary configuration information table are compared, and if the main configuration information table and the secondary configuration information table do not match, a first warning message is generated to prompt the user to modify the main configuration information table or the secondary configuration information table.
其中,在得到目标主设备的主配置信息表和目标副设备的副配置信息表后,对比两者的信息表,若两者的配置信息表并不匹配,则说明目标主设备和目标副设备并未成功建立连接,此时就需要生成第一预警信息,以提示用户检查两设备是否连接成功;若两设备连接成功,且两者的配置信息表仍不匹配,则需要提示用户对配置信息表或副配置信息表进行更新,以适应当前安全传输的测试条件,避免后续出现检测失误的情况发生。Among them, after obtaining the main configuration information table of the target main device and the sub-configuration information table of the target sub-device, compare the information tables of the two. If the configuration information tables of the two do not match, it means that the target main device and the target sub-device have not successfully established a connection. At this time, it is necessary to generate a first warning information to prompt the user to check whether the two devices are connected successfully; if the two devices are connected successfully and the configuration information tables of the two still do not match, the user needs to be prompted to update the configuration information table or the sub-configuration information table to adapt to the current security transmission test conditions to avoid subsequent detection errors.
步骤S30、将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到。Step S30, sending the encryption instruction in the main configuration information table to the target master device, receiving the target file sent by the target master device, and controlling the target master device to send the target file to the target slave device, wherein the target file is obtained by the target master device encrypting the stored transmission file.
具体地,获取用户的传输指令,根据所述传输指令确定存储在所述目标主设备中需要发送的传输文件;将所述主配置信息表中的加密指令发送到所述目标主设备,控制所述目标主设备对所述传输文件进行加密处理,得到目标文件;将所述传输指令发送到所述目标主设备,控制所述目标主设备将所述目标文件发送到所述目标副设备。Specifically, the user's transmission instruction is obtained, and the transmission file that needs to be sent and is stored in the target master device is determined according to the transmission instruction; the encryption instruction in the main configuration information table is sent to the target master device, and the target master device is controlled to encrypt the transmission file to obtain the target file; the transmission instruction is sent to the target master device, and the target master device is controlled to send the target file to the target slave device.
其中,根据用户的传输指令将目标主设备中的需要发送的传输文件进行加密处理后得到目标文件,根据用户输入的发送指令将目标文件发送到目标副设备中(如图5所示)。Among them, according to the user's transmission instruction, the transmission file to be sent in the target main device is encrypted to obtain the target file, and according to the sending instruction input by the user, the target file is sent to the target secondary device (as shown in Figure 5).
步骤S40、将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。Step S40: Send the decryption instruction in the secondary configuration information table to the target secondary device, control the target secondary device to perform decryption processing on the target file and evaluate the decryption processing process to obtain a decryption result.
具体地,接收所述目标副设备发送的文件接收信息后,将所述副配置信息表的解密指令发送到所述目标副设备,其中,所述文件接收信息由所述目标副设备根据接收到的所述目标文件生成;控制所述目标副设备对所述目标文件进行解密处理,并接收所述目标副设备发送的解密时间和解密文件,其中,所述解密时间和所述解密文件由所述目标副设备对所述目标文件进行解密时生成;分析所述解密时间和所述解密文件,得到解密评分。Specifically, after receiving the file reception information sent by the target secondary device, the decryption instruction of the secondary configuration information table is sent to the target secondary device, wherein the file reception information is generated by the target secondary device according to the received target file; the target secondary device is controlled to decrypt the target file, and the decryption time and the decryption file sent by the target secondary device are received, wherein the decryption time and the decryption file are generated when the target secondary device decrypts the target file; the decryption time and the decryption file are analyzed to obtain a decryption score.
其中,如图6所示,在进行解密前,根据输入的查收指令,可以判断目标副设备是否接收到了由目标主设备发送的目标文件,若未发现目标文件,则需要检查目标主设备是否成功发送了目标文件,以及目标主设备与目标副设备是否成功建立连接,并将相关的检查结果发送给用户,以提示用户及时做出调整;进一步地,若检测到了目标文件,则通过不同的命令将目标文件保存在目标主设备和测试设备中,如图7所示,使用“tcpdump_aarch64 -i wlan0 src host 192.168.1.100 and dst host 192.168.1.101 -w /data/chen01”将目标文件保存到目标主设备中,使用“hdc -t 150100414a54443452060d354c1fb800 filerecv /data/chen01 C:\Users\Administrator\Desktop\hdc_std\”命令,将目标文件保存到测试设备中,并使用工具查看目标文件是否经过加密处理(如图8所示),而将目标文件分别保存到目标主设备和测试设备中,可以用于对目标文件进行解密后的验证,以提高文件传输的准确性,提高用户的测试效率。As shown in FIG6 , before decryption, according to the input check instruction, it can be determined whether the target secondary device has received the target file sent by the target primary device. If the target file is not found, it is necessary to check whether the target primary device has successfully sent the target file and whether the target primary device and the target secondary device have successfully established a connection, and send the relevant inspection results to the user to prompt the user to make adjustments in time. Furthermore, if the target file is detected, the target file is saved in the target primary device and the test device through different commands. As shown in FIG7 , “tcpdump_aarch64 -i wlan0 src host 192.168.1.100 and dst host 192.168.1.101 -w /data/chen01” is used to save the target file to the target primary device, and “hdc -t 150100414a54443452060d354c1fb800 filerecv /data/chen01” is used to C:\Users\Administrator\Desktop\hdc_std\" command, save the target file to the test device, and use the tool to check whether the target file has been encrypted (as shown in Figure 8). Saving the target file to the target host device and the test device respectively can be used to verify the target file after decryption to improve the accuracy of file transmission and improve the user's testing efficiency.
进一步地,对比所述解密文件与所述传输文件,若所述解密文件与所述传输文件不一致,则生成第二预警信息。Furthermore, the decrypted file is compared with the transmission file, and if the decrypted file is inconsistent with the transmission file, a second warning message is generated.
其中,在目标文件解密完成后,需要对比解密文件与传输文件的一致性,并根据解密的时间和解密过程的目标文件的准确性和完整性生成对应的解密评分,根据解密评分测试当前安全传输测试的安全性和准确性,避免在加密或解密时导致传输文件的内容出现偏差,从而保证传输文件在加密过程和解密过程中的准确性和完整性。Among them, after the target file is decrypted, it is necessary to compare the consistency of the decrypted file and the transmitted file, and generate a corresponding decryption score based on the decryption time and the accuracy and integrity of the target file in the decryption process. The security and accuracy of the current secure transmission test are tested based on the decryption score to avoid deviations in the content of the transmitted file during encryption or decryption, thereby ensuring the accuracy and integrity of the transmitted file during the encryption and decryption processes.
本发明通过连接进行数据传输的两个设备,以控制指令的形式控制设备对传输文件进行加密、传输以及解密处理,并评估加解密的过程,在快速准确地完成对设备之间的安全测试基础上,保证了设备之间传输的安全性,并且也简化了安全测试的操作,使得用户使用起来更加方便,提升了用户的使用体验。The present invention connects two devices performing data transmission, controls the devices to encrypt, transmit and decrypt transmission files in the form of control instructions, and evaluates the encryption and decryption process. On the basis of quickly and accurately completing the security test between the devices, the security of transmission between the devices is ensured, and the operation of the security test is also simplified, making it more convenient for users to use and improving the user experience.
进一步地,如图9所示,基于上述安全传输的测试方法,本发明还相应提供了一种安全传输的测试系统,其中,所述安全传输的测试系统包括:Further, as shown in FIG9 , based on the above-mentioned secure transmission test method, the present invention also provides a secure transmission test system accordingly, wherein the secure transmission test system includes:
设备连接模块51,用于建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;The device connection module 51 is used to establish a network connection with a target main device and a target secondary device, obtain the main device information of the target main device and the secondary device information of the target secondary device, and establish a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information;
指令配置模块52,用于将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;The instruction configuration module 52 is used to send the activation instruction input by the user to the target primary device and the target secondary device respectively, and receive the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction;
文件加密模块53,用于将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;A file encryption module 53 is used to send the encryption instruction in the main configuration information table to the target master device, receive the target file sent by the target master device, and control the target master device to send the target file to the target slave device, wherein the target file is obtained by the target master device encrypting the stored transmission file;
解密评估模块54,用于将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。The decryption evaluation module 54 is used to send the decryption instruction in the secondary configuration information table to the target secondary device, control the target secondary device to perform decryption processing on the target file and evaluate the decryption processing process to obtain a decryption result.
进一步地,如图10所示,基于上述安全传输的测试方法和系统,本发明还相应提供了一种测试设备,所述测试设备包括处理器10、存储器20及显示器30。图10仅示出了测试设备的部分组件,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。Further, as shown in Fig. 10, based on the above-mentioned secure transmission test method and system, the present invention also provides a test device, which includes a processor 10, a memory 20 and a display 30. Fig. 10 only shows some components of the test device, but it should be understood that it is not required to implement all the components shown, and more or fewer components can be implemented instead.
所述存储器20在一些实施例中可以是所述测试设备的内部存储单元,例如测试设备的硬盘或内存。所述存储器20在另一些实施例中也可以是所述测试设备的外部存储设备,例如所述测试设备上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器20还可以既包括所述测试设备的内部存储单元也包括外部存储设备。所述存储器20用于存储安装于所述测试设备的应用软件及各类数据,例如所述安装测试设备的程序代码等。所述存储器20还可以用于暂时地存储已经输出或者将要输出的数据。在一实施例中,存储器20上存储有安全传输的测试程序40,该安全传输的测试程序40可被处理器10所执行,从而实现本申请中安全传输的测试方法。In some embodiments, the memory 20 may be an internal storage unit of the test device, such as a hard disk or memory of the test device. In other embodiments, the memory 20 may also be an external storage device of the test device, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, a flash card (Flash Card), etc. equipped on the test device. Further, the memory 20 may also include both an internal storage unit of the test device and an external storage device. The memory 20 is used to store application software and various types of data installed on the test device, such as the program code of the installed test device. The memory 20 may also be used to temporarily store data that has been output or is to be output. In one embodiment, a securely transmitted test program 40 is stored on the memory 20, and the securely transmitted test program 40 can be executed by the processor 10, thereby realizing the secure transmission test method in the present application.
所述处理器10在一些实施例中可以是一中央处理器(Central Processing Unit,CPU),微处理器或其他数据处理芯片,用于运行所述存储器20中存储的程序代码或处理数据,例如执行所述安全传输的测试方法等。In some embodiments, the processor 10 may be a central processing unit (CPU), a microprocessor or other data processing chip, used to run the program code or process data stored in the memory 20, such as executing the test method for secure transmission.
所述显示器30在一些实施例中可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。所述显示器30用于显示在所述测试设备的信息以及用于显示可视化的用户界面。所述测试设备的部件10-30通过系统总线相互通信。In some embodiments, the display 30 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, etc. The display 30 is used to display information on the test device and to display a visual user interface. The components 10-30 of the test device communicate with each other via a system bus.
在一实施例中,当处理器10执行所述存储器20中安全传输的测试程序40时实现以下步骤:In one embodiment, when the processor 10 executes the test program 40 securely transmitted in the memory 20, the following steps are implemented:
建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;Establishing a network connection with a target main device and a target secondary device, obtaining main device information of the target main device and secondary device information of the target secondary device, and establishing a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information;
将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;Sending the activation instruction input by the user to the target primary device and the target secondary device respectively, and receiving the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction;
将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;Sending the encryption instruction in the master configuration information table to the target master device, receiving the target file sent by the target master device, and controlling the target master device to send the target file to the target slave device, wherein the target file is obtained by the target master device encrypting the stored transmission file;
将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。The decryption instruction in the secondary configuration information table is sent to the target secondary device, and the target secondary device is controlled to perform decryption processing on the target file and evaluate the decryption processing process to obtain a decryption result.
其中,所述建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接,具体包括:The step of establishing a network connection with a target main device and a target secondary device, acquiring the main device information of the target main device and the secondary device information of the target secondary device, and establishing a communication connection between the target main device and the target secondary device according to the main device information and the secondary device information, specifically includes:
建立与目标主设备的网络连接,并获取所述目标主设备的主设备IP地址和主设备ID;Establish a network connection with the target master device, and obtain the master device IP address and master device ID of the target master device;
建立与目标副设备的网络连接,并获取所述目标副设备的副设备IP地址和副设备ID;Establishing a network connection with a target secondary device, and obtaining a secondary device IP address and a secondary device ID of the target secondary device;
根据所述主设备IP地址、所述主设备ID、所述副设备IP地址和所述副设备ID,控制所述目标主设备和所述目标副设备建立通信连接。According to the master device IP address, the master device ID, the slave device IP address and the slave device ID, the target master device and the target slave device are controlled to establish a communication connection.
其中,所述将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表,具体包括:The sending of the activation instruction input by the user to the target primary device and the target secondary device respectively, and receiving the primary configuration information table sent by the target primary device according to the activation instruction and the secondary configuration information table sent by the target secondary device according to the activation instruction specifically include:
获取用户输入的激活指令,将所述激活指令分别发送到所述目标主设备和目标副设备;Acquire an activation instruction input by a user, and send the activation instruction to the target primary device and the target secondary device respectively;
分别接收预先存储在所述目标主设备的主配置信息表和预先存储在所述目标副设备中的副配置信息表。A main configuration information table pre-stored in the target main device and a sub-configuration information table pre-stored in the target sub-device are received respectively.
其中,所述分别接收预先存储在所述目标主设备的主配置信息表和预先存储在所述目标副设备中的副配置信息表,之后还包括:The step of respectively receiving a main configuration information table pre-stored in the target main device and a sub-configuration information table pre-stored in the target sub-device further comprises:
对比所述主配置信息表和所述副配置信息表,若所述主配置信息表和所述副配置信息表不匹配,则生成第一预警信息,以提示用户修改所述主配置信息表或所述副配置信息表。The main configuration information table and the secondary configuration information table are compared. If the main configuration information table and the secondary configuration information table do not match, a first warning message is generated to prompt a user to modify the main configuration information table or the secondary configuration information table.
其中,所述将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,具体包括:The step of sending the encryption instruction in the master configuration information table to the target master device, receiving the target file sent by the target master device, and controlling the target master device to send the target file to the target slave device specifically includes:
获取用户的传输指令,根据所述传输指令确定存储在所述目标主设备中需要发送的传输文件;Obtaining a transmission instruction from a user, and determining a transmission file stored in the target host device that needs to be sent according to the transmission instruction;
将所述主配置信息表中的加密指令发送到所述目标主设备,控制所述目标主设备对所述传输文件进行加密处理,得到目标文件;Sending the encryption instruction in the master configuration information table to the target master device, controlling the target master device to encrypt the transmission file to obtain the target file;
将所述传输指令发送到所述目标主设备,控制所述目标主设备将所述目标文件发送到所述目标副设备。The transmission instruction is sent to the target master device, and the target master device is controlled to send the target file to the target slave device.
其中,所述将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果,具体包括:The sending of the decryption instruction in the secondary configuration information table to the target secondary device, controlling the target secondary device to perform decryption processing on the target file and evaluating the decryption processing process to obtain the decryption result specifically includes:
接收所述目标副设备发送的文件接收信息后,将所述副配置信息表的解密指令发送到所述目标副设备,其中,所述文件接收信息由所述目标副设备根据接收到的所述目标文件生成;After receiving the file receiving information sent by the target secondary device, sending the decryption instruction of the secondary configuration information table to the target secondary device, wherein the file receiving information is generated by the target secondary device according to the received target file;
控制所述目标副设备对所述目标文件进行解密处理,并接收所述目标副设备发送的解密时间和解密文件,其中,所述解密时间和所述解密文件由所述目标副设备对所述目标文件进行解密时生成;Controlling the target secondary device to decrypt the target file, and receiving a decryption time and a decryption file sent by the target secondary device, wherein the decryption time and the decryption file are generated when the target secondary device decrypts the target file;
分析所述解密时间和所述解密文件,得到解密评分。The decryption time and the decrypted file are analyzed to obtain a decryption score.
其中,所述控制所述目标副设备对所述目标文件进行解密处理,并接收所述目标副设备发送的解密时间和解密文件,之后还包括:The step of controlling the target secondary device to decrypt the target file and receiving the decryption time and the decrypted file sent by the target secondary device further includes:
对比所述解密文件与所述传输文件,若所述解密文件与所述传输文件不一致,则生成第二预警信息。The decrypted file is compared with the transmission file, and if the decrypted file is inconsistent with the transmission file, a second warning message is generated.
本发明还提供一种计算机可读存储介质,其中,所述计算机可读存储介质存储有安全传输的测试程序,所述安全传输的测试程序被处理器执行时实现如上所述的安全传输的测试方法的步骤。The present invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores a secure transmission test program, and when the secure transmission test program is executed by a processor, the steps of the secure transmission test method as described above are implemented.
综上所述,本发明提供一种安全传输的测试方法及相关设备,所述方法包括:建立与目标主设备和目标副设备的网络连接,并获取所述目标主设备的主设备信息和所述目标副设备的副设备信息,并根据所述主设备信息和所述副设备信息,建立所述目标主设备和所述目标副设备的通信连接;将用户输入的激活指令分别发送到所述目标主设备和目标副设备,接收所述目标主设备根据所述激活指令发送的主配置信息表和所述目标副设备根据所述激活指令发送的副配置信息表;将所述主配置信息表中的加密指令发送给所述目标主设备,接收所述目标主设备发送的目标文件,并控制所述目标主设备将所述目标文件发送到所述目标副设备,其中,所述目标文件由所述目标主设备对已存储的传输文件进行加密处理得到;将所述副配置信息表中的解密指令发送到所述目标副设备,控制所述目标副设备对所述目标文件进行解密处理并评估解密处理过程,得到解密结果。本发明通过连接进行数据传输的两个设备,以控制指令的形式控制设备对传输文件进行加密、传输以及解密处理,并评估加解密的过程,在快速准确地完成对设备之间的安全测试基础上,保证了设备之间传输的安全性,并且也简化了安全测试的操作,使得用户使用起来更加方便,提升了用户的使用体验。In summary, the present invention provides a secure transmission testing method and related equipment, the method comprising: establishing a network connection with a target main device and a target secondary device, and obtaining the main device information of the target main device and the secondary device information of the target secondary device, and establishing a communication connection between the target main device and the target secondary device based on the main device information and the secondary device information; sending an activation instruction input by a user to the target main device and the target secondary device respectively, receiving a main configuration information table sent by the target main device according to the activation instruction and a secondary configuration information table sent by the target secondary device according to the activation instruction; sending an encryption instruction in the main configuration information table to the target main device, receiving a target file sent by the target main device, and controlling the target main device to send the target file to the target secondary device, wherein the target file is obtained by the target main device encrypting a stored transmission file; sending a decryption instruction in the secondary configuration information table to the target secondary device, controlling the target secondary device to decrypt the target file and evaluating the decryption process to obtain a decryption result. The present invention connects two devices performing data transmission, controls the devices to encrypt, transmit and decrypt transmission files in the form of control instructions, and evaluates the encryption and decryption process. On the basis of quickly and accurately completing the security test between the devices, the security of transmission between the devices is ensured, and the operation of the security test is also simplified, making it more convenient for users to use and improving the user experience.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者测试设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者测试设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者测试设备中还存在另外的相同要素。It should be noted that, in this article, the terms "include", "comprises" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article or test device including a series of elements includes not only those elements, but also includes other elements not explicitly listed, or also includes elements inherent to such process, method, article or test device. In the absence of further restrictions, an element defined by the sentence "comprises a ..." does not exclude the presence of other identical elements in the process, method, article or test device including the element.
当然,本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关硬件(如处理器,控制器等)来完成,所述的程序可存储于一计算机可读取的计算机可读存储介质中,所述程序在执行时可包括如上述各方法实施例的流程。其中所述的计算机可读存储介质可为存储器、磁碟、光盘等。Of course, those skilled in the art can understand that all or part of the processes in the above-mentioned embodiments can be implemented by instructing related hardware (such as a processor, a controller, etc.) through a computer program, and the program can be stored in a computer-readable storage medium that can be read by a computer, and the program can include the processes of the above-mentioned method embodiments when executed. The computer-readable storage medium can be a memory, a disk, an optical disk, etc.
应当理解的是,本发明的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本发明所附权利要求的保护范围。It should be understood that the application of the present invention is not limited to the above examples. For ordinary technicians in this field, improvements or changes can be made based on the above description. All these improvements and changes should fall within the scope of protection of the claims attached to the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411179183.8A CN118694688B (en) | 2024-08-27 | 2024-08-27 | Method, system and equipment for testing safe transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411179183.8A CN118694688B (en) | 2024-08-27 | 2024-08-27 | Method, system and equipment for testing safe transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118694688A true CN118694688A (en) | 2024-09-24 |
CN118694688B CN118694688B (en) | 2024-12-31 |
Family
ID=92772091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202411179183.8A Active CN118694688B (en) | 2024-08-27 | 2024-08-27 | Method, system and equipment for testing safe transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118694688B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100235635A1 (en) * | 2009-03-10 | 2010-09-16 | At&T Intellectual Property I, L.P. | Methods, Systems And Computer Program Products For Authenticating Computer Processing Devices And Transferring Both Encrypted And Unencrypted Data Therebetween |
CN107819650A (en) * | 2017-11-28 | 2018-03-20 | 中共中央办公厅电子科技学院 | Data safety method of testing and device |
CN110892695A (en) * | 2017-07-20 | 2020-03-17 | 西门子交通有限责任公司 | Method, device and computer program product for checking connection parameters of a password-protected communication connection during the establishment of a connection |
CN111475376A (en) * | 2020-03-25 | 2020-07-31 | 微民保险代理有限公司 | Method and device for processing test data, computer equipment and storage medium |
-
2024
- 2024-08-27 CN CN202411179183.8A patent/CN118694688B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100235635A1 (en) * | 2009-03-10 | 2010-09-16 | At&T Intellectual Property I, L.P. | Methods, Systems And Computer Program Products For Authenticating Computer Processing Devices And Transferring Both Encrypted And Unencrypted Data Therebetween |
CN110892695A (en) * | 2017-07-20 | 2020-03-17 | 西门子交通有限责任公司 | Method, device and computer program product for checking connection parameters of a password-protected communication connection during the establishment of a connection |
CN107819650A (en) * | 2017-11-28 | 2018-03-20 | 中共中央办公厅电子科技学院 | Data safety method of testing and device |
CN111475376A (en) * | 2020-03-25 | 2020-07-31 | 微民保险代理有限公司 | Method and device for processing test data, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN118694688B (en) | 2024-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110719166A (en) | Chip burning method, chip burning device, chip burning system and storage medium | |
US10432613B2 (en) | HTTPS enabled client tool | |
CN112838951B (en) | Operation and maintenance method, device and system of terminal equipment and storage medium | |
CN110519115A (en) | Gateway interface test method, terminal device, storage medium and device | |
CN111581095A (en) | A self-starting USB debugging method, device and storage medium based on barrier-free service | |
KR102008083B1 (en) | Method and system for controlling use of medical detection apparatus and medical detection apparatus | |
CN106850503A (en) | One kind is exempted to log in identity identifying method and device | |
CN107688536A (en) | A kind of method and device for obtaining terminal system daily record | |
TW201626267A (en) | Detection system and method for static detection application, and computer program product | |
CN107608700A (en) | A kind of update method, device and the medium of FPGA firmwares | |
CN106559223A (en) | Application signature method and device | |
CN105530309B (en) | A kind of Internet of Things control platform and its implementation | |
CN110505116A (en) | Electricity consumption information collection system, penetration testing method, device, and readable storage medium | |
CN106506764B (en) | multi-mobile-phone remote control system and method | |
CN106951787A (en) | A kind of BIOS configuring management methods and device | |
CN102664887A (en) | Input information protecting method, device and system | |
JP5959070B2 (en) | Information processing apparatus, terminal, program and method | |
CN118467322A (en) | Password testing system, method, device and storage medium for vehicle-mounted terminal | |
CN118694688A (en) | A test method, system and test equipment for secure transmission | |
EP3316171A1 (en) | Apparatus and method for dynamic binary analysis on hardware board | |
CN101645893A (en) | Network trading method, device and system | |
CN113037526A (en) | Security detection method, terminal, system and storage medium | |
CN111680336A (en) | Firmware safety protection method, device, system and equipment | |
JP4687912B2 (en) | Maintenance system, connection device, maintenance method and maintenance support method | |
CN109344096A (en) | A kind of method, apparatus, equipment and storage medium connecting external equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |