CN115580866B - Wireless communication data synchronous encryption system - Google Patents
Wireless communication data synchronous encryption system Download PDFInfo
- Publication number
- CN115580866B CN115580866B CN202211561930.5A CN202211561930A CN115580866B CN 115580866 B CN115580866 B CN 115580866B CN 202211561930 A CN202211561930 A CN 202211561930A CN 115580866 B CN115580866 B CN 115580866B
- Authority
- CN
- China
- Prior art keywords
- encryption
- wireless communication
- bit data
- user terminal
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to a wireless communication data synchronous encryption system, comprising: each wireless network card is respectively arranged in each user access terminal and is used for wirelessly connecting the same wireless router; the system comprises a habit detection mechanism, a behavior detection mechanism and a behavior detection mechanism, wherein the habit detection mechanism is used for sending an encryption trigger signal when the current webpage access habit of a certain user terminal is wrong with a user belonging to the user terminal; the environment analysis mechanism is used for sending an enhanced encryption signal when a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal; and the communication control device is used for executing synchronous encryption control of the wireless router and the wireless network card at the same security level. The wireless communication data synchronous encryption system is safe and reliable and stable in transmission. The method can adopt an automatic setting mode to carry out synchronous key setting on each wireless communication facility, and can self-adaptively select keys with different security levels to carry out encryption processing according to the change of the specific working environment of each wireless communication terminal.
Description
Technical Field
The invention relates to the field of wireless communication, in particular to a wireless communication data synchronous encryption system.
Background
Data security for wireless routers is particularly noteworthy as one of the key facilities for performing wireless communications.
For example, the invention with application publication No. CN107454589A discloses "a method and system for a wireless router and data secure storage" including: s1, generating different encryption algorithms and corresponding keys according to a plurality of wireless terminals connected with a wireless router; s2, when an instruction of transmitting data by the wireless terminal is obtained, starting an encryption algorithm of the wireless terminal, storing the encrypted data in a storage space, and simultaneously sending a corresponding secret key to the wireless terminal; and S3, judging whether the key of the wireless terminal is matched with the decryption algorithm or not when the instruction for reading the data by the wireless terminal is obtained, and if so, successfully decrypting. The invention adopts a TPM encryption method to realize the purpose that the stored data is safer and is not easy to be cracked.
In a wireless network, an antenna can achieve the purpose of enhancing wireless signals, and can be understood as an amplifier of the wireless signals. The antenna has different radiation or receiving capability to different directions in space, and the antenna has omnidirectional and directional characteristics according to the different directivities. An omnidirectional antenna: on a horizontal plane, an antenna with the maximum radiation and reception direction is called an omnidirectional antenna; the omnidirectional antenna is non-directional, so that the omnidirectional antenna is used in a center station for point-to-multipoint communication; such an antenna may be selected, for example, if a wireless connection is desired between two adjacent buildings. Directional antenna: an antenna having one or more directions of maximum radiation and reception capability is called a directional antenna; the directional antenna has concentrated energy, the gain is higher than that of an omnidirectional antenna, and the directional antenna is suitable for remote point-to-point communication and has stronger anti-jamming capability due to directivity; such antennas may be selected, for example, when a wireless connection needs to be established across several buildings in a cell.
Generally, a wireless router is matched with a wireless network card supporting an encryption function, so that data transmission can be encrypted, and information of wireless communication is difficult to steal midway by others. Each wireless router and wireless station must use the same key to communicate. Encryption is optional, however, most wireless routers default to disabling encryption. Encryption may have an impact on transmission efficiency.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a wireless communication data synchronous encryption system, which can adopt an automatically set mode to perform synchronous key setting on a wireless router and each wireless communication terminal connected to the wireless router, and particularly can adaptively select keys with different security levels to perform encryption processing according to the change of the specific working environment of each wireless communication terminal, thereby realizing the dynamic balance of transmission efficiency and transmission security.
According to an aspect of the present invention, there is provided a wireless communication data synchronous encryption system, the system comprising:
each wireless network card is respectively arranged in each user access terminal and is used for connecting the same wireless router through a wireless communication network;
the system comprises a habit detection mechanism and a data processing mechanism, wherein the habit detection mechanism is used for sending an encryption trigger signal when detecting that the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal in each user access terminal connected with the same wireless router;
the system comprises an environment analysis mechanism, a wireless router and a data processing mechanism, wherein the environment analysis mechanism is used for sending an enhanced encryption signal when detecting that a specific user belonging to a user terminal is absent in the current working environment of the user terminal in each user access terminal connected with the same wireless router;
a communication control device, which is arranged in the wireless router, is connected with the habit detection mechanism, the environment analysis mechanism and each wireless network card respectively, and is used for starting a set encryption mode when receiving an encryption trigger signal and exiting the set encryption mode when receiving an encryption stop signal;
the communication control device synchronously controls the wireless router and each wireless network card so as to synchronize the encryption modes of the wireless router and each wireless network card;
wherein, the set encryption mode is as follows: encrypting the wireless communication data received by the wireless router in real time by using bit data with a set length randomly generated by the wireless router so as to send the wireless communication data after being encrypted in real time;
the communication control device is further used for carrying out real-time encryption on the wireless communication data received by the wireless router by replacing the bit data with the default length with the bit data with the lengthened length when receiving the enhanced encryption signal;
wherein the communication control device is further configured to increase an update rate of the lengthened bit data upon receiving the enhanced encryption signal.
The wireless communication data synchronous encryption system is safe and reliable and stable in transmission. The method can adopt an automatic setting mode to carry out synchronous key setting on each wireless communication facility, and can adaptively select keys with different security levels for encryption processing according to the change of the specific working environment of each wireless communication terminal.
Drawings
Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment a of the present invention.
Fig. 2 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment B of the present invention.
Fig. 3 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment C of the present invention.
Detailed Description
An embodiment of the wireless communication data synchronous encryption system of the present invention will be described in detail below with reference to the accompanying drawings.
Example A
Fig. 1 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment a of the present invention, where the system includes:
each wireless network card is respectively arranged in each user access terminal and is used for connecting the same wireless router through a wireless communication network;
for example, the operating performance of the wireless networks may be different or the same, for example, there may be a difference in data throughput per unit time and the maximum number of wireless communication components that can be mounted;
wherein connecting the same wireless router through the wireless communication network comprises: connecting the same wireless router through a time division duplex communication network or a frequency division duplex communication network;
the system comprises a habit detection mechanism, a first encryption triggering mechanism and a second encryption triggering mechanism, wherein the habit detection mechanism is used for sending an encryption triggering signal when detecting that the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal in each user access terminal connected with the same wireless router;
the system comprises an environment analysis mechanism, a wireless router and a data processing mechanism, wherein the environment analysis mechanism is used for sending an enhanced encryption signal when detecting that a specific user belonging to a user terminal is absent in the current working environment of the user terminal in each user access terminal connected with the same wireless router;
a communication control device, which is arranged in the wireless router, is connected with the habit detection mechanism, the environment analysis mechanism and each wireless network card respectively, and is used for starting a set encryption mode when receiving an encryption trigger signal and exiting the set encryption mode when receiving an encryption stop signal;
the communication control device synchronously controls the wireless router and each wireless network card so as to synchronize the encryption modes of the wireless router and each wireless network card;
wherein, the set encryption mode is as follows: encrypting the wireless communication data received by the wireless router in real time by using bit data with a set length randomly generated by the wireless router so as to send the wireless communication data after being encrypted in real time;
the communication control device is further used for carrying out real-time encryption on the wireless communication data received by the wireless router by replacing the bit data with the default length with the bit data with the lengthened length when receiving the enhanced encryption signal;
wherein the communication control device is further configured to increase an update rate of the lengthened bit data upon receiving the enhanced encryption signal.
Example B
Fig. 2 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment B of the present invention.
As shown in fig. 2, the wireless communication data synchronous encryption system of embodiment B in fig. 2 may include:
each wireless network card is respectively arranged in each user access terminal and is used for connecting the same wireless router through a wireless communication network;
the system comprises a habit detection mechanism, a first encryption triggering mechanism and a second encryption triggering mechanism, wherein the habit detection mechanism is used for sending an encryption triggering signal when detecting that the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal in each user access terminal connected with the same wireless router;
the environment analysis mechanism is used for sending an enhanced encryption signal when detecting that a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal in each user access terminal connected with the same wireless router;
a communication control device, which is arranged in the wireless router, is connected with the habit detection mechanism, the environment analysis mechanism and each wireless network card respectively, and is used for starting a set encryption mode when receiving an encryption trigger signal and exiting the set encryption mode when receiving an encryption stop signal;
the secret key production device is arranged in the wireless router, is connected with the communication control device and is used for randomly generating bit data with set length to encrypt the wireless communication data received by the wireless router in real time so as to send the wireless communication data after being encrypted in real time;
when the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal, sending an encryption trigger signal comprises the following steps: acquiring historical webpage access habits of the user belonging to the user terminal according to the webpage access contents which are historically preferred by the user belonging to the user terminal;
wherein, when the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of the user belonging to the user terminal, the sending of the encryption trigger signal further comprises: and acquiring historical webpage access habits of the user belonging to the user terminal according to the access sequence of each webpage which is historically preferred by the user belonging to the user terminal.
Example C
Fig. 3 is an internal structural diagram of a wireless communication data synchronous encryption system according to embodiment C of the present invention.
As shown in fig. 3, the wireless communication data synchronous encryption system of embodiment C in fig. 3 may include:
each wireless network card is respectively arranged in each user access terminal and is used for connecting the same wireless router through a wireless communication network;
the system comprises a habit detection mechanism and a data processing mechanism, wherein the habit detection mechanism is used for sending an encryption trigger signal when detecting that the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal in each user access terminal connected with the same wireless router;
the environment analysis mechanism is used for sending an enhanced encryption signal when detecting that a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal in each user access terminal connected with the same wireless router;
a communication control device, which is arranged in the wireless router, is connected with the habit detection mechanism, the environment analysis mechanism and each wireless network card respectively, and is used for starting a set encryption mode when receiving an encryption trigger signal and exiting the set encryption mode when receiving an encryption stop signal;
an information storage device, provided in the wireless router and connected to the communication control device, for storing the randomly generated bit data of the set length and deleting the old randomly generated bit data of the set length when new randomly generated bit data of the set length is generated;
a random selection device connected with the information storage device and used for providing random selection service of storage positions for the information storage device;
the method comprises the following steps of carrying out encryption storage on bit data with a set length which is randomly generated by adopting an encryption storage mode;
wherein storing the randomly generated bit data of the set length and deleting the old randomly generated bit data of the set length when the new randomly generated bit data of the set length is generated comprises: each storage position corresponding to the randomly generated bit data with the set length is randomly selected;
wherein the information storage device and the random selection device are both located within the wireless router.
In a wireless communication data synchronous encryption system according to various embodiments of the present invention:
the environment analysis mechanism is also used for sending a conventional encryption signal when detecting that a specific user belonging to the user terminal is absent in the current working environment of a certain user terminal in each user access terminal connected with the same wireless router;
the communication control device is further used for encrypting the wireless communication data received by the wireless router in real time by using the bit data with default length when the regular encryption signal is received, and simultaneously recovering the updating rate of the bit data so that the updating rate is smaller than that of the bit data with lengthened length.
And in a wireless communication data synchronous encryption system according to various embodiments of the present invention:
the habit detection mechanism is also used for sending out an encryption suspension signal when the current webpage access habit of a certain user terminal does not have a mismatch with the historical webpage access habit of the user belonging to the user terminal in each user access terminal;
the environment analysis mechanism is also connected with the habit detection mechanism and is used for entering a working mode when receiving the encryption trigger signal;
wherein the environment analysis mechanism is further configured to exit the operating mode to enter a sleep mode upon receiving the encryption suspend signal.
And in a wireless communication data synchronous encryption system according to various embodiments of the present invention:
the communication control device is further configured to, when receiving the enhanced encryption signal, encrypt, in real time, the wireless communication data received by the wireless router by replacing the bit data of the default length with the bit data of the lengthened length, including: the lengthened length is 256 bits, and the default length is 64 bits;
wherein the communication control device is further configured to encrypt, in real time, the wireless communication data received by the wireless router using the bit data of the default length when the normal encryption signal is received, and the recovering the update rate of the bit data so that the update rate is smaller than the update rate of the extended length bit data includes: the update rate of the recovered bit data is 4 times per hour;
wherein the communication control device is further configured to encrypt, in real time, the wireless communication data received by the wireless router using the bit data of the default length when the normal encryption signal is received, and to restore the update rate of the bit data so that the update rate is smaller than the update rate of the extended length bit data, further comprising: the update rate of the extended length bit data is 12 times per hour.
In addition, in the system for encrypting data synchronously in wireless communication, the sending of the enhanced encryption signal when detecting that there is a lack of a specific user belonging to a certain user terminal in the current working environment of the user terminal in each user access terminal connected to the same wireless router comprises: aiming at a certain user access terminal, adopting a full-color camera mechanism arranged on the user access terminal to capture an image of a scene around the user access terminal so as to obtain a routing scene image;
wherein, when detecting that a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal in each user access terminal connected to the same wireless router, the sending the enhanced encryption signal further comprises: aiming at a certain user access terminal, when a human body contour of a specific user belonging to the user terminal exists in a corresponding routing scene image, judging that the specific user belonging to the user terminal does not lack in the current working environment of the user terminal;
wherein, when detecting that a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal in each user access terminal connected to the same wireless router, the sending the enhanced encryption signal further comprises: and for a certain user access terminal, when the body contour of a specific user belonging to the user terminal does not exist in the corresponding routing scene image, judging that the specific user belonging to the user terminal is absent in the current working environment of the user terminal.
It can be seen that the present invention has at least the following significant and substantive features:
firstly, determining whether synchronous encryption control needs to be executed on the wireless router and each user terminal according to the working environment of each user terminal in wireless communication with the same wireless router so as to give consideration to both wireless communication efficiency and wireless data transmission safety;
secondly, in the synchronous encryption control executed on the wireless router and each user terminal, when the current user access habit of a certain user terminal is wrong with the historical access habit of the user to which the user terminal belongs in each user terminal in wireless communication with the same wireless router, judging that the synchronous encryption control needs to be executed;
thirdly, refining synchronous encryption control executed on the wireless router and each user terminal, and when the current user access habit of a certain user terminal is mismatched with the historical access habit of a user to which the user terminal belongs in each user terminal in wireless communication with the same wireless router, and a specific user belonging to the certain user terminal does not exist in the current working environment of the certain user terminal, improving the encryption level of synchronous encryption;
and finally, in the encryption control of wireless communication data with improved encryption level, the key length is lengthened and the key updating rate is accelerated.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the scope or spirit of the invention. It is to be understood, therefore, that the above-described embodiments are illustrative only and not limiting. Since the scope of the present invention is defined by the claims, rather than the foregoing description, any changes and modifications that fall within the metes and bounds of the claims, or equivalence of such metes and bounds are therefore intended to be embraced by the claims.
Claims (9)
1. A system for synchronized encryption of wireless communication data, the system comprising:
each wireless network card is respectively arranged in each user access terminal and is used for connecting the same wireless router through a wireless communication network;
the system comprises a habit detection mechanism and a data processing mechanism, wherein the habit detection mechanism is used for sending an encryption trigger signal when detecting that the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal in each user access terminal connected with the same wireless router;
the environment analysis mechanism is used for sending an enhanced encryption signal when detecting that a specific user belonging to a certain user terminal is absent in the current working environment of the user terminal in each user access terminal connected with the same wireless router;
a communication control device, which is arranged in the wireless router, is connected with the habit detection mechanism, the environment analysis mechanism and each wireless network card respectively, and is used for starting a set encryption mode when receiving an encryption trigger signal and exiting the set encryption mode when receiving an encryption stop signal;
the communication control device synchronously controls the wireless router and each wireless network card so as to synchronize the encryption modes of the wireless router and each wireless network card;
wherein, the set encryption mode is as follows: encrypting the wireless communication data received by the wireless router in real time by using bit data with a set length randomly generated by the wireless router so as to send the wireless communication data after being encrypted in real time;
the communication control device is further configured to encrypt, in real time, the wireless communication data received by the wireless router by replacing the bit data of the default length with the bit data of the extended length when receiving the enhanced encryption signal, where the extended length is 256 bits, and the default length is 64 bits;
wherein the communication control device is further configured to increase an update rate of the lengthened bit data upon receiving the enhanced encryption signal.
2. The system for synchronized encryption of wireless communication data of claim 1, wherein the system further comprises:
the secret key production device is arranged in the wireless router, is connected with the communication control device and is used for randomly generating bit data with set length to encrypt the wireless communication data received by the wireless router in real time so as to send the wireless communication data after being encrypted in real time;
when the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of a user belonging to the user terminal, the step of sending out an encryption trigger signal comprises the following steps: acquiring historical webpage access habits of the user belonging to the user terminal according to the webpage access contents which are historically preferred by the user belonging to the user terminal;
wherein, when the current webpage access habit of a certain user terminal is wrong with the historical webpage access habit of the user belonging to the user terminal, the sending of the encryption trigger signal further comprises: and acquiring historical webpage access habits of the user belonging to the user terminal according to the access sequence of each webpage which is historically preferred by the user belonging to the user terminal.
3. The system for synchronized encryption of wireless communication data of claim 1, further comprising:
an information storage device, provided in the wireless router and connected to the communication control device, for storing the randomly generated bit data of the set length and deleting the old randomly generated bit data of the set length when new randomly generated bit data of the set length is generated;
a random selection device connected with the information storage device and used for providing random selection service of storage positions for the information storage device;
the method comprises the following steps of carrying out encryption storage on bit data with a set length which is randomly generated by adopting an encryption storage mode;
wherein storing the randomly generated bit data of the set length and deleting the old randomly generated bit data of the set length when the new randomly generated bit data of the set length is generated comprises: each storage position corresponding to the randomly generated bit data with the set length is randomly selected;
wherein the information storage device and the random selection device are both located within the wireless router.
4. A system for synchronized encryption of wireless communication data according to any of claims 1-3, wherein:
the environment analysis mechanism is also used for sending out a conventional encryption signal when detecting that a specific user belonging to the user terminal is absent in the current working environment of a certain user terminal in each user access terminal connected with the same wireless router.
5. The wireless communication data synchronized encryption system of claim 4, wherein:
the communication control device is further configured to encrypt the wireless communication data received by the wireless router in real time by using the bit data of the default length when receiving the normal encryption signal, and to restore the update rate of the bit data so that the update rate is smaller than the update rate of the extended length bit data.
6. The wireless communication data synchronization encryption system of any one of claims 1-3, wherein:
the habit detection mechanism is also used for sending out an encryption suspension signal when the current webpage access habit of a certain user terminal does not have a mismatch with the historical webpage access habit of the user belonging to the user terminal in each user access terminal.
7. The wireless communication data synchronized encryption system of claim 6, wherein:
the environment analysis mechanism is also connected with the habit detection mechanism and is used for entering a working mode when the encryption trigger signal is received;
wherein the environment analysis mechanism is further configured to exit the operating mode to enter a sleep mode upon receiving the encryption suspend signal.
8. The wireless communication data synchronous encryption system of claims 1-3, wherein:
the communication control device is further configured to encrypt, in real time, the wireless communication data received by the wireless router using the bit data of the default length when the regular encryption signal is received, and the restoring the update rate of the bit data such that the update rate is less than the update rate of the extended length of the bit data includes: the update rate of the recovered bit data is 4 times per hour.
9. The wireless communication data synchronized encryption system of claim 8, wherein:
the communication control device is further configured to encrypt, in real time, the wireless communication data received by the wireless router using the bit data of the default length when the regular encryption signal is received, and to restore the update rate of the bit data so that the update rate is smaller than the update rate of the extended length bit data, further comprising: the update rate of the extended length bit data is 12 times per hour.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211561930.5A CN115580866B (en) | 2022-12-07 | 2022-12-07 | Wireless communication data synchronous encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211561930.5A CN115580866B (en) | 2022-12-07 | 2022-12-07 | Wireless communication data synchronous encryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115580866A CN115580866A (en) | 2023-01-06 |
CN115580866B true CN115580866B (en) | 2023-03-17 |
Family
ID=84590281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211561930.5A Active CN115580866B (en) | 2022-12-07 | 2022-12-07 | Wireless communication data synchronous encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115580866B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454589A (en) * | 2017-07-03 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of wireless router, the method and system of data safety storage |
CN107454590A (en) * | 2017-07-26 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of data ciphering method, decryption method and wireless router |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8005217B2 (en) * | 2006-02-14 | 2011-08-23 | Novatel Wireless, Inc. | Method and apparatus for configuring nodes in a wireless network |
CN103338448A (en) * | 2013-06-07 | 2013-10-02 | 国家电网公司 | Wireless local area network security communication method based on quantum key distribution |
US10555170B2 (en) * | 2015-09-04 | 2020-02-04 | Huawei Technologies Co., Ltd. | Method and apparatus for authentication of wireless devices |
EP4133397A4 (en) * | 2020-04-09 | 2024-04-10 | Nuts Holdings, LLC | Nuts: flexible hierarchy object graphs |
CN113194466A (en) * | 2021-04-23 | 2021-07-30 | 哈尔滨理工大学 | Hybrid key system and method based on wireless channel characteristic simulation |
-
2022
- 2022-12-07 CN CN202211561930.5A patent/CN115580866B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454589A (en) * | 2017-07-03 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of wireless router, the method and system of data safety storage |
CN107454590A (en) * | 2017-07-26 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of data ciphering method, decryption method and wireless router |
Also Published As
Publication number | Publication date |
---|---|
CN115580866A (en) | 2023-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huo et al. | Jamming strategies for physical layer security | |
Hu et al. | Covert transmission with a self-sustained relay | |
US8336084B2 (en) | Communication using multiple apparatus identities | |
US9131292B2 (en) | Wireless microphone system | |
US20110093712A1 (en) | Communication device supporting pairing | |
KR101880493B1 (en) | Authentication method of wireless mesh network | |
CN110730452B (en) | Performance analysis method for joint relay and interference selection scheme in wireless communication system | |
US20070192841A1 (en) | Mutual authentication apparatus and method | |
CN101164315A (en) | System and method for utilizing a wireless communication protocol in a communications network | |
JPH05336108A (en) | Radio communication system | |
KR20090124909A (en) | Wireless communication system, wireless communication device, and disconnection method thereof | |
CN100583741C (en) | Radio communication system | |
US11329805B2 (en) | First vehicle-side terminal, method for operating the first terminal, second vehicle-side terminal and method for operating the second vehicle-side terminal | |
CN105307160A (en) | Data transmission method and device by use of Wi-Fi network | |
KR100796525B1 (en) | System for sharing Subscriber Indentification Module information of mobile communication terminal and control method thereof | |
US20100042844A1 (en) | Method, base station, relay station and relay communication system for implementing message authentication | |
US7293289B1 (en) | Apparatus, method and computer program product for detection of a security breach in a network | |
EP4117323A1 (en) | Method and system for data transmission, chip, electronic device, and computer readable storage medium | |
CN113613245A (en) | Method and apparatus for managing communication channels | |
Abdelsalam et al. | Physical layer security in satellite communication: State-of-the-art and open problems | |
CN115580866B (en) | Wireless communication data synchronous encryption system | |
Pasanen et al. | New efficient rf fingerprint-based security solution for bluetooth secure simple pairing | |
US20200146088A1 (en) | Secure iv recovery in bluetooth sig mesh networks | |
US8121141B2 (en) | Confidential transmission of data by change of frequency in a telecommunications network | |
Caparra et al. | 14 Wireless Physical-Layer Authentication for the Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |