Wireless network security transmission method, system and equipment

A wireless network and secure transmission technology, applied in the field of communication, can solve the problem of principle-dependent security services, etc.

Active Publication Date: 2008-05-21
HUAZHONG UNIV OF SCI & TECH +1
View PDF2 Cites 100 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, in the process of realizing the present invention, the inventors found that there are at least the following problems in the prior art: in the prior art, improvement methods are proposed based on the security mechanism of the wireless network itself, although the end-to-end The encryption mechanism or authentication mechanism is more flexible, but its principle still depends on the security services provided by the network service provider, and does not fundamentally solve its security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network security transmission method, system and equipment
  • Wireless network security transmission method, system and equipment
  • Wireless network security transmission method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the embodiment of the present invention, the end-to-end secure transmission architecture of the wireless communication network is shown in FIG. 1 , including: a CA (Certificate Authority, authentication and authorization) center, multiple mobile terminals, and a wireless communication network short message gateway. In order to describe clearly, the mobile terminals are divided into mobile sending terminals and mobile receiving terminals below. The mobile sending terminals are used to encrypt the data to be sent, and send them to the mobile receiving terminals through the SMS gateway of the wireless communication network; the mobile receiving terminals encrypt the encrypted data. Decrypt to obtain plaintext data.

[0043] Among them, the CA center only assigns the private key associated with the mobile terminal identity and other system security parameters to the mobile terminal used by the user when the user registers, and records the private key and security paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless network sending terminal secure transmission method, comprising the following steps: generating a receiving terminal public key according to the receiving terminal identifier; using the receiving terminal public key to encrypt a session key, using the session key to be transmitted The data in the information is encrypted and sent to the receiving terminal, so that the receiving terminal decodes to obtain the data. The invention discloses a wireless network receiving terminal safe transmission method, an authentication center, a receiver device and a sender device. In the embodiment of the present invention, a set of key system is established, so that the mobile terminals participating in this session can obtain the public key information of the other party without information interaction, but directly according to the identification information of each mobile terminal participating in this communication. Get its public key information.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a wireless network security transmission method, system and equipment. Background technique [0002] In 2005, the International Telecommunication Union (International Telecommunication Union) released the ITU-T (International Telecommunication Union Telecommunication Standardization Group) X.805 specification, which proposed access control, authentication, and non-repudiation (receivers determine whether to receive) for end-to-end network systems. The destination terminal of the message is this terminal, not other terminals), data confidentiality, communication security, data integrity, availability, and privacy. At present, it is difficult for wireless communication networks to fully meet the special security requirements of mobile data services. In particular, due to the particularity of some data services, sensitive information (such as keys, user sensitive info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04Q7/38H04L9/32H04W12/03H04W12/0431H04W12/106
Inventor 胡汉平李曦王祖喜罗耀平马勇
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products