A method of secure data transmission based on wireless network

A technology of data security and transmission method, applied in wireless communication, security devices, electrical components, etc., can solve problems such as dependence and achieve the effect of data security transmission

Active Publication Date: 2016-01-20
XIAMEN YAXON NETWORKS CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This technology has a disadvantage: it is necessary to pre-set a non-repeatable master key to each device, and subsequent secure data transmission methods are highly dependent on this master key
The problem to improve this shortcoming is: How to securely transmit data between the system side and the device side without presetting the non-repeatable master key to the device side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of secure data transmission based on wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 As shown, a wireless network-based data security transmission method of the present invention mainly includes a database, a device end and a system end;

[0020] The database has data storage and retrieval functions, and is responsible for saving the device identification information of each device;

[0021] The device end has a wireless network communication function, and is responsible for securely transmitting user data to the system end through the wireless network, and is also responsible for parsing and processing encrypted data from the system end;

[0022] The system end is connected to the database, has network communication functions, and is responsible for providing an interface for users to register device identification, etc., and is responsible for parsing and processing encrypted data from the device end, and securely transmitting the system end data that needs to be delivered to the corresponding device side.

[0023] Specifically incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is a wireless network-based data security transmission method. A pair of key factors and a set of key sets are respectively set at the system end and the device end. When the system end communicates with the device end, the sender first calculates the data to be sent Then calculate an authentication ID through the key factor and device identification, and finally randomly select a key from the key set to encrypt the data to be sent, and send the encrypted data and the key code used After receiving the data, the receiver obtains the corresponding key from the key set through key encoding to decrypt the data, calculates the authentication ID through the device identifier and key factor, and judges whether it is consistent with the sent authentication ID. Calculate whether the checksum is correct, and finally realize the safe transmission of data, make full use of the device identification, integrate dynamic identity authentication, data verification and transmission encryption, which can not only ensure the safe communication of data, but also do not need to pre-set non-repeatable master key into each device.

Description

technical field [0001] The invention relates to a wireless network-based data security transmission method, in particular to data transmission between a wireless network communication device end and a system end. Background technique [0002] Establishing an effective wireless network data transmission system is a key technology in wireless network data security transmission, and it is also an effective means to solve enterprise mobile applications such as: fast moving consumer goods industry business personnel management mobile CRM system, sensitive business data security transmission. [0003] At present, the secure transmission of wireless network data generally pre-sets a non-repeatable master key to each device end, and then uses the master key to perform identity authorization on the system end and the device end, and then uses the master key combined with random numbers to generate a session key , and use the master key to encrypt and decrypt the session key and autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/041H04W12/0431
Inventor 韩震华余建成洪志新张皓
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products