Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted security WiFi (Wireless Fidelity) router and data processing method thereof

A router and security technology, applied in the field of communication security, can solve problems such as trusted security risks, important service login token theft, WiFi routers cannot detect whether their own information has been tampered with by hackers, etc.

Inactive Publication Date: 2015-03-11
深圳市华威世纪科技股份有限公司
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The risks that have occurred in wired networks may be encountered after mobile devices are connected to WiFi, and because WiFi is not limited by physical ports, wireless network cards are turned on by default in most cases. Therefore, the security risks faced by WiFi are even Worse than a wired network
[0003] Public WiFi operated by the government may be invaded by hackers using the vulnerabilities of WiFi routers. When users access through terminals, the terminals are forced to visit phishing websites, resulting in leakage of important account information; browsing records during the online process, including information on Moments, etc., are peeped ;The hacker program attacks through ARP, and the network session is hijacked, leading to the theft of important service login tokens, and others posting microblogs with fake identities, etc., there are potential security risks
[0004] Existing WiFi routers cannot detect whether their own information has been tampered with by hackers, resulting in frequent criminal activities such as criminals using WiFi routers to carry out network theft and steal user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted security WiFi (Wireless Fidelity) router and data processing method thereof
  • Trusted security WiFi (Wireless Fidelity) router and data processing method thereof
  • Trusted security WiFi (Wireless Fidelity) router and data processing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] TCM (Trusted Cryptography Module, Trusted Cryptography Module) is a hardware module of a trusted computing platform, which provides identity and cryptographic computing functions for the trusted computing platform, and has a protected storage space. TCM adopts domestic encryption algorithms, and the involved cryptographic algorithms include: SM2 elliptic curve cryptographic algorithm, SMS4 symmetric cryptographic algorithm, SM3 cryptographic hash algorithm, HMAC message authentication code algorithm, and random number generator. TCM is a collection of hardware and firmware, which can be pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted security WiFi (Wireless Fidelity) router which comprises an integrity measurement module, a data matching module and an initialization module, wherein the integrity measurement module is used for acquiring a configuration file through a TCM (Terminal-to-Computer Multiplexer) when a start signal of the WiFi router is detected, and measuring the integrity of the configuration file; the data matching module is used for matching the calculation result of the integrity measurement with corresponding data which are saved in a security data area of the TCM in advance; the initialization module is used for initializing the system when the calculation result of the integrity measurement is matched with corresponding data which are saved in the security data area of the TCM in advance; if the calculation result is mismatched with the corresponding data, the start is failed; if information in the router is tempered by hacker, the calculation result of the integrity measurement is mismatched with corresponding data which are saved in the security data area of the TCM in advance, the start of the router is failed, and routing services to the outside are stopped, so that trusted security of the routing services is enhanced. In addition, the invention also provides a data processing method for the trusted security WiFi router.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a trusted secure WiFi router and a data processing method thereof. Background technique [0002] With the wide application of wireless networks, many wireless router products have appeared, such as WiFi routers, 3G routers, etc., which greatly facilitate the use of users. At the same time, the security risks in the wireless network environment itself also bring great challenges to wireless routers. The risks that have occurred in wired networks may be encountered after mobile devices are connected to WiFi, and because WiFi is not limited by physical ports, wireless network cards are turned on by default in most cases. Therefore, the security risks faced by WiFi are even More serious than wired network. [0003] Public WiFi operated by the government may be invaded by hackers using the vulnerabilities of WiFi routers. When users access through terminals, the terminals are f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/771H04L29/06H04L45/60
Inventor 陈德元高振铁
Owner 深圳市华威世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products