Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted and secure wifi router and data processing method thereof

A security data and router technology, applied in the field of communication security, can solve problems such as network session hijacking, theft, stealing user information, etc.

Inactive Publication Date: 2018-09-14
深圳市华威世纪科技股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The risks that have occurred in wired networks may be encountered after mobile devices are connected to WiFi, and because WiFi is not limited by physical ports, wireless network cards are turned on by default in most cases. Therefore, the security risks faced by WiFi are even Worse than a wired network
[0003] Public WiFi operated by the government may be invaded by hackers using the vulnerabilities of WiFi routers. When users access through terminals, the terminals are forced to visit phishing websites, resulting in leakage of important account information; browsing records during the online process, including information on Moments, etc., are peeped ;The hacker program attacks through ARP, and the network session is hijacked, leading to the theft of important service login tokens, and others posting microblogs with fake identities, etc., there are potential security risks
[0004] Existing WiFi routers cannot detect whether their own information has been tampered with by hackers, resulting in frequent criminal activities such as criminals using WiFi routers to carry out network theft and steal user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted and secure wifi router and data processing method thereof
  • Trusted and secure wifi router and data processing method thereof
  • Trusted and secure wifi router and data processing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] TCM (Trusted Cryptography Module, Trusted Cryptography Module) is a hardware module of a trusted computing platform, which provides identity and cryptographic computing functions for the trusted computing platform, and has a protected storage space. TCM adopts domestic encryption algorithms, and the involved cryptographic algorithms include: SM2 elliptic curve cryptographic algorithm, SMS4 symmetric cryptographic algorithm, SM3 cryptographic hash algorithm, HMAC message authentication code algorithm, and random number generator. TCM is a collection of hardware and firmware, which can be pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a trusted and secure WiFi router, comprising: an integrity measurement module, used to obtain a configuration file through a TCM when a start signal of the WiFi router is detected, and perform integrity measurement on the configuration file; a data matching module, used to To match the calculation result of the integrity metric with the corresponding data pre-saved in the security data area of ​​the TCM; the initialization module is used to match the calculation result of the integrity metric with the corresponding data pre-saved in the security data area of ​​the TCM, Initialize the system, if there is no match, the startup will fail. If the information of the router is tampered with by hackers, the calculation result of the integrity measurement of the configuration file does not match the corresponding data pre-saved in the security data area of ​​the TCM, the router fails to start, and the external routing service is stopped, thereby enhancing the reliability of the routing service. letter security. In addition, a trusted and secure WiFi router data processing method is also provided.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a trusted secure WiFi router and a data processing method thereof. Background technique [0002] With the wide application of wireless networks, many wireless router products have appeared, such as WiFi routers, 3G routers, etc., which greatly facilitate the use of users. At the same time, the security risks in the wireless network environment itself also bring great challenges to wireless routers. The risks that have occurred in wired networks may be encountered after mobile devices are connected to WiFi, and because WiFi is not limited by physical ports, wireless network cards are turned on by default in most cases. Therefore, the security risks faced by WiFi are even More serious than wired network. [0003] Public WiFi operated by the government may be invaded by hackers using the vulnerabilities of WiFi routers. When users access through terminals, the terminals are f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/771H04L29/06H04L45/60
Inventor 陈德元高振铁
Owner 深圳市华威世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products