Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information secure transmission method, network access method and corresponding terminals

A transmission method and information security technology, which is applied in the field of intelligent terminals and their network access, can solve the problems of insufficient flexibility and intelligence of information transmission technology, paralysis of the receiving end, and obtaining original information of data packets.

Active Publication Date: 2015-12-02
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason is that no matter whether the private key encryption based on symmetric encryption technology is used, or the public key encryption based on asymmetric encryption technology is used to encrypt the information to be transmitted, the key for encrypting the information to be transmitted is always fixed. Therefore, illegal Users can intercept the data packets generated during multiple transmissions for brute force cracking, or simulate the data packets of the sending end, launch a DDOS-like attack on the receiving end, paralyze the receiving end, and even cause other adjacent devices including WiFi routers to fail because of the need. Recognizing data frames suffers the same
[0006] On the other hand, in the current information transmission process, both the receiver and the sender need to abide by a fixed public or self-defined protocol. The sender cannot go beyond the established protocol and freely define the format of the information to be transmitted. Similarly, the receiver cannot flexibly analyze all information. Received data packets to obtain accurate original information, which shows the shortcomings of existing information transmission technology that is not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information secure transmission method, network access method and corresponding terminals
  • Information secure transmission method, network access method and corresponding terminals
  • Information secure transmission method, network access method and corresponding terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0107] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention mainly aims to provide a mobile terminal and an information secure transmission method adopted by the mobile terminal. The information secure transmission method comprises the steps of acquiring information to be transmitted; constructing a data message, wherein the data message is enabled to contain a secondary ciphertext and a secondary key, the secondary ciphertext is formed in a mode that the information to be transmitted is encrypted by a primary key so as to form primary ciphertext and that the primary ciphertext is encrypted by the secondary key containing a random factor so as to form the secondary ciphertext; and sending the data message. Correspondingly, the invention further provides an intelligent terminal and a network access method thereof. According to the invention, an effect of communication security of a fast connection technology realized on the basis of an IEEE 802.11 protocol is further strengthened through improving content representation loaded by the message by the aid of password technologies.

Description

technical field [0001] The present invention relates to information security technology, in particular to a mobile terminal and an information security transmission method adopted therefor, and at the same time relates to an intelligent terminal and a network access method thereof. Background technique [0002] The control technology for intelligent terminal access to the target network is based on the technology specified by the IEEE802.11 protocol, and has been vigorously developed, and its application is becoming more and more common. Based on AD-Hoc and WiFiDirect technology, the direct connection relationship between the control terminal (sending terminal) and the receiving terminal is established, and then the configuration information for accessing the target network is transmitted, including the target network’s service set identifier and login password. The traditional direct connection method is inefficient due to the complex handshaking and switching process betw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0442H04L63/0478H04L63/0815H04L63/083H04L65/611
Inventor 刘敏叶剑杰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products