A method of protecting user behavior privacy based on channel interference

A channel interference and channel technology, applied in wireless communication, transmission systems, electrical components, etc., can solve problems such as information theft, and achieve the effect of resisting attackers' behavior of identifying user privacy, protection effectiveness, and good results

Inactive Publication Date: 2019-07-05
NORTHWEST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem of information being stolen due to the presence of an attacker’s wireless router in the surrounding environment mentioned in the prior art, the purpose of the present invention is to provide a method for protecting user behavior privacy based on channel interference. The method of channel interference to resist WiFi attacks, in order to achieve the purpose of protecting user privacy behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of protecting user behavior privacy based on channel interference
  • A method of protecting user behavior privacy based on channel interference
  • A method of protecting user behavior privacy based on channel interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Existing communication systems regard channel interference as harmful and use various techniques to eliminate the interference. The existing research on wireless interference is divided into three categories: the first category is the research on the interference mechanism, this part of the research mainly focuses on the reasons for the interference phenomenon, and provides the basis for the following two types of research; the second type of research is on interference avoidance This part of the research is dedicated to finding an effective interference avoidance method; the third type of research is the research on the coexistence of interference. If the interference cannot be effectively avoided, the interference and the real data communication sender and receiver will have to share Spectrum resources, this part of the research is dedicated to how to improve the communication performance of the transceiver.

[0048] The present invention does the opposite, because th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for protecting user behavior privacy based on channel interference. The method finds out the channel of the attacker's wireless router by screening surrounding wireless signals, and then uses a secure wireless router to influence the attacker by switching channels. The wireless router causes packet loss in the data packets received by the attacker to achieve the purpose of protecting privacy. This solution proves from another angle that wireless signals may leak user privacy, and proposes a channel interference method to protect users' privacy behavior; at the same time, this method can be used to study how to reasonably allocate channels or bandwidth to avoid channel interference and make the communication system more efficient. Greater throughput.

Description

technical field [0001] The invention relates to a privacy protection technology in the Internet of Things, in particular to a method for protecting user privacy behavior based on channel interference. Background technique [0002] WiFi is an important part of the Internet of Things. In recent years, WiFi has been used for indoor positioning, target tracking, gesture recognition, key detection, lip language recognition, etc. However, while utilizing the WiFi technology, the potential safety hazard that the WiFi may also leak the user's privacy is often overlooked. [0003] For example, the WiHear system enables the disabled to interact with the device only through language instructions, allowing the device to do what he wants, which greatly facilitates the life of the disabled. Because the WiHear system can be implemented with the current wireless signal transmitter, when the WiHear system is used in some private places, such as a wireless router in a company meeting, the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04L29/06
CPCH04L63/1441H04W12/02
Inventor 房鼎益张洁汤战勇李蓉陈晓江龚晓庆陈峰叶贵鑫
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products