Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure communication system, method and device

A security communication and key technology, applied in the field of security authentication and security communication, can solve the problems of deceiving the receiver, property loss of the system owner, system hijacking, etc.

Active Publication Date: 2019-03-29
SZ DJI TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Wireless communication systems are vulnerable to man-in-the-middle attacks, such as injecting instructions into the wireless system to achieve the purpose of controlling and hijacking the receiver; modifying the data of the wireless system to deceive the receiver; hijacking the receiver through replay attacks, thereby (1) Capturing the attacked object, thereby causing property loss of the system owner; (2) operating the hijacked object to complete some malicious attacks, causing loss of life and property of others
[0007] Some of the current wireless communication systems are vulnerable to attacks because there is no effective authentication of both parties to the communication and data protection.
And even if encryption and authentication are added, the system is hijacked because of the failure to effectively prevent replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication system, method and device
  • Secure communication system, method and device
  • Secure communication system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0200] refer to figure 1 Shown is a schematic diagram of the hardware architecture of a preferred embodiment of the secure communication system of the present invention.

[0201] In this embodiment, the secure communication system 1000 includes a communication device that communicates through a wireless network, such as a communication first party 1 and a communication second party 2 . The first communication party 1 and the second communication party 2 may be respectively the information sender and the information receiver in a one-way communication system, or the master and controlled parties in an asymmetric two-way communication system. For example, the first communication party 1 may be a flight controller, such as a remote controller, and the second communication party 2 may be an unmanned aerial vehicle or a camera module, a gimbal, etc. on an unmanned aerial vehicle.

[0202] In other embodiments, the first communication party 1 and the second communication party 2 ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure communication method comprising obtaining a secret code generated in response to a first communication device being paired with a second communication device, obtaining a prestored product key, generating a module key based on the secret code and the product key, randomly generating a session key, obtaining a key sequence number, auto-incrementing the key sequence number, setting a sending sequence number with an initial value of zero, generating a key frame by performing a computation on the session key and a verification authentication code of the session key using the module key, sending a data packet including the key frame, the key sequence number, the sending sequence number, and a data type to the second communication device. The data type indicates that the data packet is a key data packet.

Description

technical field [0001] The invention relates to a security authentication and security communication technology in a wireless communication system, in particular to a security communication system and method for preventing replay attacks. Background technique [0002] In secure communication, there are often the following basic requirements: [0003] 1. Confidentiality: It must be ensured that only the communication parties can interpret the communication data; [0004] 2. Authentication: It must be ensured that the communication data is sent by the credit-granting party; [0005] 3. Prevent replay attacks: prevent attackers from recording previously sent data, thereby deceiving receivers. Attackers may use data from the last run of the system or this run to deceive the receiver, so these two attacks must be prevented during system design. [0006] Wireless communication systems are vulnerable to man-in-the-middle attacks, such as injecting instructions into the wireless ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/12
CPCH04L9/0861H04L9/14H04L9/3242H04L2209/80H04L2209/84H04W12/06H04W12/037G06F7/588H04L9/0869
Inventor 陈永森谢鹏万日栋吴军龚明尤中乾
Owner SZ DJI TECH CO LTD