Supercharge Your Innovation With Domain-Expert AI Agents!

Wireless router and wireless terminal encrypted transmission method and system

A wireless router, encrypted transmission technology, applied in transmission systems, digital transmission systems, key distribution, can solve problems such as easy information leakage, wireless routers cannot encrypt data transmission, etc., to achieve high security and reduce the possibility of being cracked. Effect

Inactive Publication Date: 2017-11-24
PHICOMM (SHANGHAI) CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method and system for encrypted transmission of wireless routers and wireless terminals to solve the problem that existing wireless routers cannot encrypt data transmission and information is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless router and wireless terminal encrypted transmission method and system
  • Wireless router and wireless terminal encrypted transmission method and system
  • Wireless router and wireless terminal encrypted transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] This embodiment provides a method for wireless router encrypted transmission, such as figure 1 shown, including steps:

[0053] S11: Generate encrypted router data and router key through the first TPM chip built in the wireless router;

[0054] S12: Send the encrypted router data and the router key to the wireless terminal.

[0055] With the development of wireless networks, the information security of wireless routers as devices for wireless and wired conversion is becoming more and more important. The user does not want the information forwarded by the wireless router to be intercepted and the content of the information to be known by others.

[0056] In the traditional data transmission method, encryption software is used to encrypt the data to be transmitted from the wireless terminal to the wireless router or from the wireless router to the wireless terminal, and then store it in the corresponding device. The problem with this method is that the software encrypt...

Embodiment 2

[0083] This embodiment provides a method for wireless router encrypted transmission, such as image 3 shown, including steps:

[0084] S31: Generate encrypted router data and router key through the first TPM chip built in the wireless router;

[0085] S32: Send the encrypted router data and the router key to the wireless terminal;

[0086] S33: Obtain encrypted terminal data and a terminal key sent by the wireless terminal;

[0087] S34: Using the first TPM chip and the terminal key to decrypt the encrypted terminal data;

[0088] S35: Forward the decrypted encrypted terminal data.

[0089] The difference from the first embodiment is that it further includes step S31, step S32 and step S33.

[0090] Specifically, when the wireless router receives the data sent by the wireless terminal, it acquires the terminal key sent by the wireless terminal, and the wireless router stores the key according to the corresponding wireless terminal. Then the wireless terminal encrypts the ...

Embodiment 3

[0104] This embodiment provides a method for wireless terminal encrypted transmission, such as Figure 5 shown, including steps:

[0105] S51: Generate encrypted terminal data and a terminal key through the second TPM chip built in the wireless terminal;

[0106] S52: Send the encrypted terminal data and the terminal key to the wireless router.

[0107] Both the wireless router and the wireless terminal include a TPM chip, the wireless router has a built-in first TPM chip, and the wireless terminal has a built-in second TPM chip.

[0108] In this embodiment, step S51 is to generate encrypted terminal data and a terminal key through the second TPM chip built in the wireless terminal.

[0109] Specifically, when the terminal wants to send data to the wireless router, it uses its built-in second TPM chip to generate a terminal key, and then the wireless terminal encrypts the data with the second TPM chip to generate encrypted terminal data.

[0110] In this embodiment, step S5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless router and wireless terminal encrypted transmission method and system, and aims to solve the problem that information is liable to leakage since data transmission cannot be encrypted in an existing wireless router. The method comprises the following steps: generating encrypted router data and a router key through a first TPM (Trusted Platform Module) chip embedded into the wireless router; transmitting the encrypted router data and the router key to a wireless terminal; acquiring encrypted terminal data and a terminal key transmitted by the wireless terminal; decrypting the encrypted terminal data with the first TPM chip and the terminal key; and forwarding the decrypted encrypted terminal data. Compared with a software encryption program, a TPM chip hardware logical encryption method has the advantages that an encryption algorithm structure of the TPM chip is not acquired; the probability of data cracking is lowered greatly; and the data communication security is enhanced.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a wireless router and a wireless terminal encrypted transmission method and system. Background technique [0002] With the rapid development of wireless networks, wireless network transmission bears the heavy responsibility of information transmission, and the information security of wireless routers as equipment for wireless and wired conversion is becoming more and more important. The user does not want the information forwarded by the wireless router to be intercepted and the content of the information to be known by others. [0003] However, current wireless routers do not encrypt information transmission or use software algorithms for encryption. These methods are extremely easy to cause information to be cracked or leaked. [0004] In the traditional data transmission method, encryption software is used to encrypt the data to be transmitted from the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/741H04L12/771H04L45/60H04L45/74
CPCH04L9/0877H04L9/0897H04L45/60H04L45/74
Inventor 何山
Owner PHICOMM (SHANGHAI) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More