Encryption and decryption method, equipment and computer storage medium

A technology of encryption, decryption, and encryption algorithm, which is applied in the field of information security, and can solve problems such as wifi spoofing, bandwidth occupation, and security risks

Active Publication Date: 2018-10-02
NUBIA TECHNOLOGY CO LTD
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of technology, various wifi master keys have appeared to crack wifi passwords, resulting in the wifi at home is often hacked, occupying bandwidth and bringing some security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, equipment and computer storage medium
  • Encryption and decryption method, equipment and computer storage medium
  • Encryption and decryption method, equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] see image 3 , which shows an encryption and decryption method provided by an embodiment of the present invention, the method can be applied to routers, and the specific process of the method includes the following steps:

[0081] S301: Receive a first sequence sent by the device to be connected; wherein, the first sequence includes authentication information plaintext and parameter information of the device to be connected;

[0082] S302: Perform parsing on the first sequence to obtain authentication information plaintext;

[0083] S303: Determine a connection result of the device to be connected based on the authentication information in plain text.

[0084] In this embodiment of the present invention, the router parses the received first sequence containing the plaintext of the authentication information and the parameter information of the device to be connected to obtain the plaintext of the authentication information, and determines the plaintext of the device to...

Embodiment 2

[0108] Based on the same inventive concept of the foregoing embodiments, see Figure 4 , which shows an encryption and decryption method provided by an embodiment of the present invention, the method can be applied to the device to be connected, and the method can specifically include:

[0109] S401: Generate a first sequence based on the parameter information and authentication information of the device to be connected in plain text;

[0110] S402: Send the first sequence to the router; wherein the first sequence is used to parse and obtain the plaintext of the authentication information and determine a connection result of the device to be connected based on the plaintext of the authentication information.

[0111] In the embodiment of the present invention, the device to be connected generates the first sequence based on the plain text of the authentication information and the parameter information of the device to be connected, and sends it to the router for authentication...

Embodiment 3

[0123] Based on the same inventive concept of the foregoing embodiments, see Figure 5 , which shows an encryption and decryption method provided by an embodiment of the present invention. The method can be applied to a router and a device to be connected. In this embodiment, the device to be connected is preferably a terminal. The method can specifically include:

[0124] S501: The terminal sends a connection request to the router;

[0125] It can be understood that, in order to access the wifi network, the terminal needs to initiate a connection request.

[0126] S502: The router receives the connection request;

[0127] S503: The router sends indication information for indicating an encryption algorithm for the connection request;

[0128] It can be understood that, for the connection request sent by the terminal, the router determines the encryption algorithm in the local algorithm library according to the local policy. The local policy may be determined according to ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an encryption and decryption method, equipment and a computer storage medium. The encryption and decryption method comprises the steps of receiving a first sequence sent by equipment to be connected, wherein the first sequence includes an authentication information plaintext and parameter information of the equipment to be connected; parsing the first sequence to obtain the authentication information plaintext; and determining a connection result of the equipment to be connected based on the authentication information plaintext. According to the method, the authentication information plaintext is obtained through parsing the first sequence including the authentication information plaintext and the parameter information of the equipment to be connected so as to determine the connection result of the equipment to be connected, thereby avoiding a phenomenon that cracking tools such as universal key software can access to a wifi network through directly reading a password plaintext, and achieving an effect of improving the security of the wifi network.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to an encryption and decryption method, device, and computer storage medium. Background technique [0002] Wifi (Wireless Fidelity) is a technology that allows electronic devices to connect to a wireless local area network (WLAN). Usually, the connection to the wireless local area network is password-protected. With the development of technology, various wifi master keys have appeared to crack wifi passwords, resulting in the wifi at home is often hacked, occupying bandwidth and bringing some security risks. [0003] At present, there are two main methods for cracking wifi passwords, sharing and exhaustive combined with dictionary attack, and the most commonly used method is the sharing method. The most common cracking tools include skeleton key software. The general process of the master key software using the sharing method to crack th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/08H04W76/10H04W76/18H04W12/03
CPCH04W12/02H04W12/06H04W12/08H04W76/10H04W76/18
Inventor 王辉
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products