Check patentability & draft patents in minutes with Patsnap Eureka AI!

Wireless encryption communication method and system

An encrypted communication system and encrypted communication technology, applied in wireless communication, security devices, electrical components, etc., can solve the problems of information leakage, time lengthening, and inability to meet real-time requirements in application fields

Inactive Publication Date: 2019-12-31
SOUTH CHINA UNIV OF TECH
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Only a single symmetric encryption algorithm such as AES is used for encryption, and when the secret key of the symmetric encryption algorithm is transmitted in the wireless network, it is easy to be intercepted and cracked, resulting in information leakage
[0005] 2. Only a single asymmetric encryption algorithm such as RSA is used for encryption, which improves the security, but will greatly increase the resource consumption of the system for encryption
It makes the system take longer to complete an encrypted transmission, which cannot meet the application fields with high real-time requirements
[0006] 3. No encryption algorithm is used to encrypt the information. Although the direct transparent transmission method improves the efficiency, the interception of the information leads to the leakage of the information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless encryption communication method and system
  • Wireless encryption communication method and system
  • Wireless encryption communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with drawings and embodiments.

[0034] see figure 1 , one A wireless encrypted communication method, wherein the execution subject is an information sending end, including:

[0035] S11, generating a wireless signal, and wirelessly connecting with the information receiving end, and the information receiving end receives the login password input by the user to complete identity verification.

[0036] S12, receiving the public key K-Pu of this transmission generated by the information receiving end according to the asymmetric encryption algorithm;

[0037] S13, generate the secret key K-A for this transmission according to the symmetric encryption algorithm, and use the public key K-Pu to encrypt the secret key K-A according to the asymmetric encryption algorithm to obtain the ciphertext M-K;

[0038] S14, randomly generating interference information W-G;

[0039] S15, encrypt the plaintext to be s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless encryption communication method and system. The method comprises the following steps: S1, identities of an information sending end and an information receiving end are verified; S2, the information receiving end generates a public key K-Pu and a private key K-Pr of the transmission according to an asymmetric encryption algorithm, and sends the public key K-Pu tothe information sending end; S3, the information sending end generates a secret key K-A of the transmission according to a symmetric encryption algorithm, and encrypts the secret key K-A by using a public key K-Pu according to an asymmetric encryption algorithm to obtain a ciphertext M-K; S4, the information sending end randomly generates interference information W-G; and S5, the information sending end encrypts a plaintext to be sent by using a symmetric encryption algorithm to obtain a ciphertext M-M. According to the invention, the risk of using a single symmetric encryption algorithm to the system is solved, the risk of being intercepted in secret key transmission is effectively avoided, and the information transmission security of the wireless transmission device is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a wireless encrypted communication method and system. Background technique [0002] With the continuous development of communication technology, communication equipment is widely used in various mobile terminal equipment, and the rapidity of communication transmission has buried hidden dangers for security issues. In the process of identification, connection and transmission of communication equipment, it is easy for criminals to steal data, which will endanger the security of user information. In the existing technology, the encryption level of data transmission information between two short-distance communication segments is still relatively low. [0003] Currently common encryption protection technologies between wireless communication systems include: [0004] 1. Only a single symmetric encryption algorithm such as AES is used for encryption, and when the secre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/041
CPCH04W12/02H04W12/03H04W12/041
Inventor 陆以勤谢树禄覃健诚程喆
Owner SOUTH CHINA UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More