Secret communication method and device

A technology for secure communication and superimposition of signals, applied in the field of communication, which can solve problems such as changes in theoretical and actual values ​​of equipment, time delay, and noise pollution.

Active Publication Date: 2020-06-16
中国移动通信集团陕西有限公司 +1
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology generally uses fractional nonlinear systems with certain parameters, but the situation in the actual communication process is very comp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method and device
  • Secret communication method and device
  • Secret communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] The synchronization and chaos control of nonlinear systems are the key problems in the practical engineering application of chaos theory. Synchronization refers to controlling the chaotic system so that the orbit of the response system gradually tends to be consistent with the orbit of a specified driving system during the dynamic evolution process. Because the chaotic system is extremely sensitive to the initial value in the evolut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of communication, in particular to a secret communication method and device, which are used for more accurately constructing a driving-response system conforming to the reality. The method comprises the steps that a response system receives a superposed signal sent by a driving system, wherein the superposed signal is obtained by modulating the driving system through a random parameter fractional order nonlinear method, and the superposed signal comprises a chaotic signal and a useful signal; and the response system demodulates thesuperposed signal by using a synchronous controller and a parameter identification rule to obtain the useful signal, wherein the synchronous controller and the parameter identification rule are determined in the process of realizing synchronous confirmation of the driving system and the response system.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a secure communication method and device. Background technique [0002] Confidential communication refers to a communication method in which the two parties to the communication change the form of information according to the agreed method to hide its true content in order to prevent information from being stolen. During the communication process, the plaintext generated by the sender converts the plaintext into ciphertext through the channel and transmits it through the channel. When the legitimate receiver normally receives the ciphertext, it decrypts it according to the key decryption algorithm to obtain the plaintext. The communication process is complete. If the channel is an unsafe channel, it may be intercepted by lawbreakers, because the information intercepted by illegal receivers is some random and meaningless symbols, but if the interceptor knows the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04K1/02H04L9/00
CPCH04K1/025H04L9/001Y02P90/02
Inventor 茹萌勐吕梅王创惠友为康慧秦吴江
Owner 中国移动通信集团陕西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products