Security enhanced communication positioning terminal

A communication positioning and enhanced technology, applied in secure communication devices and key distribution, to prevent impersonation of legitimate users, efficiently control access rights, and prevent resource intrusion

Inactive Publication Date: 2020-09-08
上海万位科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing security terminal devices are special-purpose devices. Therefore, how to protect the program and data in the communication positioning terminal device and the security of data during transmission need to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security enhanced communication positioning terminal
  • Security enhanced communication positioning terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0031] The security-enhanced communication positioning terminal 10 of this embodiment includes a control device 11 , a positioning device 12 , a communication device 13 , a storage device 14 , an encryption device 15 and a decryption device 16 .

[0032] The control device 11 is connected with the positioning device 12 , the communication device 13 and the storage device 13 through an I / O interface.

[0033] The positioning device 12 is used for acquiring position information.

[0034] The communication device 13 is used to establish a communication connection with the terminal device 20 / server 30 to send or receive data. The communication device 13 receives the unique identification key distributed by the server 30 and stores the unique identification key in the storage device 14 . Among them, the unique identification key is used as the pri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security enhanced communication positioning terminal, which comprises a control device, a positioning device, a communication device, a storage device, an encryption device and a decryption device, the control device is connected with the positioning device, the communication device and the storage device through I / O interfaces. The positioning device is used for acquiring position information; wherein the communication device is used for establishing communication connection with terminal equipment / a server; the communication device receives the unique identificationkey distributed by the server and stores the unique identification key in the storage device; a public key matrix is also stored in the storage device; the encryption device negotiates based on the unique identification key and the public key matrix to obtain a session key, and encrypts data needing to be sent; and the decryption device decrypts the data to be received by using the session key. The data encryption, identity authentication and hardware protection are combined, and comprehensive safety protection is provided for the safety-enhanced communication positioning terminal.

Description

technical field [0001] The invention belongs to the field of communication positioning terminals, in particular to a safety-enhanced communication positioning terminal. Background technique [0002] With the rapid development of the Internet of Things, especially the emergence of new technologies, people and the market have raised concerns about the security of connected devices. Usually, because the smart devices connected to the Internet of Things do not have password protection, or only set a simple default password, the data is vulnerable to network attacks and stolen during the transmission process, which poses a security risk. [0003] For secure terminal equipment, in addition to data input, transmission, and security authentication links that are vulnerable to hacker attacks, there are also endless means of dismantling attacks. Most of the existing security terminal devices are special-purpose devices. Therefore, how to protect the program and data in the communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W4/80
CPCH04L9/0838H04L63/0428H04L63/0823H04L63/0869H04L63/0876H04L63/1441H04W4/80
Inventor 李仁明王长军
Owner 上海万位科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products