Secret communication method based on fractional Fourier transform order multiplexing

A fractional-order Fourier and secure communication technology, applied in the field of communication, can solve problems such as the inability to maintain the security and legality of the network environment, the inability to effectively prevent the transmission of illegal information, and the inability to locate the location of the attack source. Information security and social security, reducing the probability of data leakage, improving the effect of security and legality

Active Publication Date: 2022-01-28
YANAN UNIV
View PDF22 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data confidentiality will cause serious consequences, so data confidentiality has become a very important issue; therefore, it is particularly important to invent a secure communication method based on fractional Fourier transform order multiplexing
[0003] After retrieval, Chinese Patent No. CN108768927A discloses a secure communication method and device. Although this invention is suitable for communication scenarios where the communication bandwidth is narrow and the system time of both parties is deviated, it cannot detect the transmission data sent by the user and cannot effectively prevent The transmission of illegal information cannot maintain the security and legality of the network environment; in addition, the existing secure communication method based on fractional Fourier transform order multiplexing is likely to cause data leakage when attacked by external personnel, which cannot be guaranteed. Data security, and the location of the source of the attack cannot be located, which is not conducive to maintaining personal information security; therefore, we propose a secure communication method based on fractional Fourier transform order multiplexing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method based on fractional Fourier transform order multiplexing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Refer figure 1 , A confidential communication method based on the multiplexing of the fractional Fourier transmissive sequence, the present embodiment mainly discloses a monitoring and analysis method:

[0042] Receive transfer data, and record data information: The transmission module receives the transmission data sent by the user, collects its related information, and classifys the collected, and constructs the encrypted record table, and record each group information.

[0043] Specifically, first, the transmission module collects information of the data type, data length, and data size of the transmitted data, and enters the encrypted record table, each group information record is completed, the transmission module is time to receive the transmitted data, respectively. Collect, and mark it as a transmission time, and record it in an encrypted record table.

[0044] Safety detection for transmission data: The transmission data sent by the user is monitored, analyzed and ...

Embodiment 2

[0053] Refer figure 1 A confidential communication method based on the scalletary flourishing leaf transform order, except that the above embodiment is the same as the above embodiment, the present embodiment mainly discloses an analytical treatment method:

[0054] Real-time monitoring of communication security environments: real-time monitoring of communication frame transmission environments, and analyzes external attack behaviors, and positioning the source of IP addresses and feeds back to the staff.

[0055] Specifically, when the communication frame is attacked during the transmission process, the firewall is started to defend the attack data, and confirm the attack source IP address through the firewall, communicate with the GPS satellite, and grab the IP address location area image At the same time, the real address of the grabbed is given to the staff, and the alert information is transmitted to the relevant unit. When the firewall cannot block external data invasion, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure communication method based on fractional Fourier transform order multiplexing, and belongs to the technical field of communication. The method comprises the following specific steps: (1) receiving transmission data and recording data information; (2) carrying out security detection on the transmission data; (3) carrying out encryption processing on the transmission data to generate a communication frame; (4) monitoring a communication security environment in real time; (5) receiving the communication frame and carrying out data decoding on the communication frame. According to the invention, the transmission of violation information can be effectively prevented, the efficiency of maintaining the security and legality of a network environment is improved, the network environment is purified, the requirement of people for surfing the Internet healthily is ensured, the probability of data leakage can be reduced and the data security can be ensured when data is attacked by external personnel in a transmission process, and the security of the data is ensured; and the attack source position can be positioned, so that the personal information security and the public security can be maintained.

Description

Technical field [0001] The present invention relates to the field of communication technologies, and more particularly to a confidential communication method based on a fractal-order flour translation. Background technique [0002] Privacy communication is the scientific and capable branch of information confidential technology in communication. Its specific refers to communication with confidential measures, in addition to confidentiality and other confidentiality measures such as secret, hidden, password, mainly using channel confidentiality and information. Confidential, channel confidentiality is a communication channel that makes the screwdrivers are not easy to cut information. If a dedicated line, instant communication and radio spread communication, information confidentiality is the information confidential code password such as the transmitted information. Transfer, with the development of electronic technology, the confidential machine has been confidential. It is char...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F17/14
CPCH04L63/0428H04L63/0236H04L63/12H04L63/1416G06F17/14
Inventor 冯强王荣波
Owner YANAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products