Method and system for recognizing ID of communication device

A communication device and identification technology, applied in the field of communication

Inactive Publication Date: 2011-04-20
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no data flow at the physical layer of the network, so the existing digital certification system is not applicable, and a security measure system suitable for the physical layer is required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for recognizing ID of communication device
  • Method and system for recognizing ID of communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Below in conjunction with accompanying drawing and example the present invention is described in further detail.

[0037] As shown in Figure 1, the processing steps of the inventive method are:

[0038] (1) The sender generates a signal watermark to identify the identity of the communication device;

[0039] The signal watermark refers to the identification of the identity of the communication device artificially added in the communication signal, which has the following characteristics:

[0040] 1) The carrier of the signal watermark is the communication signal;

[0041] 2) The signal watermark is artificially added;

[0042] 3) The signal watermark can identify individual communication devices;

[0043] 4) The signal watermark will not constitute obvious interference to the normal communication signal.

[0044] In a broad sense, any specific signal that meets the above conditions can be called a signal watermark. Therefore, the signal watermark can be generated i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention includes steps: (1) sending end generates signal watermark in use for identifying ID of device; (2) embeding the signal watermark to normal communication signal, the sending end sends the signal to receiving end; (3) being received the signal, the receiving end segregates out the signal watermark from the communication signal; (4) the receiving end explains and interprets the watermark as ID information of the sending end; (5) the receiving end converts ID information carried by signal watermark to ID of device. The system includes a sending end for generating signal watermark, and a receiving end for identifying ID of device. The sending end includes module for generating signal watermark, module for embedding signal watermark, and modulation module. The receiving end includes demodulation module, module for picking up signal watermark, and module for interpreting the signal watermark. The invention manages communication devices, protects illegal connection.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to the identification problem of access equipment in a communication network, that is, a communication equipment identification method and system thereof. Background technique [0002] With the rapid development of information technology in today's world, human society is entering an information society, and the development of social economy depends more and more on information resources, information technology and information industry. The information security problem in the communication network has attracted people's attention day by day. Among the various attack methods that endanger communication security, the intrusion system attack is the most harmful. This type of attack not only steals confidential materials, but also may cause the victim system to collapse at any time. Traditional security measures against intrusion attacks are implemented at the data li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 徐争光黄本雄王芙蓉徐书华傅道俊
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products