Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security transmission method, network access method and corresponding terminal

A transmission method and information security technology, applied in the field of intelligent terminals and their networked access, can solve the problems that the sending end cannot be surpassed, the information transmission technology is not flexible and intelligent enough, and the receiving end is paralyzed.

Active Publication Date: 2019-02-26
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason is that no matter whether the private key encryption based on symmetric encryption technology is used, or the public key encryption based on asymmetric encryption technology is used to encrypt the information to be transmitted, the key for encrypting the information to be transmitted is always fixed. Therefore, illegal Users can intercept the data packets generated during multiple transmissions for brute force cracking, or simulate the data packets of the sending end, launch a DDOS-like attack on the receiving end, paralyze the receiving end, and even cause other adjacent devices including WiFi routers to fail because of the need. Recognizing data frames suffers the same
[0006] On the other hand, in the current information transmission process, both the receiver and the sender need to abide by a fixed public or self-defined protocol. The sender cannot go beyond the established protocol and freely define the format of the information to be transmitted. Similarly, the receiver cannot flexibly analyze all information. Received data packets to obtain accurate original information, which shows the shortcomings of existing information transmission technology that is not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security transmission method, network access method and corresponding terminal
  • Information security transmission method, network access method and corresponding terminal
  • Information security transmission method, network access method and corresponding terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0107] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The main purpose of the present invention is to provide a mobile terminal and an information security transmission method adopted therefor. The method includes the following steps: obtaining information to be transmitted; constructing a data message so that the data message contains secondary cipher text and secondary ciphertext; key, and the secondary ciphertext is encrypted by the primary key to encrypt the information to be transmitted to form a primary ciphertext, which is then encrypted by the secondary key containing a random factor; and the data message is sent. Correspondingly, the present invention also provides an intelligent terminal and a network access method thereof. The invention further strengthens the communication security effect of the fast connection technology realized based on the IEEE 802.11 protocol by improving the content expression loaded in the data message by means of the encryption technology.

Description

technical field [0001] The present invention relates to information security technology, in particular to a mobile terminal and an information security transmission method adopted therefor, and at the same time relates to an intelligent terminal and a network access method thereof. Background technique [0002] The control technology for intelligent terminal access to the target network is based on the technology specified by the IEEE 802.11 protocol, and has been vigorously developed, and its application is becoming more and more common. Based on the earliest AD-Hoc and WiFi Direct technologies, a direct connection relationship is established between the control terminal (sending terminal) and the receiving terminal, and then the configuration information for accessing the target network is transmitted, including the service set identifier of the target network and login password. The traditional direct connection method is inefficient due to the complex handshaking and sw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0442H04L63/0478H04L63/0815H04L63/083H04L65/611
Inventor 刘敏叶剑杰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products