CN115835201A - Safety protection method, first equipment, second equipment and safety protection system - Google Patents

Safety protection method, first equipment, second equipment and safety protection system Download PDF

Info

Publication number
CN115835201A
CN115835201A CN202111091188.1A CN202111091188A CN115835201A CN 115835201 A CN115835201 A CN 115835201A CN 202111091188 A CN202111091188 A CN 202111091188A CN 115835201 A CN115835201 A CN 115835201A
Authority
CN
China
Prior art keywords
fir filter
parameters
transformation
equipment
filter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111091188.1A
Other languages
Chinese (zh)
Inventor
涂岩恺
许振坪
陈义华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yaxon Networks Co Ltd
Original Assignee
Xiamen Yaxon Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yaxon Networks Co Ltd filed Critical Xiamen Yaxon Networks Co Ltd
Priority to CN202111091188.1A priority Critical patent/CN115835201A/en
Publication of CN115835201A publication Critical patent/CN115835201A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safety protection method, first equipment, second equipment and a safety protection system, wherein the method comprises the following steps: the method comprises the steps that parameters of an FIR filter are preset by first equipment, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order; performing interference processing on an original signal output by the PHY chip through the FIR filter; and sending the original signal after the interference processing to the second equipment. The invention ensures the random interference to the CSI signal by setting the FIR filter with random parameters, effectively avoids the user behavior detection through the fixed CSI signal characteristics, and improves the safety.

Description

Safety protection method, first equipment, second equipment and safety protection system
Technical Field
The invention relates to the technical field of WiFi (wireless fidelity) safety, in particular to a safety protection method, first equipment, second equipment and a safety protection system.
Background
The CSI is Channel State Information (Channel State Information) for measuring the WiFi Channel condition, belongs to the Information of the bottom layer (PHY layer) of the WiFi communication Information protocol, and describes Information of WiFi subcarriers. The CSI is fine-grained physical information and is more sensitive to the influence of the environment, so that the CSI is applied to passive behavior detection in recent years, such as the fields of gesture recognition, keystroke recognition and other motion tracking recognition. Because the existing bottom-layer drivers such as the wireless network card and the like are disclosed, the bottom-layer CSI information can be easily acquired by modifying the wireless network card driver, which brings great hidden dangers to the privacy and safety of users.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the safety protection method, the first device, the second device and the safety protection system are provided, so that the difficulty of behavior feature identification through CSI features can be improved, and the safety of user information is ensured.
In a first aspect, the present invention provides a safety protection method, including:
the method comprises the steps that parameters of an FIR filter are preset by first equipment, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order;
performing interference processing on an original signal output by the PHY chip through the FIR filter;
and sending the original signal after the interference processing to the second equipment.
In a second aspect, the present invention further provides a safety protection method, including:
the second equipment and the first equipment perform identity authentication;
if the identity authentication is passed, receiving parameters of the encrypted FIR filter sent by the first equipment, wherein the parameters of the FIR filter comprise a filter order and filter coefficients of each order;
decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter;
performing Z transformation on the parameters of the FIR filter obtained by decryption to obtain first transformation;
when the first device carries out interference processing on an original signal output by the PHY chip through the FIR filter corresponding to the parameters of the FIR filter and sends the original signal after the interference processing to the second device, the second device receives a signal sent by the first device;
performing Z conversion on the received signal to obtain a second conversion;
according to the first transformation and the second transformation, calculating to obtain a third transformation, wherein the third transformation is Z transformation of the original signal;
and carrying out inverse Z conversion on the third conversion to obtain an original signal.
In a third aspect, the present invention also provides a first device comprising one or more first processors and a first memory, the first memory storing a program and configured to be executed by the one or more first processors to implement the method as provided in the first aspect.
In a fourth aspect, the present invention also provides a second device comprising one or more second processors and a second memory, the second memory storing a program and configured to be executed by the one or more second processors to implement the method as provided in the second aspect.
In a fifth aspect, the invention further provides a safety protection system, which includes the first device provided in the third aspect.
The invention has the beneficial effects that: by setting the FIR filter with random parameters, the random interference to the CSI signal is ensured, and the user behavior detection through the fixed CSI signal characteristics is effectively avoided, so that the safety is improved. By filtering the influence of the FIR filter in the second equipment subjected to identity authentication, the original CSI information is recovered, and the communication quality can be guaranteed while other WiFi nodes are prevented from performing behavior detection.
Drawings
FIG. 1 is a flow chart of a security protection method provided by the present invention;
FIG. 2 is a flow chart of another security method provided by the present invention;
FIG. 3 is a schematic structural diagram of a first apparatus according to the present invention;
FIG. 4 is a schematic structural diagram of a second apparatus provided in the present invention;
fig. 5 is a schematic structural diagram of a WiFi device according to a first embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an FIR filter according to a first embodiment of the present invention;
FIG. 7 is a flowchart of a security protection method according to a first embodiment of the present invention;
fig. 8 is a flowchart of a security protection method according to a second embodiment of the present invention.
Detailed Description
In order to explain technical contents, objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1, the present invention further provides a safety protection method, including:
s101: the method comprises the steps that parameters of an FIR filter are preset by first equipment, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order;
s102: performing interference processing on an original signal output by the PHY chip through the FIR filter;
s103: and sending the original signal after the interference processing to the second equipment.
From the above description, the beneficial effects of the present invention are: by means of the FIR filter with random parameters, random interference is actively exerted on the CSI characteristics of the WiFi signals, so that the party receiving and analyzing the CSI information can not analyze the environment to which the CSI information reacts, and can not detect the influence of the behavior action of the user on the CSI, thereby playing a safety role.
Further, after S101, the method further includes:
and the first equipment updates the parameters of the FIR filter according to a preset period.
From the above description, the parameters of the FIR filter are periodically replaced, so that the difficulty in cracking the parameters of the FIR filter is increased, and the safety is improved.
Further, the S103 includes:
the first equipment performs digital-to-analog conversion on the original signal subjected to the interference processing;
and sending the original signal after the digital-to-analog conversion to the second equipment.
As can be seen from the above description, the DAC module performs digital-to-analog conversion on the signal and then transmits the signal through the antenna.
As shown in fig. 2, the present invention further provides a safety protection method, including:
s201: the second equipment and the first equipment perform identity authentication;
s202: if the identity authentication is passed, receiving parameters of the encrypted FIR filter sent by the first equipment, wherein the parameters of the FIR filter comprise a filter order and filter coefficients of each order;
s203: decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter;
s204: performing Z transformation on the parameters of the FIR filter obtained by decryption to obtain first transformation;
s205: when the first device carries out interference processing on an original signal output by the PHY chip through the FIR filter corresponding to the parameters of the FIR filter and sends the original signal after the interference processing to the second device, the second device receives a signal sent by the first device;
s206: performing Z conversion on the received signal to obtain a second conversion;
s207: according to the first transformation and the second transformation, calculating to obtain a third transformation, wherein the third transformation is Z transformation of the original signal;
s208: and carrying out inverse Z conversion on the third conversion to obtain an original signal.
As can be seen from the above description, by filtering the influence of the FIR filter in the second device subjected to identity authentication and recovering the original CSI information, it is possible to guarantee the communication quality while preventing other WiFi nodes from performing activity tracking.
Further, the S202-S204 include:
receiving parameters of an encrypted FIR filter of the current period sent by first equipment;
decrypting the encrypted parameters of the FIR filter in the current period to obtain the parameters of the FIR filter in the current period;
and performing Z transformation on the parameters of the FIR filter in the current period to obtain first transformation.
From the above description, by regularly replacing the parameters of the FIR filter, other WiFi signal monitors are prevented from cracking the parameters of the FIR filter, thereby further improving the security.
Further, the FIR filter has an order of 2, 3, 4 or 5, and each order of filter coefficient is less than or equal to 0.5.
As can be seen from the above description, by setting appropriate parameter values, it is avoided that the FIR filter has an excessive influence on the signal and affects the communication quality.
As shown in fig. 3, the present invention also provides a first device, comprising one or more first processors 301 and a first memory 302, wherein the first memory 302 stores programs and is configured to be executed by the one or more first processors 301 to:
presetting parameters of an FIR filter, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order;
performing interference processing on an original signal output by the PHY chip through the FIR filter;
and sending the original signal after the interference processing to the second equipment.
Further, after the parameters of the FIR filter are preset, the method further includes:
and updating the parameters of the FIR filter according to a preset period.
Further, the sending the original signal after the interference processing to the second device includes:
D/A conversion is carried out on the original signal after the interference processing;
and sending the original signal after the digital-to-analog conversion to the second equipment.
As shown in fig. 4, the present invention also provides a second device, comprising one or more second processors 401 and a second memory 402, wherein the second memory 402 stores programs and is configured to be executed by the one or more second processors 401 to:
performing identity authentication with first equipment;
if the identity authentication is passed, receiving parameters of the encrypted FIR filter sent by the first equipment, wherein the parameters of the FIR filter comprise a filter order and filter coefficients of each order;
decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter;
performing Z transformation on the parameters of the FIR filter obtained by decryption to obtain first transformation;
when the first device carries out interference processing on an original signal output by the PHY chip through the FIR filter corresponding to the parameters of the FIR filter and sends the original signal after the interference processing to the second device, the second device receives a signal sent by the first device;
performing Z conversion on the received signal to obtain a second conversion;
according to the first transformation and the second transformation, calculating to obtain a third transformation, wherein the third transformation is Z transformation of the original signal;
and carrying out inverse Z conversion on the third conversion to obtain an original signal.
Further, the receiving the parameters of the encrypted FIR filter sent by the first device; decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter; performing Z transformation on the decrypted parameters of the FIR filter to obtain first transformation, wherein the first transformation comprises the following steps:
receiving parameters of an encrypted FIR filter of the current period sent by first equipment;
decrypting the encrypted parameters of the FIR filter in the current period to obtain the parameters of the FIR filter in the current period;
and performing Z transformation on the parameters of the FIR filter in the current period to obtain first transformation.
The invention also provides a safety protection system which comprises the first equipment.
Further, the safety protection system also comprises the second device.
Example one
Referring to fig. 5 to 7, a first embodiment of the present invention is: a safety protection method can be applied to WiFi safety protection.
As shown in fig. 5, in the WiFi device (e.g. a user terminal) in this embodiment, an amplitude-limited, parameter-random FIR filter is added between the PHY chip of the WiFi 802.11 protocol physical layer and the digital-to-analog conversion module (DAC module) to serve as a random frequency response system. And the output processed by the FIR filter is subjected to digital-analog signal conversion by the DAC module and is sent to an antenna for transmission.
The FIR (Finite Impulse Response) filter (Finite Impulse Response filter) may be a hardware FIR filter circuit, a chip, or an entity or device capable of carrying the FIR software filtering operation program code. The FIR filter can ensure arbitrary amplitude-frequency characteristics and has strict linear phase-frequency characteristics, and the unit sampling response is finite, so that the filter is a stable system. If other filters are adopted, the characteristics are not provided, and the communication quality is greatly reduced or even the communication is not good under certain parameters.
The structure of the FIR filter of the present embodiment is shown in fig. 6, where n is the filter order, and n is not greater than 5 in order not to generate too large influence on the signal and not to affect the communication quality; c. C 1 ,c 2 ,...,c n The filter parameters are limited to a magnitude of 0.5 so as not to have an excessive influence on the signal.
As shown in fig. 7, the method of the present embodiment includes the following steps:
s701: the first equipment presets parameters of the FIR filter in the current period, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order. Preferably, the FIR filter has an order of 2, 3, 4 or 5 and each order of filter coefficients is less than or equal to 0.5.
S702: performing interference processing on the original signal output by the PHY chip through the FIR filter; that is, the FIR filter corresponding to the current period (the FIR filter obtained according to the parameters of the FIR filter of the current period) obtains the original signal output by the PHY chip, and filters the original signal and outputs the filtered signal to the digital-to-analog conversion module (DAC module).
S703: performing digital-to-analog conversion on the original signal subjected to the interference processing through a digital-to-analog conversion module; namely, the digital-to-analog conversion module obtains the original signal output by the FIR filter after the interference processing, and outputs the original signal to the antenna module after the digital-to-analog conversion.
S704: and sending the original signal after the digital-to-analog conversion to the second equipment through the antenna module.
S705: judging whether the preset cycle time is reached, if so, resetting a group of random FIR filter parameters, namely, executing step S701 when a new cycle is started.
By regularly replacing the parameters of the FIR filter, other WiFi signal monitors can be prevented from collecting signal characteristics for a long time, and cracking fixed FIR filter order n and filter coefficients of each order can be avoided, so that the cracking difficulty is increased, and the safety is improved.
All the above steps are performed by the first device (i.e., the user terminal, such as a mobile phone, a tablet, a computer, etc.), that is, in this embodiment, only active protection needs to be added to the first device, and no signal recovery is required by the other party (i.e., the second device, such as a WiFi router or an AP to which the user terminal is connected) of communication.
The CSI information reflects an environmental characteristic, that is, in the prior art, the CSI information received by the second device includes an environmental influence (an environment through which a signal is transmitted to a receiving party), for example, a gesture action change of a user in an external environment may be reflected in the CSI information of the receiving end, so that a behavior detection technology based on the CSI may occur.
In this embodiment, the CSI information received by the second device is subjected to not only environmental interference but also interference of the FIR filter, where the interference of the FIR filter is equivalent to external environmental change, that is, the CSI information is interfered by the simulation environment, and it is considered that random environmental interference is introduced on the side of receiving and analyzing the CSI information. Due to the fact that interference is added, related information of the original environment is mixed up, so that a party receiving and analyzing the CSI information cannot analyze the environment reflected by the CSI information, influence of behavior action of a user on the CSI can not be detected, and a safety effect is achieved.
In the embodiment, a finite-amplitude random FIR filter with parameters is added between a traditional WiFi physical layer PHY chip and a DA chip to serve as a random frequency response system, and the random interference is actively applied to CSI characteristics of WiFi signals, so that the difficulty of action identification through the CSI characteristics is increased for a user side. The parameters of the FIR filter are replaced regularly, so that the cracking difficulty of the parameters of the FIR filter is increased, and the safety is improved.
Example two
Referring to fig. 8, the present embodiment is a further development of the first embodiment, and the same points are not described again, but in the present embodiment, after the first device adds active protection, the second device that needs to communicate with the first device recovers the original signal.
The second device may be a WiFi router, an AP (wireless signal access point), or other WiFi node, and when the second device communicated with the first device is a trusted WiFi router or AP, for example, a WiFi router in a user's home or unit, or an AP in a public security bureau, the trusted second device may filter the influence of the FIR filter to recover the original CSI information, so as to ensure the communication quality while preventing other WiFi nodes from performing action tracking.
As shown in fig. 8, the method of the present embodiment includes the following steps:
s801: the first device establishes a communication connection with the second device, performs identity authentication, and determines whether the identity authentication passes, if so, performs step S802. In this embodiment, the identity authentication may be one of the existing WiFi communication identity authentication protocols.
Before the first device and the second device establish communication connection, the first device randomly sets parameters of the FIR filter, that is, the initial parameters of the FIR filter are preset, and then the first device establishes communication connection with the second device.
S802: the first equipment encrypts the parameters of the FIR filter corresponding to the current period and transmits the encrypted parameters of the FIR filter to the second equipment.
In the identity authentication process, a working key or an authentication key (a key for encrypting identity authentication information) is established, and the key is used for encrypting the order of the transmission FIR filter and the coefficients of each order of the filter.
S803: and the second equipment decrypts the received encrypted parameters of the FIR filter to obtain the parameters of the FIR filter corresponding to the current period.
S804: the second device performs Z-transform on the parameters of the FIR filter to obtain a first transform H (Z), which is the Z-transform of the FIR filter.
S805: the second device performs a Z-transformation on the received signal to obtain a second transformation S (Z), i.e. a Z-transformation of the received signal.
In step S704, the first device sends the processed original signal to the second device, and in this step, the second device performs Z conversion on the received signal to obtain Z conversion S (Z) of the received signal.
S806: from the first transformation H (Z) and the second transformation S (Z), a third transformation R (Z), i.e. R (Z) = S (Z)/H (Z), is calculated, which is the Z transformation of the original signal.
S807: and carrying out inverse Z transformation on the third transformation R (Z) to obtain an original signal. That is, the original signal is restored by performing inverse Z conversion on Z-converted R (Z) of the original signal.
Further, when a new period starts, the first device resets a set of parameters of the random FIR filter, and encrypts and transmits the parameters of the FIR filter corresponding to the new period to the second device each time the parameters of the FIR filter corresponding to the new period are reset, that is, after step S701 is executed each time, step S802 is executed.
In this embodiment, by filtering the influence of the FIR filter in the second device subjected to the identity authentication, the original CSI information is recovered, so that the original communication quality can be recovered in the trusted communication party. Besides, due to the interference of the FIR filter, other WiFi signal monitors cannot easily detect the user behavior by using the CSI signal except for a credible communication party. Meanwhile, parameters of the FIR filter are replaced regularly, so that other WiFi signal monitors are prevented from cracking the parameters of the FIR filter, and the safety is further improved.
In summary, according to the security protection method, the first device, the second device, and the security protection system provided by the present invention, a random FIR filter with a finite amplitude and a parameter is added between the PHY chip and the DA chip of the conventional WiFi physical layer to serve as a random frequency response system, so as to actively apply random interference to the CSI feature of the WiFi signal, so that the user side increases the difficulty of performing motion identification through the CSI feature. The parameters of the FIR filter are replaced regularly, so that the difficulty in cracking the parameters of the FIR filter is increased, and the safety is improved; by setting appropriate parameter values, the situation that the FIR filter has excessive influence on signals to influence the communication quality is avoided; the influence of the FIR filter is filtered in the second equipment subjected to identity authentication, and the original CSI information is recovered, so that the original communication quality can be recovered at a trusted communication party; by regularly replacing the parameters of the FIR filter, other WiFi signal monitors are prevented from cracking the parameters of the FIR filter, and therefore the safety is further improved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method of safety protection, comprising:
the method comprises the steps that parameters of an FIR filter are preset by first equipment, wherein the parameters of the FIR filter comprise filter orders and filter coefficients of each order;
performing interference processing on an original signal output by the PHY chip through the FIR filter;
and sending the original signal after the interference processing to the second equipment.
2. The security protection method of claim 1, wherein after the first device presets parameters of the FIR filter, the method further comprises:
and the first equipment updates the parameters of the FIR filter according to a preset period.
3. The safety protection method according to claim 1, wherein the sending the original signal after the interference processing to the second device comprises:
the first equipment performs digital-to-analog conversion on the original signal subjected to the interference processing;
and sending the original signal after the digital-to-analog conversion to the second equipment.
4. A method of safety protection, comprising:
the second equipment and the first equipment perform identity authentication;
if the identity authentication is passed, receiving parameters of the encrypted FIR filter sent by the first equipment, wherein the parameters of the FIR filter comprise a filter order and filter coefficients of each order;
decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter;
performing Z transformation on the parameters of the FIR filter obtained by decryption to obtain first transformation;
when the first device carries out interference processing on an original signal output by the PHY chip through the FIR filter corresponding to the parameters of the FIR filter and sends the original signal after the interference processing to the second device, the second device receives a signal sent by the first device;
performing Z conversion on the received signal to obtain a second conversion;
according to the first transformation and the second transformation, calculating to obtain a third transformation, wherein the third transformation is Z transformation of the original signal;
and carrying out inverse Z conversion on the third conversion to obtain an original signal.
5. The security protection method according to claim 4, wherein the receiving first device sends parameters of the encrypted FIR filter; decrypting the encrypted parameters of the FIR filter to obtain the parameters of the FIR filter; performing Z transformation on the decrypted parameters of the FIR filter to obtain first transformation, wherein the first transformation comprises the following steps:
receiving parameters of an encrypted FIR filter of the current period sent by first equipment;
decrypting the encrypted parameters of the FIR filter in the current period to obtain the parameters of the FIR filter in the current period;
and performing Z transformation on the parameters of the FIR filter in the current period to obtain first transformation.
6. A method of safeguarding according to any one of claims 1 to 5, characterized in that the FIR filter has an order of 2, 3, 4 or 5 and each order has a filter coefficient of less than or equal to 0.5.
7. A first device comprising one or more first processors and a first memory, the first memory storing a program and configured to perform the method of any of claims 1-3 by the one or more first processors.
8. A second device comprising one or more second processors and a second memory, the second memory storing a program and configured to perform the method of any of claims 4-5 by the one or more second processors.
9. A safety shield system comprising the first apparatus of claim 7.
10. The safety shield system of claim 9, further comprising a second device as recited in claim 8.
CN202111091188.1A 2021-09-17 2021-09-17 Safety protection method, first equipment, second equipment and safety protection system Pending CN115835201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111091188.1A CN115835201A (en) 2021-09-17 2021-09-17 Safety protection method, first equipment, second equipment and safety protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111091188.1A CN115835201A (en) 2021-09-17 2021-09-17 Safety protection method, first equipment, second equipment and safety protection system

Publications (1)

Publication Number Publication Date
CN115835201A true CN115835201A (en) 2023-03-21

Family

ID=85515633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111091188.1A Pending CN115835201A (en) 2021-09-17 2021-09-17 Safety protection method, first equipment, second equipment and safety protection system

Country Status (1)

Country Link
CN (1) CN115835201A (en)

Similar Documents

Publication Publication Date Title
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN112823503B (en) Data access method, data access device and mobile terminal
CN103095457A (en) Login and verification method for application program
EP3371949A1 (en) Internet key exchange (ike) for secure association between devices
US20170041150A1 (en) Device certificate providing apparatus, device certificate providing system, and non-transitory computer readable recording medium which stores device certificate providing program
WO2014105307A1 (en) Automatic sanitization of data on a mobile device in a network environment
CN105610873A (en) Identity authentication method and device
WO2018064575A1 (en) Protecting mobile devices from unauthorized device resets
CN108768628B (en) Equipment end encryption method, device, system and gateway
CN113434905B (en) Data transmission method and device, computer equipment and storage medium
CN112689972A (en) Transmission device and transmission method, and reception device and reception method
CN114339737B (en) Wireless communication instruction encryption method and related equipment
CN110659899A (en) Offline payment method, device and equipment
CN115835201A (en) Safety protection method, first equipment, second equipment and safety protection system
CN107437997B (en) Radio frequency communication device and method
WO2018119950A1 (en) Access control method and apparatus
CN114362997B (en) Data transmission method and device for intelligent equipment of transformer substation, intelligent equipment and medium
CN110431557B (en) Method and apparatus for performing secure backup and restore
CN108199991B (en) Physical layer blind authentication method and system of time-varying fading channel based on confidence transfer
CN114598495A (en) Physical layer authentication method and device based on multi-time slot channel characteristics
US20220174045A1 (en) Reactive secure communications
CN108768640B (en) Network access authentication method and system based on quantum key
CN110366856B (en) Spectrum information inquiry system and safety-protected inquiry proxy device
CN115484606A (en) Security awareness method, device, computer-readable storage medium and chip
CN103888416B (en) Prevent the method and device of IP information leakages that safety-protection system terminal device stores

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 303-e, Zone C, innovation building, software park, torch hi tech Zone, Xiamen City, Fujian Province

Applicant after: Xiamen Yaxun Zhilian Technology Co.,Ltd.

Address before: 303-e, Zone C, innovation building, software park, torch hi tech Zone, Xiamen City, Fujian Province

Applicant before: XIAMEN YAXON NETWORK Co.,Ltd.

Country or region before: China