头像

姓名:宋宇波

职称:副教授

电话:

办公室:无线谷6号楼323房间

个人主页:

邮箱:songyubo AT seu.edu.cn

教育背景

学士(电力系统及其自动化),东南大学,1999.06

硕士(通信与信息系统),东南大学,2002.03

博士(信号与信息处理),东南大学,2005.07

学术兼职

研究领域

无线网络和移动通信安全,移动终端安全,隐私数据安全,区块链安全等。

研究概况

2012.06年曾在美国Lehigh University短期进修,2015-2016年香港理工大学计算机系任研究员。主要研究领域为无线网络和移动通信安全,移动终端安全和隐私数据安全。先后参与完成相关领域国家自然科学基金,国家863项目,国家发改委重大专项目,国家242信息安全计划项目多项;在国内外重要刊物上发表论文60多篇,出版教材2部,申请及授权发明专利30多项,获得科技成果鉴定5项。2005年获江苏省科技进步三等奖一项,09年获得东南大学青年教师授课竞赛二等奖,1214年获东南大学教学优秀二等奖,16年获孙庆云创新奖教金,2017年被评为东南大学最受欢迎研究生导师称号。

研究课题

国家自然科学基金,61601113,基于量化可信模型的信息系统智能安全机制研究,2018-2020;

国家科技重点专项课题,2018YFB2202200,高宽带超高速数据率及宽带可重构射频系统集成芯片,2018-2020;

国家科技重点专项课题,2018YFB2100403,异构物体资源建模与交换关键技术,2018-2020;

国家自然科学基金面上项目,61202448,半量子密码学中若干问题研究,2013/01-2015/12;

国家863计划,2007AA01Z43TD-SCDMA大规模用户群的信息监管关键技术研究,2007/07-2008/07

国家发改委重大专项,无线智能终端安全检测服务能力建设,2012/01-2013/12

国家信息安全测试中心合作项目,无线局域网安全性能测试平台,2011/09-2012.03

全国信息安全标准化技术委员会项目,无线城域网安全接入控制技术规范;

国家242信息安全计划,2007A04,第三代移动通信安全研究,2007/01-2008/12

国家242信息安全计划项目,2006A07, TDSCDMA移动通信安全研究,2006/01-2007/12。

奖励与荣誉

江苏省科技厅,江苏省科技进步三等奖,(2005年);

东南大学,东南大学青年教师授课竞赛二等奖,(2009年);

东南大学,东南大学教学工作优秀二等奖,(2012年);

东南大学,东南大学教学工作优秀二等奖,(2014年);

东南大学,孙庆云创新奖教金,(2016年);

东南大学,获东南大学最受欢迎研究生导师称号,(2017年)。

课程信息

序号课程名称课时授课对象课程类型授课时间
1移动通信和无线网络安全36研究生一年级研究生学位课秋季长学期
2无线网络安全技术(研讨)32本科生三年级本科生专业研讨课春季长学期
3无线网络安全技术(研讨)32本科生三年级本科生专业研讨课春季长学期
4信息安全48本科生三年级本科生基础课秋季长学期
5网络空间安全实训32本科生三年级本科生主干课暑期短学期


学术成果

论文发表

  1. Shang Gao, Zhe Peng, Bin Xiao and Yubo Song, Detection and Mitigation of DoS Attacks in Software Defined Networks, IEEE/ACM Transactions on Networking, 2020.

  2. 宋宇波,樊明,杨俊杰,胡爱群.一种基于拓扑分析的网络攻击流量分流和阻断方法.信息网络安全,2020,20(03):9-17.

  3. 宋宇波,张仕奇,宋睿.一种基于投票权竞争的区块链共识机制.山东大学学报(理学版),2020,55(03):43-50.

  4. 张明远,武威,宋宇波,胡爱群.面向无线局域网接入设备的安全等级评估系统.清华大学学报(自然科学版),2020,60(05):371-379.

  5. 宋宇波,祁欣妤,黄强,胡爱群,杨俊杰.基于二阶段多分类的物联网设备识别算法.清华大学学报(自然科学版),2020,60(05):365-370.

  6. C. Shi, L. Xie, C. Wang, P. Yang, Y. Song, and S. Lu, “iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking,” in 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), 2019, pp. 655–662.

  7. Q. Huang, Y. Song, J. Yang, M. Fan, and A. Hu, “A Booting Fingerprint of Device for Network Access Control,” in 2019 3rd International Conference on Circuits, System and Simulation (ICCSS), 2019, pp. 251–254.

  8. F. Deng, Y. Song, A. Hu, M. Fan, and Y. Jiang, “Abnormal traffic detection of IoT terminals based on Bloom filter,” in Proceedings of the ACM Turing Celebration Conference-China, 2019, pp. 1–7.

  9. 宋宇波,彭朝阳,苏悦,刘蕴箫,赵千锋,朱珍超.基于神经网络模型的室内大规模人流密度预测.北京理工大学学报,2019,39(07):714-718+770.

  10. 宋宇波,戚姗姗,胡爱群.权限可控传递的物联网共享设备委托授权访问机制.网络与信息安全学报,2019,5(02):40-49.

  11. 赵灵奇,宋宇波,张克落,胡爱群,罗坚.基于区块链和分层加密的物流隐私保护机制.应用科学学报,2019,37(02):224-234.

  12. 宋宇波,杨慧文,武威,胡爱群,高尚.软件定义网络DDoS联合检测系统.清华大学学报(自然科学版),2019,59(01):28-35.

  13. Y. Song, Q. Huang, J. Yang, M. Fan, A. Hua and Y. Jiang, IoT device fingerprinting for relieving pressure in the access control, Proceedings of the ACM Turing Celebration Conference-China, 2019, pp 1–8.

  14. R. Song, Y. Song, Z. Liu, M. Tang and K. Zhou, GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism, 2019.

  15. 张明远,祁欣妤,宋宇波,顾荣荣,胡爱群,朱珍超.基于协议逆向的移动终端通信数据解析.网络与信息安全学报,2018,4(12):54-61.

  16. Song Rui, Song Yubo, Gao Shang, Xiao Bin and Hu Aiqun, I Know What You Type: Leaking User Privacy Via Novel Frequency-based Side-channel Attacks, 2018 IEEE Global Communications Conference: Communication & Information System Security (Globecom2018 CISS),2018.

  17. R. Song, Y. Song, Q. Dong, A. Hu, and S. Gao, “WebLogger: Stealing your personal PINs via mobile web application,” in 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017, pp. 1–6.

  18. Y. Hua, Y. Zhang, Q. Liu, Y. Liu, and Y. Song, “The Fake BTS Detection and Location On Smart Phones,” in Proceedings of the 2017 International Conference on Industrial Design Engineering, New York, NY, USA, 2017, pp. 116–120.

  19. Y. Song, S. Gao, A. Hu, and B. Xiao, “Novel attacks in OSPF networks to poison routing table,” in Communications (ICC), 2017 IEEE International Conference on, 2017, pp. 1–6.

  20. S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, “SCoP: Smartphone energy saving by merging push services in Fog computing,” in Quality of Service (IWQoS), 2017 IEEE/ACM 25th International Symposium on, 2017, pp. 1–10.

  21. G. Shang, P. Zhe, X. Bin, and S. Yubo, “Secure and energy efficient prefetching design for smartphones,” in 2016 IEEE International Conference on Communications (ICC), 2016, pp. 1–6.

  22. S. Yubo, Z. Zhiwei, and X. Yunfeng, “Using Short Message Service (SMS) to deploy Android exploits,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  23. S. Yubo, X. Yunfeng, and Z. Zhiwei, “A platform for GSM Um interface signaling observation,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  24. S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate location based services by mobile phone actively detected,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  25. S. Yubo, Z. Kelong, and Y. Xiaowen, “Achievement of multiple HTTP communications based on single TCP connection,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.

  26. M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s sensitive data leakage detection based on API monitoring,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.

  27. Z. Kelong, S. Yubo, and C. Fei, “Implementation of automated testing system for android applications based on dynamic taint propagation,” in Communications Security Conference (CSC 2014), 2014, 2014, pp. 1–5.

  28. Z. Zhiwei, S. Yubo, X. Yunfeng, and Y. Zhongyun, “Using Short Message Service (SMS) to Deploy Android Exploits,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 890–893.

  29. S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate Location Based Services by Mobile Phone Actively Detected,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 919–922.

  30. Y. Xiaowen, S. Yubo, and Z. Kelong, “Driver-Hiding Scheme Based on PsLoadedModuleList and Driver Object,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 899–902.

  31. M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s Sensitive Data Leakage Detection Based on API Monitoring,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 907–910.

  32. Z. Lan, Y. Song, and L. Tang, “Novel process-protecting method using camouflage techniques based on direct kernel object manipulation,” Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 43, no. 1, pp. 24–29, 2013.

  33. Z. Kelong, S. Yubo, and Y. Xiaowen, “Achievement of Multiple HTTP Communications Based on Single TCP Connection,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 903–906.

  34. 唐磊;宋宇波;蓝智灵;, “基于I/O缓冲区读写的控制台远程交互模型,”计算机工程, no. 01, pp. 275–278, 2013.

  35. 蓝智灵;宋宇波;唐磊;, “基于直接内核对象操作的进程伪装保护方法,”东南大学学报(自然科学版), no. 01, pp. 24–29, 2013.

  36. H. Wu, A. Hu, Y. Song, N. Bu, and X. Jia, “A New Intrusion Detection Feature Extraction Method Based on Complex Network Theory,” in 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), 2012, pp. 852–856.

  37. L. Tang, Y. Song, and Z. Lan, “A novel model of console remote interaction based on I/O buffer access,” in 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), 2012, pp. 160–163.

  38. Y. Song, X. Zhu, Y. Hong, H. Zhang, and H. Tan, “A mobile communication honeypot observing system,” in 2012 4th International Conference on Multimedia and Security, MINES 2012, November 2, 2012 - November 4, 2012, 2012, pp. 861–865.

  39. Y. Song, K. Zhou, and X. Chen, “Fake BTS attacks of GSM system on software radio platform,” Journal of Networks, vol. 7, no. 2, pp. 275–281, 2012.

  40. S. Gao, A. Hu, and Y. Song, “Remote forensics system based on Minifilter,” in Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012, Changchun, China, 2012, pp. 1381–1385.

  41. S. Yubo, H. Xili, and L. Zhiling, “The GSM/UMTS Phone Number Catcher,” in 2011 Third International Conference on Multimedia Information Networking and Security (MINES), 2011, pp. 520–523.

  42. S. Yubo, Z. Kan, Y. Bingxin, and C. Xi, “A GSM/UMTS Selective Jamming System,” in 2010 International Conference on Multimedia Information Networking and Security (MINES), 2010, pp. 813–815.

  43. K. Zhou, A. Hu, and Y. Song, “A No-Jamming Selective Interception System of the GSM Terminals,” in 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1–4.

  44. B. Yao and Y. Song, “A partial zero-forcing precoding method for downlink multi-user MIMO channel,” in 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, November 4, 2010 - November 6, 2010, 2010, pp. 816–819.

  45. 宋宇波;胡爱群;姚冰心;, “802.11i认证协议可验安全性形式化分析,”中国工程科学, no. 01, pp. 67–73, 2010.

  46. 李国琴;宋宇波;胡爱群;, “基于GAA-WAPI的融合网络认证机制,”南京邮电大学学报(自然科学版), no. 06, p. 59–64+70, 2010.

  47. 陈开志;胡爱群;宋宇波;刘慧慧;袁红林;, “基于BioHashing和密钥绑定的双重可删除指纹模板方法,”高技术通讯, no. 11, pp. 1115–1120, 2010.

  48. S. Yubo, C. Xi, and H. Aiqun, “The Denial of Service Attack Analysis of WLAN Authentication Infrastructure,” in International Conference on Multimedia Information Networking and Security, 2009. MINES ’09, 2009, vol. 1, pp. 407–411.

  49. S. Yubo, H. Aiqun, and C. Kaizhi, “Security analysis of certificate authentication in Chinese WLAN standard,” in International Conference on Advanced Technologies for Communications, 2009. ATC ’09, 2009, pp. 23–26.

  50. 徐宁;宋宇波;刘金官;严国平;, “继电保护定值远程安全配置系统的设计与研究,”南京邮电大学学报(自然科学版), no. 03, pp. 57–63, 2009.

  51. 陈开志;胡爱群;宋宇波;袁红林;, “基于最小化星座点离散度的MPSK定时盲同步,”高技术通讯, no. 11, pp. 1106–1110, 2009.

  52. Y. Song and A. Hu, “Dynamic threshold proxy authenticated encryption scheme,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.

  53. Y. Song and A. Hu, “Dynamic key distribution system in ad hoc networks,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.

  54. 吴亚军;胡爱群;宋宇波;, “无线局域网协议分析系统的设计与实现,”计算机工程, no. 22, pp. 140–142, 2008.

  55. 宋宇波;黄玉划;, “CCMP协议的量化可验安全分析,”东南大学学报(自然科学版), no. 02, pp. 206–210, 2008.

  56. 宋宇波;胡爱群;杨晓辉;, “基于接入控制器模式的公共无线局域网安全体系设计,”中国工程科学, no. 08, pp. 56–59, 2008.

  57. 宋宇波;陈开志;吴亚军;, “基于口令的鉴别密钥交换协议设计,”信息安全与通信保密, no. 02, pp. 81–83, 2008.

  58. 吴文南;胡爱群;宋宇波;, “短距离无线语音和数据传输模块的设计与实现,”现代电子技术, no. 05, pp. 29–31, 2007.

  59. 汪姬;胡爱群;宋宇波;, “一种新的用于3G互连的盲均衡改进算法TDE-CMA,”中国工程科学, no. 02, pp. 54–57, 2007.

  60. 宋宇波;陈开志;姚冰心;, “基于自我加密的无线局域网快速切换认证,”东南大学学报(自然科学版), no. 06, pp. 945–949, 2007.

  61. 刘玉洁;宋宇波;裴文江;, “VoWLAN监听系统的设计与实现,”信息安全与通信保密, no. 10, pp. 66–68, 2007.

  62. 杨丹;胡爱群;宋宇波;, “移动无线网络接入计费信息系统的设计与实现,”电子技术应用, no. 10, pp. 64–66, 2006.

  63. 李炎新;胡爱群;宋宇波;, “自适应BPSK解调方法研究,”中国工程科学, no. 05, p. 49–51+68, 2006.

  64. 陈曦;宋宇波;王执铨;吴慧中;, “复杂产品虚拟样机综合集成型决策支持系统研究,”中国工程科学, no. 02, pp. 67–74, 2006.

  65. 陈端端;裴文江;宋宇波;, “基于CDMA802.11的无线多媒体平台的设计与实现,”电子技术应用, no. 11, pp. 66–68, 2006.

  66. 王质礼;胡爱群;宋宇波;, “嵌入式无线接入点网络驱动的设计与实现,”中国工程科学, no. 10, pp. 91–94, 2005.

  67. 宋宇波,胡爱群, “无线局域网TKIP协议的安全分析,”应用科学学报, no. 01, pp. 67–70, 2005.

  68. 宋宇波,胡爱群, “无线接入点WAPI认证机制的研究与实现,”中国工程科学, no. 09, pp. 65–69, 2005.

  69. 宋宇波,胡爱群, “WLAN802.11/11b数据加密机制的安全分析,”中国工程科学, no. 10, pp. 32–38, 2004.

  70. 黄玉划,胡爱群, “一次一密保密算法研究与实现,”应用科学学报, no. 03, pp. 287–290, 2004.

  71. 黄玉划,胡爱群, “基于双重分组和密钥计数的并行认证模式,”中国工程科学, no. 07, pp. 70–74, 2004.

  72. 黄玉划,胡爱群, “分组密码算法的快速认证模式研究与设计,”东南大学学报(自然科学版), no. 02, pp. 175–178, 2004.

  73. 胡骏,胡爱群,宋宇波等 “Linux环境下基于QTWLAN管理信息系统,”计算机工程, no. 03, pp. 114–116, 2004.

  74. 侯奋飞,宋宇波, “基于PMI的电子政务访问控制体系,”计算机工程, no. 17, pp. 114–116, 2004.

  75. 宋宇波,胡爱群, “电子政务安全体系结构的探析,”计算机工程, no. 10, pp. 11–13, 2003.

  76. 黄玉划,胡爱群, “网络安全中密钥更新算法研究与实现,”计算机工程与应用, no. 35, pp. 27–29, 2003.

  77. 宋宇波,疏朝明, “RC6加密算法在VPN中的应用,”通信技术, no. 07, pp. 78–80, 2001.

  78. 疏朝明,宋宇波等, “HMAC-SHA-1-96算法在VPN中的应用,”通信技术, no. 06, pp. 35–36, 2001.

著作

  1. 胡爱群,宋宇波,蒋睿.信息安全[M].第1版.华中科技大学出版社, 30万千字,2011.

  2. 蒋睿,胡爱群,陆哲明,宋宇波等.网络信息安全理论与技术[M].华中科技大学出版社, 50万千字,2007.

专利

  1. 宋宇波; 李珮玄; 马小松; 撒鹏程; 高圣沂; 陶祎航, 《一种基于超声波参量阵的隐蔽干扰信号发生装置及方法》, CN111064543A. 2019.12.

  2. 樊明; 宋宇波; 陈璐; 杨慧文; 邓峰杰; 杨俊杰; 胡爱群; 蔡宇翔; 肖琦敏; 潘丹, 《一种基于拓扑分析的攻击流量分流和阻断方法》, CN111049859A. 2019.12.

  3. 宋宇波;黄强;祁欣妤;杨俊杰;胡爱群, 《网络流量指纹特征二阶段多分类的物联网设备识别方法》, CN110380989A ,10月 25, 2019.

  4. 薛天昊;曹天旸;洪磊;周灏;宋宇波, 《基于多用户轨迹拟合的室内地图生成方法》, CN108709557A, 10月 26, 2018.

  5. 曹天旸;薛天昊;洪磊;周灏;宋宇波, 《基于移动众包模式的室内地图生成与轨迹加密方法》, CN108810817A, 11月 13, 2018.

  6. 徐健;宋宇波;石伟;张天阳, “基于显示设备电磁辐射通信的手机验证登录系统及方法”CN201810310532,2018-04-09.

  7. 方昊;胡爱群;姜禹;彭林宁;宋宇波, “一种基于设备物理指纹特征的无线网络接入安全防护系统及方法”, CN 201810223029.4, 2018-03-16.

  8. 李平安,李泽坤,张明昊,吴彧,宋宇波,戚姗姗, “基于公众号的物联网设备控制和权限分享系统及方法”, CN 201710810831.9, 2017-09-11.

  9. 刘祺华远刘奕琳张宇宸李前宋宇波, “一种伪基站检测定位系统,” CN107027122A, 27-May-2017.

  10. 宋宇波肖斌, “物联网设备的委托授权方法、服务器、终端及物联网设备”, CN 201610543643.X, 2016-07-11.

  11. 宋宇波,秦艳荣,王润,浦希益, and张志伟, “远程实时监测智能移动终端基带处理器运行状态的方法及系统,” 201510600961.0, 18-Sep-2015.

  12. 宋宇波 et al., “一种基于相似类型匹配估算的SQLite删除数据恢复方法,” CN104866610A, 04-Jun-2015.

  13. 刘兰谊,宋宇波,李卓倩,徐军,蔡金洲, and李度洋, “一种基于心音多维特征提取的身份识别算法及其系统,” CN104887263A, 21-May-2015.

  14. 罗平,宋宇波,王有东,蓝骥, and王国鹏, “一种基于电容感应技术的身份认证系统,” CN104182740A, 01-Sep-2014.

  15. 罗平 and宋宇波, “基于电容感应技术的门禁系统,” CN104183045A, 28-Aug-2014.

  16. 胡爱群,宋宇波,高岳,孟姗姗,陈飞, and朱克龙, “一种Android应用程序隐私数据泄露离线检测方法,” CN103729595 A, 16-Apr-2014.

  17. 高尚,胡爱群,李涛,宋宇波, and王涛, “一种伪无线接入点数据分析系统及其方法,” 201310350040.4, 12-Aug-2013.

  18. 高尚 et al., “基于渗透测试的无线网卡安全评估方法,” 201210421952, 30-Jan-2013.

  19. 胡爱群 et al., “一种基于无线接入点的渗透测试系统及其测试方法,” 201210356909, 26-Dec-2012.

  20. 蒋睿,宋宇波,葛蕤,黄永亮,张南, and胡锡利, “基于手机蓝牙的计算机环绕智能防护装置及方法,” 201110075500, 19-Dec-2012.

  21. 胡爱群 et al., “一种无线局域网安全性能测试系统及方法,” 201210255233, 24-Oct-2012.

  22. 宋宇波,唐磊,蓝智灵, and石乐, “一种控制台程序远程交互的方法,” 201210175830, 17-Oct-2012.

  23. 宋宇波,刘亦辰,岳亚,庞健, and梁琦, “基站获取移动通信终端国际移动设备识别码的装置及方法,” 201210162317, 17-Oct-2012.

  24. 宋宇波,朱筱贇,张皓月,谭杭波, and王许莲, “一种移动通信蜜罐捕获系统及其实现方法,” 201210175212, 19-Sep-2012.

  25. 宋宇波,王雪晨,刘锡仑, and贾成伟, “基于物理不可克隆功能的无线传感器网络,” 201120544168, 29-Aug-2012.

  26. 宋宇波,王雪晨,刘锡仑, and贾成伟, “一种基于前馈模式的物理不可克隆功能模块,” 201120524648, 22-Aug-2012.

  27. 宋宇波,王雪晨,刘锡仑, and贾成伟, “一种基于前馈模式的物理不可克隆功能模块及其实现方法,” 201110419448, 25-Jul-2012.

  28. 宋宇波,王雪晨,刘锡仑, and贾成伟, “基于物理不可克隆功能的无线传感器网络及其实现方法,” 201110435692, 27-Jun-2012.

  29. 蒋睿,宋宇波,胡锡利,郝婷婷, and黄泽, “一种移动终端短消息监管的设备和方法,” CN103369482A, 01-Apr-2012.

  30. 蒋睿,宋宇波,黄泽,郝婷婷, and胡锡利, “一种监控用户手机号码的装置和方法,” 201210039485.6, 21-Feb-2012.

  31. 蒋睿,宋宇波,郝婷婷,胡锡利, and黄泽, “一种移动终端语音通信安全监管的设备和方法,” 201210038932.6, 20-Feb-2012.

  32. 宋宇波,蒋睿,张南, and胡锡利, “基于蓝牙设备认证的计算机系统自动防护方法,” 201110065732, 14-Sep-2011.

  33. 宋宇波, “无线局域网通信接口的远程加密监管方法,” 200710131503, 02-Jun-2010.

  34. 宋宇波 et al., “用于远程内容监管的无线局域网接入装置,” 200710132257, 02-Dec-2009.

  35. 宋宇波 et al., “基于分布式架构的无线网络电话监听装置的监听方法,” 200710132256, 14-Oct-2009.

  36. 胡爱群,杨晓辉,宋宇波, and陈立全, “基于嵌入式系统的无线保护接入设备,” 200510122789, 03-Jun-2009.

  37. 宋宇波, “基于码分多址技术的移动无线局域网接入装置及方法,” 200710131504, 13-Feb-2008.

  38. 胡爱群,杨晓辉,宋宇波, and陈立全, “基于嵌入式系统的无线保护接入设备,” 200520134188, 15-Aug-2007.

  39. 胡爱群 et al., “基于PKI的VPN密钥交换的实现方法,” 01132348, 02-Aug-2006.


其他