Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission
An encryption method and technology for tower cranes, which are applied in wireless communication, electrical components, security devices, etc., can solve problems such as weak communication service capabilities, and achieve the effects of suitable cost, simple network layout, and flexible billing methods.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] Enhancing the security of tower crane information is one of the main objectives of this system, and it is also the basic requirement of the project entrusting party. 3G is selected as the wireless transmission method of this system, and its strong confidentiality is one of the main considerations. In the 3G network, the link between MS and SGSN can be encrypted, which can reduce the probability of wireless information being intercepted in the air, and greatly improve its information privacy and security. The process of authentication and encryption of data transmitted by the tower crane will be described in conjunction with the accompanying drawings:
[0021] 1) The authentication process is as follows (such as figure 1 shown):
[0022] a. When the tower crane information is transmitted through the 3G network, first the SGSN sends the authentication information to the HLR, and the HLR responds to the corresponding authentication information and sends the authentication...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 