Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting programs in micro-power wireless information acquisition system

A micro-power wireless, information collection technology, applied in transmission systems and key distribution, can solve problems such as security risks and program leakage, and achieve the effect of preventing illegal intrusion and copying

Active Publication Date: 2013-03-27
SHENZHEN FRIENDCOM TECH DEV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in the micro-power wireless information collection system, the program update of each network node is generally delivered through broadcast flooding, but the broadcast flooding method in the prior art has great security risks: In addition to the target node, there are many other nodes that may receive the program sent by the network management center and can decrypt the program, which can easily cause program leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting programs in micro-power wireless information acquisition system
  • Method for protecting programs in micro-power wireless information acquisition system
  • Method for protecting programs in micro-power wireless information acquisition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] The invention provides a program protection method in a micro-power wireless information collection system, such as figure 1 shown, including the following steps:

[0019] 101. The first network node and the second network node receive the program sent in a broadcast flooding manner;

[0020] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0021] The above-mentioned program is sent by the network management center in the form of broadcast flooding, and is encrypted by the above-mentioned network management center before sending. The key of the above-mentioned program is the first group of keys, and the above-mentioned first group of keys is only stored in the first network node and the network management center middle;

[0022] Further, the above-mentioned first group of keys includes at least two keys, and each group of the above-mentioned program ad...

Embodiment 2

[0026] The invention provides a program protection method in a micro-power wireless information collection system, such as figure 2 shown, including the following steps:

[0027] 201. The first network node and the second network node receive a program sent in a broadcast flooding manner;

[0028] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0029] The above-mentioned program is sent by the network management center in the form of broadcast flooding, and is encrypted by the above-mentioned network management center before sending. The key of the above-mentioned program is the first group of keys, and the above-mentioned first group of keys is only stored in the first network node and the network management center middle;

[0030] Further, the above-mentioned first group of keys includes at least two keys, and each group of the above-mentioned program ado...

Embodiment 3

[0037] The invention provides a program protection method in a micro-power wireless information collection system, such as image 3 shown, including the following steps:

[0038] 301. The first network node and the second network node receive a program sent in a broadcast flooding manner;

[0039] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0040] The above-mentioned program is sent by the network management center in the form of broadcast flooding, and is encrypted by the above-mentioned network management center before sending. The key of the above-mentioned program is the first group of keys, and the above-mentioned first group of keys is only stored in the first network node and the network management center middle;

[0041] Further, the above-mentioned first group of keys includes at least two keys, and each group of the above-mentioned program adop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention relates to the technical field of communication, and discloses a method for protecting programs in a micro-power wireless information acquisition system. The method includes steps that a first network node and a second network node receive a program transmitted in a broadcast flooding mode; the program is encrypted by a network management center before being transmitted and has first groups of secrete keys, and the first groups of secrete keys are only stored in the first network node and the network management center; the first network node and the second network node are optional two network nodes in the micro-power wireless information acquisition system; the first network node calls the stored first group of secrete keys to decrypt the received program and stores the received program; and the second network node calls a stored second group of secrete keys to decrypt the received program, and the program is discarded if the program fails to be decrypted. The method has the advantages that the programs can be prevented from being illegally copied and maliciously intruded, and safety protection is effectively carried out for the programs.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a program protection method in a micropower wireless information collection system. Background technique [0002] In the micro-power wireless information collection system, in order to prevent the program from being illegally copied and maliciously intruded, it is necessary to protect the program. [0003] In the prior art, in the micro-power wireless information collection system, the program update of each network node is generally issued through broadcast flooding, but the broadcast flooding method in the prior art has great security risks: In addition to the target node, there are many other nodes that may receive the program sent by the network management center and can decrypt the program, which will easily cause the leak of the program. Contents of the invention [0004] The technical problem to be solved by the embodiments of the present invention is to provide ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 崔涛刘柱张孝龙
Owner SHENZHEN FRIENDCOM TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products