Unlock instant, AI-driven research and patent intelligence for your innovation.

Program Protection Method in Micropower Wireless Information Collection System

A micro-power wireless, information collection technology, applied in transmission systems and key distribution, can solve problems such as security risks and program leakage, and achieve the effect of preventing illegal intrusion and copying

Active Publication Date: 2016-04-13
SHENZHEN FRIENDCOM TECH DEV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in the micro-power wireless information collection system, the program update of each network node is generally delivered through broadcast flooding, but the broadcast flooding method in the prior art has great security risks: In addition to the target node, there are many other nodes that may receive the program sent by the network management center and can decrypt the program, which can easily cause program leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program Protection Method in Micropower Wireless Information Collection System
  • Program Protection Method in Micropower Wireless Information Collection System
  • Program Protection Method in Micropower Wireless Information Collection System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] The invention provides a program protection method in a micro-power wireless information acquisition system, such as figure 1 As shown, including the following steps:

[0019] 101. The first network node and the second network node receive a program sent in a broadcast flood mode;

[0020] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0021] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;

[0022] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;

[0023] 102. The first network node calls the saved first set of keys to decrypt and s...

Embodiment 2

[0026] The invention provides a program protection method in a micro-power wireless information acquisition system, such as figure 2 As shown, including the following steps:

[0027] 201. The first network node and the second network node receive a program sent in a broadcast flood mode;

[0028] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0029] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;

[0030] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;

[0031] 202. The first network node calls the saved first set of keys to decrypt and ...

Embodiment 3

[0037] The invention provides a program protection method in a micro-power wireless information acquisition system, such as image 3 As shown, including the following steps:

[0038] 301. The first network node and the second network node receive a program sent in a broadcast flood mode;

[0039] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;

[0040] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;

[0041] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;

[0042] 302. The first network node calls the saved first set of keys to decrypt and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention relates to the technical field of communication, and discloses a method for protecting programs in a micro-power wireless information acquisition system. The method includes steps that a first network node and a second network node receive a program transmitted in a broadcast flooding mode; the program is encrypted by a network management center before being transmitted and has first groups of secrete keys, and the first groups of secrete keys are only stored in the first network node and the network management center; the first network node and the second network node are optional two network nodes in the micro-power wireless information acquisition system; the first network node calls the stored first group of secrete keys to decrypt the received program and stores the received program; and the second network node calls a stored second group of secrete keys to decrypt the received program, and the program is discarded if the program fails to be decrypted. The method has the advantages that the programs can be prevented from being illegally copied and maliciously intruded, and safety protection is effectively carried out for the programs.

Description

Technical field [0001] The invention relates to the field of communication technology, in particular to a program protection method in a micro-power wireless information acquisition system. Background technique [0002] In the micro-power wireless information collection system, in order to prevent the program from being illegally copied and maliciously invaded, the program needs to be secured. [0003] In the prior art, in the micro-power wireless information collection system, the program update of each network node is generally issued through broadcast flooding, but the broadcast flooding method in the prior art has great security risks: In addition to the target node, there are many other nodes that may receive the program sent by the network management center and can decrypt the program, which can easily cause program leakage. Summary of the invention [0004] The technical problem to be solved by the embodiments of the present invention is to provide a program protection metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 崔涛刘柱张孝龙
Owner SHENZHEN FRIENDCOM TECH DEV