Program Protection Method in Micropower Wireless Information Collection System
A micro-power wireless, information collection technology, applied in transmission systems and key distribution, can solve problems such as security risks and program leakage, and achieve the effect of preventing illegal intrusion and copying
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0018] The invention provides a program protection method in a micro-power wireless information acquisition system, such as figure 1 As shown, including the following steps:
[0019] 101. The first network node and the second network node receive a program sent in a broadcast flood mode;
[0020] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;
[0021] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;
[0022] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;
[0023] 102. The first network node calls the saved first set of keys to decrypt and s...
Embodiment 2
[0026] The invention provides a program protection method in a micro-power wireless information acquisition system, such as figure 2 As shown, including the following steps:
[0027] 201. The first network node and the second network node receive a program sent in a broadcast flood mode;
[0028] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;
[0029] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;
[0030] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;
[0031] 202. The first network node calls the saved first set of keys to decrypt and ...
Embodiment 3
[0037] The invention provides a program protection method in a micro-power wireless information acquisition system, such as image 3 As shown, including the following steps:
[0038] 301. The first network node and the second network node receive a program sent in a broadcast flood mode;
[0039] The first network node and the second network node are any two nodes in the micro-power wireless information collection system except the network management center;
[0040] The above program is issued by the network management center in a broadcast flood mode, and is encrypted by the above network management center before sending. The key of the above program is the first set of keys, and the first set of keys is only stored in the first network node and the network management center in;
[0041] Further, the first group of keys includes at least two keys, and each group of the program uses a separate key;
[0042] 302. The first network node calls the saved first set of keys to decrypt and s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 