Encrypting device and encrypting method for safely modifying information protocol message
A protocol message and a technology for modifying messages are applied in the field of encryption devices for realizing secure modification of information protocol messages, and can solve problems such as inability to modify device configuration information safely.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] (1) The server broadcasts a hello message with its own mac address to the entire network.
[0028] (2) After the client receives the hello message from the server, it calculates the private key of the server and sends a hello message to the server.
[0029] (3) After the server receives the hello message from the client, it calculates the private key of the client. And send a confirmation message to the client, wherein the message carries a private key field, and its field needs to be encrypted with a public key (the public key is configured in the server and customer service end when the device leaves the factory). Tell the client that the communication data area needs to be encrypted with a private key in the future.
[0030] (4) The private key of the subsequent encrypted data area is: (server's MAC&server's MAC)%6
[0031] (5) After receiving the confirmation message from the server, the client sends a success message carrying its own MAC information to the server...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 