Wired terminal to network controller encryption method
A technology of wired terminals and encryption methods, which is applied to electrical components, transmission systems, etc., can solve problems such as data leakage and data without encryption methods, and achieve the effect of increasing security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0026] the term:
[0027] TPDU: Transport Protocol Data Unit. Represents a message sent from one transport entity to another;
[0028] EDS: encryption definition part, part of TPDU, defines how to encrypt messages;
[0029] KIN: key index number, which is set by the acquirer for a terminal, so that each terminal has its own independent transaction key;
[0030] ID=70: Encrypted message;
[0031] ID=60: unencrypted or decrypted message.
[0032] refer to figure 1 Shown, a kind of encryption method from wired terminal to network controller, it comprises the following steps
[0033] 100. When starting the wired terminal, sign in the network controller and establish data interconnection, and pre-register several keys in the wired terminal.
[0034] Every time you start a wired terminal, you first need to sign in on the network controller to prevent the hardware and software of the wired terminal from being tampered with. During the sign-in process, the network controller and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


