Method and product for using ciphertext as electronic identity code of electronic marker
An electronic marker and electronic identity technology, applied in the field of electronic identity codes, can solve problems such as pipeline accidents, underground pipeline data and location leakage, poor security and other problems, and achieve enhanced security, high security, and security high effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.
[0019] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.
[0020] Such as figure 1 As shown, according to the preferred embodiment of the present invention, the method for using the ciphertext as the electronic identity code of the underground electronic marker includes the following steps: Step 101: use the key management system to generate a key through the national secret algorithm; In the key management system, the application key is used to encrypt the TID identification code...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com