Wireless network equipment upgrading program and communication data encryption method

A technology for wireless network equipment and upgrading programs, which is applied in wireless communication, digital data protection, electrical digital data processing, etc. It can solve problems such as failure to achieve encryption, low encryption and decryption efficiency, and abnormal wireless network communication, so as to ensure security Sexuality, avoiding malicious duplication and the effect of copying

Active Publication Date: 2019-03-05
叶毅嵘
View PDF9 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the Internet of Things, wireless sensor networks and embedded systems, each device will be embedded with an embedded CPU processor to execute the embedded program written by the designer to realize the automation and intelligence of the device and system. In the process of program writing, it is inevitable that program code errors will cause problems such as abnormal operation of the device and the need for new functions to be added to the device. In order to solve such problems conveniently, designers usually design an online upgrade mechanism to facilitate program upgrades. Update, but at present, almost all online upgrades use plain text to transmit, store, and upgrade binary programs, which are very easy to be obtained and directed by third parties, resulting in products that product designers spend a lot of manpower, material resources, and time on research and development. , was maliciously plagiarized by a third party shortly after its launch, causing huge losses to product design manufacturers
[0003] In the fields of the Internet of Things and wireless sensor networks, due to the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network equipment upgrading program and communication data encryption method
  • Wireless network equipment upgrading program and communication data encryption method
  • Wireless network equipment upgrading program and communication data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0121] see Figure 8 , the wireless network device in this embodiment consists of the following parts:

[0122] 1, embedded CPU processor, present embodiment adopts STM32F103RD chip, this chip processor main clock is 72MHz, internal program code FLASH space 384Kbyte; This STM32F103RD CPU processor has internal FLASH read protection mechanism, can guarantee to store in CPU processor The program code in it is not readable by third parties;

[0123] 2, SHA256 encryption chip, present embodiment adopts ATSHA204 encryption chip as SHA256 encryption chip, this encryption chip communicates through I2C bus and CPU processor IO connection, can store 16 encryption keys of 32 bytes, and this encryption chip It also has a read protection mechanism, which can protect 16 encryption keys from being read out;

[0124] 3. Wireless communication interface, this embodiment adopts SI4463 wireless communication module to realize wireless communication of equipment;

[0125] 4. Wired communicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless network equipment upgrading program and communication data encryption method. Through simple grouping, XOR, shifting, interpolation processing and an SHA256 hash algorithm, encryption of an embedded upgrading program is realized; and high-reliability encryption of data blocks of the upgrading program is realized by using a cryptographic digest algorithm. When thegrouping, the XOR, the shifting and the interpolation processing are carried out in a program data encryption process each time, numerous random numbers are used; the random numbers and other key data form a cryptographic digest; a ciphertext of the upgrading program can be decrypted only through the cryptographic digest; and encrypted ciphertexts and cryptographic digests generated by encryptingthe same data in different encryption processing devices at different moments are different. According to the method, relatively few code spaces of a CPU of wireless network equipment are occupied; the requirement on the operation speed of the CPU is relatively low; the encryption of the upgrading program and the communication data can be realized by adopting the cheap CPU; and the security of equipment communication and the integrity of the data are ensured.

Description

technical field [0001] The invention relates to the technical field of data encryption, especially the field of the Internet of Things, wireless sensor networks, and embedded systems, and in particular to a method for upgrading programs of wireless network equipment and encrypting communication data. Background technique [0002] In the Internet of Things, wireless sensor networks and embedded systems, each device will be embedded with an embedded CPU processor to execute the embedded program written by the designer to realize the automation and intelligence of the device and system. In the process of program writing, it is inevitable that program code errors will cause problems such as abnormal operation of the device and the need for new functions to be added to the device. In order to solve such problems conveniently, designers usually design an online upgrade mechanism to facilitate program upgrades. Update, but at present, almost all online upgrades use plain text to tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04L9/08H04L9/06H04W12/033H04W12/0433H04W12/10
CPCH04L9/0643H04L9/0861H04W12/02H04W12/06G06F8/65G06F21/602G06F21/64Y02D30/70
Inventor 齐芸芸
Owner 叶毅嵘
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products