Mesh network encryption scheme based on non-public encryption algorithm
An encryption algorithm and encryption scheme technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as poor confidentiality of key data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.
[0016] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.
[0017] The non-public encryption algorithm is introduced into the mesh two-layer encryption to further protect the core application data. Since the non-public encryption algorithm is not disclosed, it usually only exists in the chip in the form of IP, so the confidentiality effect is better than that of the AES algorithm.
[0018] In order to ensure the versatility and coverage of the Mesh network, the encryption and decry...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
