An Authorization Method Based on CAN Communication Encryption
A CAN communication and authorization code technology, applied in the field of authorization based on CAN communication encryption, can solve the problems of increased operating load, more bus resources, and increased production costs, so as to improve accuracy and reliability, make it difficult to crack, and improve security. sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0035] Such as Figure 1 to Figure 4 Shown, the present invention is a kind of authorization method based on CAN communication encryption, comprises the following steps:
[0036] Step A: The master device generates a 16-byte random sequence code and broadcasts it to each node device. At the same time, after the master device is connected and paired with the communication device, it generates an 8-byte first authorized random code according to the 16-byte random sequence code. The master device will The random authorization code and the barcode of the master device are transmitted to the node device, and the node device sends its ID to the master device to complete the information exchange;
[0037] Step B: The main device looks up the codebook according to the first authorized random code as an index, obtains the second authorized random code,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


