An electronic cigarette and its encryption and decryption authentication method
An authentication method, the technology of electronic cigarettes, applied in the direction of tobacco, etc., can solve the problems of difficult to achieve effective encryption authentication, unsafe and reliable, etc., achieve high anti-counterfeiting performance, enhance anti-counterfeiting function, and improve the effect of encryption performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0065] In this embodiment, the communication and interaction process between the device of the electronic cigarette and the pod is as follows: image 3 As shown, it is divided into three parts: RESET connection handshake, UID, TM query, and heating wire switch control. The data will be interacted through the Smart-Wire single line, the device is the master device, the pod is the slave device, and the data initiator is the main equipment.
[0066] In this embodiment, the interaction between the device and the pod adopts an encryption mechanism combining fixed key encryption and dynamic key encryption, and the specific implementation is as follows:
[0067] 1. RESET handshake connection
[0068] When the electronic cigarette is inhaled, the device sends a RESET handshake command. At this time, the data will not be CRC checked and encrypted, and the data will be transmitted in plain text format.
[0069] 2. UID, TM query
[0070] After the device and pod RESET are successfully...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


