A method for encrypting and verifying a generator set controller and an encryption system
A generator set and controller technology, applied in transmission systems, digital transmission systems, random number generators, etc., can solve the problems of strengthening corporate brand influence, disadvantage, damage to corporate economic benefits, etc., to strengthen brand influence, The effect of deterring piracy and avoiding economic damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0023] A method for encrypting a generator set controller, comprising the following steps: an upper computer reads the unique ID serial number of the single-chip microcomputer of the generator set controller; the upper computer generates a random number A, and inserts the random number A into the unique ID sequence of the single-chip computer A certain position in the number generates an intermediate code A; wherein, the intermediate code A includes the unique ID serial number of the single-chip microcomputer and the random number A; the host computer performs MD5 verification on the intermediate code A, and checks the obtained MD5 The verification value is used as the secret key of the corresponding generator set controller; the host computer writes the random number A and the secret key into the corresponding generator set controller, and encrypts the program file of the generator set controller.
[0024] Among them, the unique ID serial number of the single-chip microcompute...
Embodiment 2
[0031] The difference between this embodiment and embodiment 1 is:
[0032] In this embodiment, before sending the random number A and the secret key to the generator set controller, it is also executed: the host computer sends an unlocking instruction to the generator set controller; the generator set controller receives an unlock command from the host computer sent unlock command, and judge whether the unlock command is consistent with the preset unlock command; If they are inconsistent, it is determined that the unlocking of the genset controller is unsuccessful, and the genset controller is not allowed to communicate with the host computer.
[0033] After the genset controller receives and stores the random number A and the secret key, it is further executed: the host computer sends a lock command to the genset controller; the genset controller receives the lock sent by the host computer Command, and judge whether the lock command is consistent with the preset lock comman...
Embodiment 3
[0036] The difference between this embodiment and the foregoing embodiment is:
[0037] In this embodiment, the upper computer is provided with a random number generation module, which is used to generate the first random number of two bytes; then, the upper computer randomly extracts two bytes in the unique ID serial number of the single-chip microcomputer as For the second random number, the remainder of the first random number and the second random number is processed, and the remainder is used as the random number A, which further increases the encryption cracking difficulty of the generator set controller.
[0038] In other embodiments, the host computer may set a random number generating module to generate the random number A. Alternatively, the host computer sets a random number generating module to generate a third random number; then, the host computer encrypts the third random number, and uses the encrypted third random number as random number A.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com