Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for encrypting and verifying a generator set controller and an encryption system

A generator set and controller technology, applied in transmission systems, digital transmission systems, random number generators, etc., can solve the problems of strengthening corporate brand influence, disadvantage, damage to corporate economic benefits, etc., to strengthen brand influence, The effect of deterring piracy and avoiding economic damage

Active Publication Date: 2022-04-29
SMARTGEN TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually companies invest a lot of time and money in research and development of a new type of generator set controller, but as soon as the new type of generator set controller is on the market, competitors make pirated controllers by illegally copying the program codes in the generator set controller's single-chip microcomputer; the market The pirated controllers that appear on the Internet will not only cause damage to the economic benefits of the company, but also go against strengthening the brand influence of the company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] A method for encrypting a generator set controller, comprising the following steps: an upper computer reads the unique ID serial number of the single-chip microcomputer of the generator set controller; the upper computer generates a random number A, and inserts the random number A into the unique ID sequence of the single-chip computer A certain position in the number generates an intermediate code A; wherein, the intermediate code A includes the unique ID serial number of the single-chip microcomputer and the random number A; the host computer performs MD5 verification on the intermediate code A, and checks the obtained MD5 The verification value is used as the secret key of the corresponding generator set controller; the host computer writes the random number A and the secret key into the corresponding generator set controller, and encrypts the program file of the generator set controller.

[0024] Among them, the unique ID serial number of the single-chip microcompute...

Embodiment 2

[0031] The difference between this embodiment and embodiment 1 is:

[0032] In this embodiment, before sending the random number A and the secret key to the generator set controller, it is also executed: the host computer sends an unlocking instruction to the generator set controller; the generator set controller receives an unlock command from the host computer sent unlock command, and judge whether the unlock command is consistent with the preset unlock command; If they are inconsistent, it is determined that the unlocking of the genset controller is unsuccessful, and the genset controller is not allowed to communicate with the host computer.

[0033] After the genset controller receives and stores the random number A and the secret key, it is further executed: the host computer sends a lock command to the genset controller; the genset controller receives the lock sent by the host computer Command, and judge whether the lock command is consistent with the preset lock comman...

Embodiment 3

[0036] The difference between this embodiment and the foregoing embodiment is:

[0037] In this embodiment, the upper computer is provided with a random number generation module, which is used to generate the first random number of two bytes; then, the upper computer randomly extracts two bytes in the unique ID serial number of the single-chip microcomputer as For the second random number, the remainder of the first random number and the second random number is processed, and the remainder is used as the random number A, which further increases the encryption cracking difficulty of the generator set controller.

[0038] In other embodiments, the host computer may set a random number generating module to generate the random number A. Alternatively, the host computer sets a random number generating module to generate a third random number; then, the host computer encrypts the third random number, and uses the encrypted third random number as random number A.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for encrypting and verifying a generator set controller and an encryption system. The method for encrypting a generator set controller includes the following steps: the host computer reads the unique ID serial number of the single-chip microcomputer of the generator set controller; the host computer generates random number A, and insert the random number A into the specified position in the unique ID serial number of the single-chip microcomputer to generate a plaintext digital string; wherein, the plaintext digital string includes the unique ID serial number of the single-chip microcomputer and the random number A; The plaintext digital string is MD5 checked, and the obtained MD5 check value is used as the secret key of the corresponding generator set controller; the host computer sends the random number A and the secret key to the generator set controller, and the corresponding The genset controller is encrypted; it increases the difficulty of decrypting the encryption, thereby preventing the program of the genset controller from being copied and embezzled by others.

Description

technical field [0001] The invention relates to the technical field of generator set anti-piracy, in particular to a method for encrypting and verifying a generator set controller and an encryption system. Background technique [0002] As the brain part of the generator set, the generator set controller not only provides the functions of starting, stopping, data measurement, data display and fault protection of the engine, but also provides the functions of power measurement, display and protection of the generator. The automatic control of the generating set has gone through three stages of relay control, PLC control and intelligent control, and is developing towards a more intelligent and humanized aspect. [0003] Usually companies invest a lot of time and money in research and development of a new type of generator set controller, but as soon as the new type of generator set controller is on the market, competitors make pirated controllers by illegally copying the progra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F7/58H04L9/08H04L9/06H04L9/32
CPCG06F21/12G06F7/588H04L9/0866H04L9/0869H04L9/0643H04L9/3239
Inventor 冯斌崔文峰王磊王向前王洪杰
Owner SMARTGEN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products