Supercharge Your Innovation With Domain-Expert AI Agents!

4G communication encryption algorithm based on time

An encryption algorithm and time information technology, which is applied in wireless communication, multiplexing communication, time division multiplexing system, etc., to improve the efficiency and reliability of interaction, and prevent forged messages from interfering with the normal communication process.

Active Publication Date: 2020-09-25
YANTAI DONGFANG WISDOM ELECTRIC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention proposes a time-based 4G communication encryption algorithm, the purpose of which is to solve the problems of repeated, invalid, and false message operations on the current interaction tasks between the master station and the terminal, and improve interaction efficiency, data transmission security and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 4G communication encryption algorithm based on time

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0029] Such as figure 1 , a time-based 4G communication encryption algorithm, used for 4G network communication between the master station and the terminal, taking the master station sending ciphertext and then the terminal responding as an example, the steps are:

[0030] (1) Before the master station and the terminal exchange messages that need to be encrypted, the master station and the terminal first check the time. The specific steps are:

[0031] (1.1) The master station initiates a timing command;

[0032] (1.2) After the terminal receives the time adjustment command, it judges the legitimacy of the time adjustment according to the preset logic. If the time adjustment is legal, go to step (1.3), otherwise go to step (1.4);

[0033] (1.3) Terminal update time: If the update is successful, it will return a time-calibration success message, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a 4G communication encryption algorithm based on time, and the specific method comprises the steps that: timing is carried out between a main station and a terminal before themain station and the terminal interact with a to-be-encrypted message each time; the master station and the terminal record effective timing moments and acquire the same time information based on theeffective timing moments; the master station and the terminal respectively take the time information as an authentication identifier in the interaction task; during encryption interaction, a sender combines the authentication identifier with an original message to form a to-be-sent message, and then encrypts and sends the to-be-sent message; and after receiving the message, a receiver analyzes theauthentication identifier in the message and checks whether the authentication identifier in the message is consistent with a locally recorded authentication identifier or not, thereby judging whether the received message is valid or not. The method can solve the problems of repetition, ineffectiveness, fake message operation and the like of the current interaction task, improves the interactionefficiency, and realizes safe and reliable data transmission.

Description

technical field [0001] The invention relates to a communication encryption algorithm, in particular to a time-based 4G communication encryption algorithm for electricity collection. Background technique [0002] With the deepening and popularization of the application of HPLC technology, the collection volume of stations is becoming more and more diverse, and the communication business between the terminal and the main station needs to achieve faster, more accurate, safer and more reliable functional requirements. [0003] In practical applications, there are problems such as repeated and invalid operations on the current interactive tasks by the master station and the terminal, and there are even criminals who intercept the communication messages of the master station and the terminal, so as to tamper with commands, data or set parameters, and forge messages to interfere with normal operations. communication process. Contents of the invention [0004] The present inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/06H04W12/10H04W56/00H04J3/06
CPCH04W12/06H04W56/001H04J3/0638Y04S40/20
Inventor 崔明王小斌赵翔袁阔张权胜马建坤
Owner YANTAI DONGFANG WISDOM ELECTRIC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More