GW376.1 protocol message encryption method and device
An encryption method and message technology, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve problems such as rising project costs, and achieve the effects of ensuring authenticity and confidentiality, improving security, and reducing project costs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] like figure 1As shown, the present invention provides a GW376.1 protocol message encryption method, specifically comprising the following steps:
[0057] S10: Acquiring a communication instruction, the communication instruction carries message reassembly information and basic information of the acquisition terminal, and the basic information includes a terminal identifier, an encryption key, and an authentication key.
[0058] Wherein, the authentication key refers to a key used to authenticate the acquisition terminal. The terminal identifier refers to an identifier used to uniquely identify a collection terminal. In this embodiment, the ex-factory code of the acquisition terminal is used as the terminal identifier, and the ex-factory code is 84-byte unsigned integer data.
[0059] S20: Acquire corresponding recombined data based on the message reorganization information carried in the communication command, and generate message text.
[0060] S30: Randomly generate...
Embodiment 2
[0096] like image 3 As shown, the difference between this embodiment and Embodiment 1 is that a GW376.1 protocol message encryption device includes:
[0097] The communication instruction acquiring module 10 is used to acquire the communication instruction, the communication instruction carries the message reassembly information and the basic information of the collection terminal, the basic information includes the terminal identification, the encryption key and the authentication key.
[0098] The message text generation module 20 is configured to obtain corresponding recombined data based on message reassembly information carried in the communication command, and generate message text.
[0099] The call counter generation module 30 is configured to randomly generate a call counter based on the communication instruction.
[0100] The initialization vector generation module 40 is configured to generate an initialization vector based on the call counter and the terminal iden...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



