Secure communication method based on industrial data bus
一种安全通信、工业数据的技术,应用在通信领域,能够解决不法分子获取数据信息等问题
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] This embodiment discloses a data encryption bus adaptive remote system upgrade method for industrial equipment, such as figure 1 As shown, the method includes: connecting the smart device to the bus network owned by the industrial equipment; after the smart device is powered on, connects to the remote server, connects the transmission link through network technology, and the remote server receives the networking request of the smart device Finally, after establishing the transmission link and waiting for the connection to be completed, listen to the instructions of the remote server; after the remote server sends the data, it performs the first layer of encryption of the software data, and the first layer of encryption is the conversion of the software data to be transmitted ; After the binary conversion of the data is completed, the data is encrypted by the second layer, wherein, the encrypted data of the second layer includes network IP and port; the data after the sec...
Embodiment 2
[0050] This embodiment discloses a data encryption bus adaptive remote upgrade system for industrial equipment, which at least includes smart devices and remote servers. The smart devices are connected to the bus network of industrial devices. After the smart devices are powered on, they connect to the remote server. The transmission link is connected through network technology. After the remote server receives the networking request of the smart device, it establishes the transmission link and waits for the connection to be completed, then monitors the instructions of the remote server; after the remote server sends the data, it performs the first layer of encryption of the software data. The first layer of encryption is the conversion of the software data to be transmitted; after the conversion of the data is completed, the second layer of encryption is carried out to the data, wherein, the network IP and port are included; after the second layer of encryption The final data ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com