Concentrator data security management method
A technology of data security and management methods, applied in the field of data security management of concentrators, can solve problems such as data inability to write, hidden dangers of data security, data loss, inability to erase and write FALSH, etc., to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention provides a complete program for the data stored in the concentrator, the program will save the data is encrypted, and adds the CRC check, so can guarantee the security of user data, but also to ensure the correctness of the data. At the same time, important data concentrator meter will be backed up against the original data is lost or destroyed, the concentrator can recover data in a timely manner.
[0039] The present invention will be described in more detail below with reference to the accompanying drawings. While a preferred embodiment of the present invention, however it should be understood that the present invention may be implemented in various forms and embodiments should not be set forth herein limits the accompanying drawings. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and the full scope of the invention convey the skill in the art.
[0040] figure 1 Shows a view of the step of a centralize...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


