![]() ![]() ![]() These two methods can provide DLMS communication security features, since porting the DLMS security module in the source code of the DLMS module requires a lot of work, but it is not easy to provide communication security features using these methods. In addition, an encryption key may leak through a memory leak if an encryption algorithm module is installed as software. In addition, another object of the present invention is to minimize the risk of leakage of an encryption key by providing DLMS communication security functions using a smart card. 4Īnother object of the present invention is to provide communication security features that can ensure the integrity and confidentiality of DLMS messages. Yet another object of the present invention is to increase the security of an encryption key by updating the encryption key in an encryption key update interval. DLMS METER READING SOFTWARE VERIFICATION. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |