Encryption/Decryption Process:
- Decode from base64
- Decrypt using key
- Check for illegal characters (Non AlphaNumeric) and illegal lengths to prevent code injection (Marshall's injection exploit)
- Split based on comma delimited arguments
- UCI Commandline with args
On Connection Send:
- Model
- Image Version
- Event Timestamp