CN107273070A - A kind of intelligent marketing bill bar code printing management control system - Google Patents

A kind of intelligent marketing bill bar code printing management control system Download PDF

Info

Publication number
CN107273070A
CN107273070A CN201710615605.5A CN201710615605A CN107273070A CN 107273070 A CN107273070 A CN 107273070A CN 201710615605 A CN201710615605 A CN 201710615605A CN 107273070 A CN107273070 A CN 107273070A
Authority
CN
China
Prior art keywords
data
mrow
msub
information
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710615605.5A
Other languages
Chinese (zh)
Inventor
陈燕和
李海珍
陈红兵
王西方
余爱芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Normal University
Original Assignee
Hubei Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Normal University filed Critical Hubei Normal University
Priority to CN201710615605.5A priority Critical patent/CN107273070A/en
Publication of CN107273070A publication Critical patent/CN107273070A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3026Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Electromagnetism (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Computer Hardware Design (AREA)
  • Algebra (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of intelligent marketing bill bar code printing management control system, including housing, the surface of housing is provided with display screen, the lower section of display screen is provided with data input button, the upper end of housing is provided with hanging ring, suspension strap is cased with hanging ring, the rear surface of housing is provided with barcode scanning device, and the rear surface of housing, which is additionally provided with, ties up hand strap;Display screen is LED touch display screen;Hand strap is tied up to be made of soft rubber material;Also include camera, central processing unit, alarm, memory and mobile terminal.The present invention is simple in construction, it is reasonable in design, by setting hanging ring and suspension strap, it is easy to the carrying of marketing personnel, and the device can realize that barcode scanning is paid so that apparatus function variation, and by setting data input button, bar code can be generated by data processing unit, and is printed by internal printing bar code device, the use of the marketing personnel of great convenience.

Description

A kind of intelligent marketing bill bar code printing management control system
Technical field
The invention belongs to printing equipment technical field, more particularly to a kind of intelligent marketing bill bar code printing management Control system.
Background technology
Printing bar code apparatus function in the market is single, and existing printing bar code device only supports DOS modes Under printing, not only trouble but also fixation takes place frequently, and being continually changing with means of marketing, it is impossible to meet the marketing Demand, therefore, it is necessary to improvement is designed to it, to meet the demand of the marketing.
Due to the dispersiveness of bar code monitoring point, artificial gathered data and wired data transfer will take for substantial amounts of material resources and Human cost.Simultaneously as lacking unified research method, cause many result comparisons poor.Therefore, a kind of measurement is developed Precisely, easily storage system is safeguarded;But in due to external environment change greatly, the factor such as environment is uncontrollable, wireless sensing system The situation of damage occurs in data acquisition node or long distance wireless data transmission nodal, so as to occur that teledata can not be timely Upload to data server, in addition loss of data situation, therefore there is room for improvement.
In summary, the problem of prior art is present be:Existing market marketing bill bar code printing management control system Management method intelligence degree is low;Printing effect is poor.
The content of the invention
The present invention provides a kind of easy to operate, reasonable in design intelligence to solve technical problem present in known technology Marketing bill bar code printing management control system.
The present invention is adopted the technical scheme that to solve technical problem present in known technology:
A kind of intelligent marketing bill bar code printing management control system, including housing, the surface of the housing is set There is display screen, the lower section of the display screen is provided with data input button, and the upper end of the housing is provided with hanging ring, the hanging ring On be cased with suspension strap, the rear surface of the housing is provided with barcode scanning device, and the rear surface of the housing, which is additionally provided with, ties up hand strap;It is described aobvious Display screen is LED touch display screen;The hand strap of tying up is made of soft rubber material;
The barcode scanning device is provided with camera, with central processing unit wired connection, the marketing for realizing printing The captured in real-time of bill bar code image;
Alarm, with central processing unit wired connection, the marketing bill bar code for monitoring printing in real time is abnormal When, central processing unit is transmitted a signal to, is alarmed;
Memory, with central processing unit wired connection, the marketing account of the printing for storing central processing unit processing Each index parameter and the information to alert process of single bar code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the memory Storage method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to center Data transmission nodal, far-end server is sent the data to by centre data transmission node, if centre data transmission node occurs Damage, then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network, For temporarily storing the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent to wireless sensor data acquisition node Success feedback information;, should if wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal Node will send request signal to centre data transmission node, determine whether centre data transmission node normally runs, if center Data transmission nodal is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node, which will start to gather with other wireless sensor datas, to be saved The communication of point, and the data for being stored this node using coding and storing method are distributed to using the uniform distribution method of coded data and are In each node in system;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jTable It is shown as the i-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
F:Show that r row check bit is according to step E:
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section believes the redundancy produced at random acquired environmental data and by the above method Breath is distributed to other data acquisition nodes after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data Node is 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be to damage number According to being recovered, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy.
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described WLAN includes:Network data download module, for being downloaded from carrier server by the network authentication after public key encryption Data and network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Operator Database, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and The network data authentication module that the network data download module is connected, for obtain in the cipher key store with the public key institute Corresponding private key, is decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption Network authentication data and network configuration data afterwards is authenticated, and certification is after by Network authentication data and network configuration data In operator database shown in deposit;The authentication module being connected with the operator database, for using the operator Network authentication data in database completes authentication request;The network selection module being connected with the operator database, is used In by setting the Network authentication data and network configuration data;Respectively with the network data download module, the authentication The command interpretation module that module is connected with the network selection module, for explaining the order from central processing unit, and will Order after explanation is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, is used Communicated in mobile terminal;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial group of its addition and multiplication structure and n Into;
B. private key is generated:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to report Alert information is handled.
Further, described intelligent marketing bill bar code printing management control system also includes:
Mobile terminal, by WLAN and central processing unit wireless connection, for receiving central processing unit processing Each index parameter information and the information to alert process of the marketing bill bar code of printing;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data point of mobile phone terminal APP data reception modules Method is enjoyed, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media Agreement results in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit root The stream medium data is obtained according to the address information;
Based on the streaming media service, after the confirmation of the central processing unit is received, handled to the center Device exports the stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the memory is got in request, really The fixed any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Further, before the stream medium data is exported to the central processing unit, further comprise:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to described Control information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtain the address information of the stream medium data;, will be described in the currently processed positional information of the acquisition any data file It is untreated in any data file to be partially converted to stream medium data and generation one results in institute by stream media protocol State the address information of stream medium data.
Further, request is shared in the acquisition includes:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The processing stream that any data file is terminated after the confirmation that the center has been handled is received Journey;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described The first data inputted in real time are converted into stream medium data by service.
Further, the data processing method of central processing unit includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table of the dimension table updated Information;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, the dimension table matches somebody with somebody confidence In breath synchronous purpose database is needed with the source database for needing to safeguard where the dimension table of renewal, the dimension table And dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge that the subscriber identity information is It is no to meet the dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard the dimension updated to described Table is updated operation;
The dimension table being updated after operation is synchronized to the purpose database.
Further, the dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
Further, the maintenance more new command is increase content instruction, changes content instruction or delete content instruction;
Before operation is updated to the dimension table for needing maintenance to update, including:
More new command is safeguarded according to described, it is determined that needs safeguard the field updated, and the needs maintenance renewal is got Field field identification;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Its In, the field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
Further, it is described to need to safeguard the dimension updated to described if the maintenance more new command is increase content instruction Table is updated operation, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated behaviour to described Make, including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated behaviour to described Make, including:
Field contents are deleted in one or more of dimension table field.
Further, need to safeguard that the dimension table updated is updated operation to described, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets The field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is used to point out to be discontented with The Field Count of the foot field restrictive condition, and point out to be unsatisfactory for the field relevant information of the field restrictive condition;The word Section relevant information includes the field identification or field name of the field.
The present invention has the advantages and positive effects of:The present invention it is simple in construction, it is reasonable in design, by set hanging ring and Suspension strap, is easy to the carrying of marketing personnel, and the device can realize that barcode scanning is paid so that apparatus function variation, and passes through Data input button is set, bar code can be generated by data processing unit, and is printed by internal printing bar code device, The use of the marketing personnel of great convenience.
Memory of the present invention is used for the information for storing central processing unit processing, when the memory space of storage node network occurs When not enough, system will use freshly harvested data, the data that encoded later replacement is stored at first.If now system has been stored K evidence.Then each data acquisition node will have k according to block group, respectively f1 f2 f3…fk-1 fkIf now adopting The data integrated is fk+1, then to fk+1Encoded, the data block after coding is then replaced into f1Corresponding data block.System The latter data f of collectionk+2The replacement rule of (when the replacement that such as system is set is at intervals of 2) can be set after encoded according to system Then replace f4, by that analogy;This is the irrealizable technique effect of documents 1.Prior art does not disclose the application Described coding and storing method.
The present invention is additionally provided with warning function, and information is transmitted to mobile terminal in time, realizes and alarm.
The present invention can realize the transmission of information by WLAN, while set by the multimode of WLAN, Realize the accurate control of information.
The present invention can carry out data sharing with central processing unit in real time by mobile terminal, carry out remote operation and control.
Central processing unit data processing method of the present invention, has fully ensured that each transmission data constantly in change, there is standard Really the data after processing, are that intelligentized control plays a key effect.
The data sharing of the present invention, the need for having fully ensured that remote control.
Brief description of the drawings
Fig. 1 is overall schematic provided in an embodiment of the present invention;
Fig. 2 is housing rearview provided in an embodiment of the present invention.
In figure:1st, housing;2nd, data input button;3rd, printing outlet;4th, display screen;5th, suspension strap;6th, hanging ring;7th, sweep Imaging apparatus;8th, hand strap is tied up.
Embodiment
In order to further understand the content, features and effects of the present invention, hereby enumerating following examples, and coordinate accompanying drawing Describe in detail as follows.
In summary, the problem of prior art is present be:Existing market marketing bill bar code printing management control system Management method intelligence degree is low;Printing effect is poor.
With reference to knots of the Fig. 1 to Fig. 2 to the intelligent marketing bill bar code printing management control system of the present invention Structure is explained in detail.
Intelligent marketing bill bar code printing management control system provided in an embodiment of the present invention, including housing 1, institute The surface for stating housing 1 is provided with display screen 4, and the lower section of the display screen 4 is provided with data input button 2, and the upper end of the housing 1 is set Have and suspension strap 5 is cased with hanging ring 6, the hanging ring 6, the rear surface of the housing 1 is provided with barcode scanning device 7, the housing 1 Surface, which is additionally provided with, afterwards ties up hand strap 8, and the inside of the housing 1 is provided with data processing unit and printing bar code device, the data Processing unit is connected with printing bar code device telecommunications, and the display screen 4 is LED touch display screen, and the hand strap 8 of tying up is using soft Elastomeric material is made, and the data processing unit is connected by wireless communication unit with payment system, the data processing unit Also it is connected with the memory cell inside housing 1.
With reference to specific embodiment, the invention will be further described.
Barcode scanning device provided in an embodiment of the present invention is provided with camera, and central processing unit wired connection, for realizing The captured in real-time of the marketing bill bar code image of printing;
Alarm, with central processing unit wired connection, the marketing bill bar code for monitoring printing in real time is abnormal When, central processing unit is transmitted a signal to, is alarmed;
Memory, with central processing unit wired connection, the marketing account of the printing for storing central processing unit processing Each index parameter and the information to alert process of single bar code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the memory Storage method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to center Data transmission nodal, far-end server is sent the data to by centre data transmission node, if centre data transmission node occurs Damage, then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network, For temporarily storing the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent to wireless sensor data acquisition node Success feedback information;, should if wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal Node will send request signal to centre data transmission node, determine whether centre data transmission node normally runs, if center Data transmission nodal is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node, which will start to gather with other wireless sensor datas, to be saved The communication of point, and the data for being stored this node using coding and storing method are distributed to using the uniform distribution method of coded data and are In each node in system;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jTable It is shown as the i-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
F:Show that r row check bit is according to step E:
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section believes the redundancy produced at random acquired environmental data and by the above method Breath is distributed to other data acquisition nodes after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data Node is 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be to damage number According to being recovered, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy.
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described WLAN includes:Network data download module, for being downloaded from carrier server by the network authentication after public key encryption Data and network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Operator Database, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and The network data authentication module that the network data download module is connected, for obtain in the cipher key store with the public key institute Corresponding private key, is decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption Network authentication data and network configuration data afterwards is authenticated, and certification is after by Network authentication data and network configuration data In operator database shown in deposit;The authentication module being connected with the operator database, for using the operator Network authentication data in database completes authentication request;The network selection module being connected with the operator database, is used In by setting the Network authentication data and network configuration data;Respectively with the network data download module, the authentication The command interpretation module that module is connected with the network selection module, for explaining the order from central processing unit, and will Order after explanation is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, is used Communicated in mobile terminal;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial group of its addition and multiplication structure and n Into;
B. private key is generated:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to report Alert information is handled.
Described intelligent marketing bill bar code printing management control system also includes:
Mobile terminal, by WLAN and central processing unit wireless connection, for receiving central processing unit processing Each index parameter information and the information to alert process of the marketing bill bar code of printing;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data point of mobile phone terminal APP data reception modules Method is enjoyed, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media Agreement results in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit root The stream medium data is obtained according to the address information;
Based on the streaming media service, after the confirmation of the central processing unit is received, handled to the center Device exports the stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the memory is got in request, really The fixed any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Before the stream medium data is exported to the central processing unit, further comprise:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to described Control information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtain the address information of the stream medium data;, will be described in the currently processed positional information of the acquisition any data file It is untreated in any data file to be partially converted to stream medium data and generation one results in institute by stream media protocol State the address information of stream medium data.
Request is shared in the acquisition to be included:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The processing stream that any data file is terminated after the confirmation that the center has been handled is received Journey;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described The first data inputted in real time are converted into stream medium data by service.
The data processing method of central processing unit includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table of the dimension table updated Information;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, the dimension table matches somebody with somebody confidence In breath synchronous purpose database is needed with the source database for needing to safeguard where the dimension table of renewal, the dimension table And dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge that the subscriber identity information is It is no to meet the dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard the dimension updated to described Table is updated operation;
The dimension table being updated after operation is synchronized to the purpose database.
The dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
The maintenance more new command is increase content instruction, changes content instruction or delete content instruction;
Before operation is updated to the dimension table for needing maintenance to update, including:
More new command is safeguarded according to described, it is determined that needs safeguard the field updated, and the needs maintenance renewal is got Field field identification;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Its In, the field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
It is described to need to safeguard that the dimension table updated is carried out more to described if the maintenance more new command is increase content instruction New operation, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated behaviour to described Make, including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated behaviour to described Make, including:
Field contents are deleted in one or more of dimension table field.
Further, need to safeguard that the dimension table updated is updated operation to described, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets The field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is used to point out to be discontented with The Field Count of the foot field restrictive condition, and point out to be unsatisfactory for the field relevant information of the field restrictive condition;The word Section relevant information includes the field identification or field name of the field.
The present invention is simple in construction, reasonable in design, by setting hanging ring and suspension strap, is easy to the carrying of marketing personnel, and The device can realize that barcode scanning is paid so that apparatus function variation, and by setting data input button, can be by data at Unit generation bar code is managed, and is printed by internal printing bar code device, the use of the marketing personnel of great convenience.
Memory of the present invention is used for the information for storing central processing unit processing, when the memory space of storage node network occurs When not enough, system will use freshly harvested data, the data that encoded later replacement is stored at first.If now system has been stored K evidence.Then each data acquisition node will have k according to block group, respectively f1 f2 f3…fk-1 fkIf now adopting The data integrated is fk+1, then to fk+1Encoded, the data block after coding is then replaced into f1Corresponding data block.System The latter data f of collectionk+2The replacement rule of (when the replacement that such as system is set is at intervals of 2) can be set after encoded according to system Then replace f4, by that analogy;This is the irrealizable technique effect of documents 1.Prior art does not disclose the application Described coding and storing method.
The present invention is additionally provided with warning function, and information is transmitted to mobile terminal in time, realizes and alarm.
The present invention can realize the transmission of information by WLAN, while set by the multimode of WLAN, Realize the accurate control of information.
The present invention can carry out data sharing with central processing unit in real time by mobile terminal, carry out remote operation and control.
Central processing unit data processing method of the present invention, has fully ensured that each transmission data constantly in change, there is standard Really the data after processing, are that intelligentized control plays a key effect.
The data sharing of the present invention, the need for having fully ensured that remote control.
The present invention in use, input the input information of bar code by data input button 2, the information of input through data at Manage cell processing after, by bar code generating into presentation of information on the display screen 4, and by printing bar code device to bar code carry out Printing, the information of bar code will be stored by internal storage unit, when outdoor marketing, and the device can realize gathering functions, sweep Imaging apparatus 7 can be scanned to the Quick Response Code at Client handset end, and data processing unit can be by wireless after handling scanning information Communication unit is connected with payment system.
It is described above to be only the preferred embodiments of the present invention, any formal limitation not is made to the present invention, Every technical spirit according to the present invention is belonged to any simple modification made for any of the above embodiments, equivalent variations and modification In the range of technical solution of the present invention.

Claims (10)

1. a kind of intelligent marketing bill bar code printing management control system, including housing, it is characterised in that the housing Surface be provided with display screen, the lower section of the display screen is provided with data input button, and the upper end of the housing is provided with hanging ring, institute State and suspension strap is cased with hanging ring, the rear surface of the housing is provided with barcode scanning device, and the rear surface of the housing, which is additionally provided with, ties up hand Band;The display screen is LED touch display screen;The hand strap of tying up is made of soft rubber material;
The barcode scanning device is provided with camera, with central processing unit wired connection, the marketing bill for realizing printing The captured in real-time of bar code image;
Alarm, and central processing unit wired connection, will when the marketing bill bar code for monitoring printing in real time is abnormal Signal is transmitted to central processing unit, is alarmed;
Memory, with central processing unit wired connection, the marketing bill bar of the printing for storing central processing unit processing Each index parameter and the information to alert process of shape code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the storage of the memory Method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to centre data Transmission node, far-end server is sent the data to by centre data transmission node, if centre data transmission node is damaged, Then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network, be used for Temporarily store the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent successfully to wireless sensor data acquisition node Feedback information;If wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal, the node Request signal will be sent to centre data transmission node, and determine whether centre data transmission node will normally run, if centre data Transmission node is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node will start and other wireless sensor data acquisition nodes Communicate, and the data for being stored this node using coding and storing method are distributed in system using the uniform distribution method of coded data Each node in;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jIt is expressed as I-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
<mrow> <msub> <mi>c</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>m</mi> </mrow> </msub> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;CirclePlus;</mo> </mrow> <mrow> <mi>j</mi> <mo>=</mo> <mn>0</mn> </mrow> <mrow> <mi>m</mi> <mo>-</mo> <mn>1</mn> </mrow> </munderover> <msub> <mi>c</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>,</mo> <mn>1</mn> <mo>&amp;le;</mo> <mi>i</mi> <mo>&lt;</mo> <mi>m</mi> <mo>-</mo> <mn>1</mn> <mo>;</mo> </mrow>
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
<mrow> <msub> <mi>S</mi> <mi>r</mi> </msub> <mo>=</mo> <munderover> <mrow> <mi></mi> <mo>&amp;CirclePlus;</mo> </mrow> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>-</mo> <mn>1</mn> </mrow> </munderover> <msub> <mi>c</mi> <mrow> <mo>&lt;</mo> <mi>m</mi> <mo>-</mo> <mn>1</mn> <mo>+</mo> <mi>r</mi> <mo>&amp;CenterDot;</mo> <mi>j</mi> <msub> <mo>&gt;</mo> <mi>m</mi> </msub> <mo>,</mo> <mi>j</mi> </mrow> </msub> </mrow>
F:Show that r row check bit is according to step E:
<mrow> <msub> <mi>c</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>m</mi> <mo>+</mo> <mn>2</mn> </mrow> </msub> <mo>=</mo> <msub> <mi>S</mi> <mi>r</mi> </msub> <mo>&amp;CirclePlus;</mo> <mrow> <mo>(</mo> <munderover> <munder> <mo>&amp;CirclePlus;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>0</mn> </mrow> </munder> <mrow> <mo>&lt;</mo> <mi>i</mi> <mo>+</mo> <mi>r</mi> <mo>&amp;CenterDot;</mo> <mi>j</mi> <msub> <mo>&gt;</mo> <mi>m</mi> </msub> <mo>&amp;NotEqual;</mo> <mi>m</mi> <mo>-</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>-</mo> <mn>1</mn> </mrow> </munderover> <msub> <mi>c</mi> <mrow> <mo>&lt;</mo> <mi>i</mi> <mo>+</mo> <mi>r</mi> <mo>&amp;CenterDot;</mo> <mi>j</mi> <msub> <mo>&gt;</mo> <mi>m</mi> </msub> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>)</mo> </mrow> </mrow>
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section passes through the redundancy produced at random acquired environmental data and by the above method Other data acquisition nodes are distributed to after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data node For 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be entered to damage data Row recovers, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy;
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described wireless LAN includes:Network data download module, for being downloaded from carrier server by the Network authentication data after public key encryption And network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Carrier data Storehouse, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and described The network data authentication module that network data download module is connected, for obtain in the cipher key store with corresponding to the public key Private key, be decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption after Network authentication data and network configuration data are authenticated, and Network authentication data and network configuration data are stored in by certification after In shown operator database;The authentication module being connected with the operator database, for using the carrier data Network authentication data in storehouse completes authentication request;The network selection module being connected with the operator database, for leading to Cross and the Network authentication data and network configuration data are set;Respectively with the network data download module, the authentication module The command interpretation module being connected with the network selection module, for explaining the order from central processing unit, and will be explained Order afterwards is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, for Mobile terminal is communicated;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
B. private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
<mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mn>1</mn> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mi>r</mi> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mi>r</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
<mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>,</mo> <mi>&amp;lambda;</mi> <mo>)</mo> </mrow> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&amp;lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
<mrow> <mo>(</mo> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&amp;prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&amp;lambda;</mi> <mo>)</mo> <mo>,</mo> </mrow>
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to alarm Information is handled.
2. intelligence marketing bill bar code printing management control system as claimed in claim 1, it is characterised in that described Intelligent marketing bill bar code printing management control system also include:
Mobile terminal, by WLAN and central processing unit wireless connection, the printing for receiving central processing unit processing Marketing bill bar code each index parameter information and the information to alert process;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data sharing side of mobile phone terminal APP data reception modules Method, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by stream media protocol Result in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit according to institute State address information and obtain the stream medium data;
It is defeated to the central processing unit after confirmation of the central processing unit is received based on the streaming media service Go out the stream medium data.
3. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that according to First data for sharing request determination for sharing include:
If from it is described share the fileinfo of any data file stored on the memory is got in request, it is determined that institute It is the first data for sharing to state any data file;
If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as For the first data shared.
4. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that to The central processing unit is exported before the stream medium data, is further comprised:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to the control Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one by stream media protocol results in institute State the address information of stream medium data;, will be described any in the currently processed positional information of the acquisition any data file It is untreated in data file to be partially converted to stream medium data and generation one results in the stream by stream media protocol The address information of media data.
5. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that described Acquisition is shared request and included:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The handling process that any data file is terminated after the confirmation that the center has been handled is received;
Share described in obtaining after request, using the data inputted in real time as the first data, streaming media service is called based on described The first data inputted in real time are converted into stream medium data.
6. intelligence marketing bill bar code printing management control system as claimed in claim 1, it is characterised in that center The data processing method of processor includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table information of the dimension table updated;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, in the dimension table configuration information With the source database needed to safeguard where the dimension table updated, the dimension table need synchronous purpose database and Dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge whether the subscriber identity information is full The foot dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard that the dimension table updated enters to described Row updates operation;
The dimension table being updated after operation is synchronized to the purpose database.
7. intelligence marketing bill bar code printing management control system as claimed in claim 6, it is characterised in that described Dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
8. intelligence marketing bill bar code printing management control system as claimed in claim 6, it is characterised in that described More new command is safeguarded for increase content instruction, change content instruction or content instruction is deleted;
Before operation is updated to the dimension table for needing maintenance to update, including:
According to the maintenance more new command, it is determined that needs safeguard the field updated, and the word for needing to safeguard renewal is got The field identification of section;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Wherein, The field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
9. intelligence marketing bill bar code printing management control system as claimed in claim 8, it is characterised in that if institute It is increase content instruction to state maintenance more new command, described to need to safeguard that the dimension table updated is updated operation to described, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated operation to described, Including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated operation to described, Including:
Field contents are deleted in one or more of dimension table field.
10. intelligence marketing bill bar code printing management control system as claimed in claim 9, it is characterised in that right It is described to need to safeguard that the dimension table updated is updated operation, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets described Field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is unsatisfactory for institute for prompting The Field Count of field restrictive condition is stated, and points out to be unsatisfactory for the field relevant information of the field restrictive condition;The field phase Closing information includes the field identification or field name of the field.
CN201710615605.5A 2017-07-26 2017-07-26 A kind of intelligent marketing bill bar code printing management control system Pending CN107273070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710615605.5A CN107273070A (en) 2017-07-26 2017-07-26 A kind of intelligent marketing bill bar code printing management control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710615605.5A CN107273070A (en) 2017-07-26 2017-07-26 A kind of intelligent marketing bill bar code printing management control system

Publications (1)

Publication Number Publication Date
CN107273070A true CN107273070A (en) 2017-10-20

Family

ID=60078229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710615605.5A Pending CN107273070A (en) 2017-07-26 2017-07-26 A kind of intelligent marketing bill bar code printing management control system

Country Status (1)

Country Link
CN (1) CN107273070A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108446752A (en) * 2018-03-16 2018-08-24 北京摩拜科技有限公司 A kind of portable bar code Preparation equipment
CN108597562A (en) * 2018-04-16 2018-09-28 刘民堂 A kind of hospital clinical system based on Internet of Things

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202887340U (en) * 2012-10-23 2013-04-17 郑葵 Marketing management bill bar code printing management system
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN103886732A (en) * 2014-03-27 2014-06-25 中国科学院成都生物研究所 High-reliability ecological environmental parameter wireless-sensing system
CN104182649A (en) * 2014-09-10 2014-12-03 钟礼军 Handheld mobile internet-of-things extracorporeal rapid detector and use method
CN105455525A (en) * 2015-11-20 2016-04-06 宁波大业产品造型艺术设计有限公司 Internet of Things intelligent vase
CN106651741A (en) * 2016-12-09 2017-05-10 西华大学 Cloud computing-based graphic processing system
CN206271034U (en) * 2016-12-05 2017-06-20 湖北迈士科技有限公司 Bar code is false proof and checking system
CN106860986A (en) * 2017-03-03 2017-06-20 庞彩苓 A kind of oxygen Ventilator Control System based on Internet of Things

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202887340U (en) * 2012-10-23 2013-04-17 郑葵 Marketing management bill bar code printing management system
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN103886732A (en) * 2014-03-27 2014-06-25 中国科学院成都生物研究所 High-reliability ecological environmental parameter wireless-sensing system
CN104182649A (en) * 2014-09-10 2014-12-03 钟礼军 Handheld mobile internet-of-things extracorporeal rapid detector and use method
CN105455525A (en) * 2015-11-20 2016-04-06 宁波大业产品造型艺术设计有限公司 Internet of Things intelligent vase
CN206271034U (en) * 2016-12-05 2017-06-20 湖北迈士科技有限公司 Bar code is false proof and checking system
CN106651741A (en) * 2016-12-09 2017-05-10 西华大学 Cloud computing-based graphic processing system
CN106860986A (en) * 2017-03-03 2017-06-20 庞彩苓 A kind of oxygen Ventilator Control System based on Internet of Things

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108446752A (en) * 2018-03-16 2018-08-24 北京摩拜科技有限公司 A kind of portable bar code Preparation equipment
CN108597562A (en) * 2018-04-16 2018-09-28 刘民堂 A kind of hospital clinical system based on Internet of Things

Similar Documents

Publication Publication Date Title
US20210089679A1 (en) Method for handling privacy data
CN109698822A (en) Combination learning method and system based on publicly-owned block chain and encryption neural network
CN102150392B (en) Data transmission method between network node
CN104363250B (en) A kind of method and system for equipment connection
CN108696553A (en) A kind of Internet of Things network control system based on mixed cloud
CN106982203A (en) The ATM network system and its information processing method of robust based on block chain technology
CN107710718A (en) For virtual Internet of Things (IoT) device and the system and method at center
CN108475317A (en) System and method for protecting Internet of Things (IoT) device preset
CN106059757A (en) Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN110380844A (en) A kind of quantum key delivering method, equipment and storage medium
CN103795529A (en) Wireless sensor network data safety infusion method based secret key vectors
CN109544892A (en) A kind of wisdom agricultural things-internet gateway system
CN207053552U (en) A kind of digital home device based on mixed cloud and isomery Internet of Things
JP5311459B2 (en) Information collection system and external access device
CN114615094B (en) Storage method and device based on Internet of things and security chip
CN109858272A (en) Blacklist data processing system based on block chain
CN106960166A (en) A kind of smart jack management system and its method based on distributed general ledger technology
CN116405283B (en) Data encryption authentication system based on information data protection
CN110049027A (en) A kind of transmission platform for block chain network information
CN107273070A (en) A kind of intelligent marketing bill bar code printing management control system
CN109040301A (en) Wisdom security protection data system based on Internet of Things
CN103259787A (en) Safety interactive method of cloud and terminal based on JSON protocol packet in medical field
KR101807429B1 (en) Remote management apparatus and method fof updating batch parameter of smartmeter
CN103402242A (en) Single-point payment wireless router connecting system
CN104717644A (en) Two-tiered wireless sensor network range query method capable of verifying privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171020

RJ01 Rejection of invention patent application after publication