CN111935175A - Data encryption transmission method of detection equipment - Google Patents

Data encryption transmission method of detection equipment Download PDF

Info

Publication number
CN111935175A
CN111935175A CN202010960556.0A CN202010960556A CN111935175A CN 111935175 A CN111935175 A CN 111935175A CN 202010960556 A CN202010960556 A CN 202010960556A CN 111935175 A CN111935175 A CN 111935175A
Authority
CN
China
Prior art keywords
detection
data
value
data sending
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010960556.0A
Other languages
Chinese (zh)
Other versions
CN111935175B (en
Inventor
郭静
舒芹
董思远
杨思雨
张雪娇
赵愿安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaxin Biotechnology Wuhan Co ltd
Original Assignee
Huaxin Biotechnology Wuhan Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaxin Biotechnology Wuhan Co ltd filed Critical Huaxin Biotechnology Wuhan Co ltd
Priority to CN202010960556.0A priority Critical patent/CN111935175B/en
Publication of CN111935175A publication Critical patent/CN111935175A/en
Application granted granted Critical
Publication of CN111935175B publication Critical patent/CN111935175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

A data encryption transmission method of detection equipment comprises the following steps: s1, dividing the usage of the detection equipment according to the functions, wherein the usage dividing result is a detection module and a data sending module; numbering each use unit of the detection module; s2, periodically detecting the functions of the detection module according to the numbers; and S3, after the detection is passed, starting the data sending function of the data sending module, and carrying out encrypted data transmission after the detection of the substance to be detected is finished.

Description

Data encryption transmission method of detection equipment
Technical Field
The invention relates to the technical field of data transmission in instruments, in particular to a data encryption transmission method of detection equipment.
Background
Biochemical analyzers, also commonly referred to as biochemics, are instruments that use the principle of optoelectric colorimetry to measure a particular chemical component in a body fluid. Because of its fast measuring speed, high accuracy and small reagent consumption, it is widely used in hospitals, epidemic prevention stations and family planning service stations.
The method aims at the problems that in the prior art, the whole data acquisition process is not checked before the data encryption transmission process of biochemical analysis and detection equipment, and even if a safe encryption mode is adopted, the safety of the whole data transmission cannot be guaranteed due to the insecurity of the acquisition process.
Disclosure of Invention
In view of the above, the present invention provides a data encryption transmission method for a detection device, which includes the following steps:
s1, dividing the usage of the detection equipment according to the functions, wherein the usage dividing result is a detection module and a data sending module; numbering each use unit of the detection module;
s2, periodically detecting the functions of the detection module according to the numbers, wherein the functions comprise:
s21, initializing the function of each usage unit, and carrying out integrity check on each usage unit; and generating initial data vectors according to the complete check result, wherein the initial data vectors are arranged by numbers
Figure 281732DEST_PATH_IMAGE001
(ii) a And obtaining a data vector through a first preset algorithm
Figure 62606DEST_PATH_IMAGE002
Arrangement of
Figure 313459DEST_PATH_IMAGE003
Wherein n is the total number of usage units:
Figure 157306DEST_PATH_IMAGE004
(ii) a Wherein the content of the first and second substances,
Figure 228030DEST_PATH_IMAGE005
for the configuration of the nth use unit,
Figure 547016DEST_PATH_IMAGE006
the initial optimal configuration scheme is the nth application unit;
s22, initialization
Figure 652375DEST_PATH_IMAGE007
Then the initial integrity of the detection module is
Figure 398614DEST_PATH_IMAGE008
Wherein
Figure 222214DEST_PATH_IMAGE009
Is a function of integrity, and
Figure 79311DEST_PATH_IMAGE010
wherein
Figure 304756DEST_PATH_IMAGE011
The initial integrity value of the detection module passing the detection is obtained;
s23, items detected by the detection module
Figure 221897DEST_PATH_IMAGE012
Figure 267213DEST_PATH_IMAGE013
Calculating and obtaining the influence value of each item,
Figure 928002DEST_PATH_IMAGE014
integrating the values of the items from large to small to obtain a sequence value, and ordering
Figure 7953DEST_PATH_IMAGE015
Is that
Figure 95995DEST_PATH_IMAGE016
Is determined by the sequence of values of (a),and order
Figure 628607DEST_PATH_IMAGE017
(ii) a Wherein
Figure 93087DEST_PATH_IMAGE018
For balancing the factors, for increasing the integrity value of an item in an iteration,
Figure 27545DEST_PATH_IMAGE019
to represent the first
Figure 286488DEST_PATH_IMAGE020
The result value of the check of the use unit of the item is
Figure 306396DEST_PATH_IMAGE021
An overhead value of time;
s24, order
Figure 574567DEST_PATH_IMAGE022
And make a judgment on
Figure 629110DEST_PATH_IMAGE023
Whether or not it is greater than n, in
Figure 58955DEST_PATH_IMAGE023
If the value is larger than n, jumping to step S28; in that
Figure 831739DEST_PATH_IMAGE023
When n is less than or equal to n, go to step S25;
s25, order
Figure 638021DEST_PATH_IMAGE024
For a data set
Figure 281491DEST_PATH_IMAGE025
Whether there is a viable configuration scenario
Figure 413396DEST_PATH_IMAGE026
In the absence of a viable configuration scheme,jumping to step S26; otherwise, calculating and judging
Figure 142317DEST_PATH_IMAGE027
Whether or not greater than
Figure 752290DEST_PATH_IMAGE028
Above that
Figure 530495DEST_PATH_IMAGE028
When it is used, order
Figure 567721DEST_PATH_IMAGE029
And will be
Figure 49518DEST_PATH_IMAGE028
Is updated to
Figure 197603DEST_PATH_IMAGE030
And simultaneously jumps to step S24 and step S27; at less than or equal to
Figure 81245DEST_PATH_IMAGE028
If yes, go to step S29;
s26, order
Figure 289373DEST_PATH_IMAGE031
And jumps to step S24;
s27, judgment
Figure 992886DEST_PATH_IMAGE032
Whether or not the value of (d) is increased at least once in the n-th loop of steps S24-S26, jumping to step S23 when increased; otherwise, jumping to step S29;
s28, order
Figure 944662DEST_PATH_IMAGE033
Judgment of
Figure 682811DEST_PATH_IMAGE034
Whether or not less than the value
Figure 61839DEST_PATH_IMAGE035
If so, go to step S29; otherwise, jumping to step S23;
s29, mixing
Figure 252649DEST_PATH_IMAGE032
The value passes the detected final integrity value and jumps to step S3,
and S3, after the detection is passed, starting the data sending function of the data sending module, and carrying out encrypted data transmission after the detection of the substance to be detected is finished.
In the data encryption transmission method of the detection device according to the present invention,
the step S1 further includes:
the data sending module is further divided into a data sending activation unit and a data sending unit according to functions, wherein the data sending activation unit is used for starting the data sending function of the data sending module after the function detection of the detection module is passed;
the data sending unit is used for carrying out data encryption transmission after the data sending function of the data sending module is started.
In the data encryption transmission method of the detection device according to the present invention,
the step S3 is followed by:
and in the detection process of the past, the actual detection values of all the application units in the detection module and the detection time corresponding to the actual detection values are obtained, a verification data set is generated, and the actual detection effect of the detection module is evaluated according to the verification matrix.
Compared with the prior art, the data encryption transmission method of the detection equipment has the following advantages: by detecting the data sending module, starting the data sending function of the data sending module only after the detection is passed, and carrying out encrypted data transmission after the detection of the substance to be detected is finished, the defect that in the prior art, the whole data acquisition process is not checked before the data encryption transmission process of biochemical analysis and detection equipment, even if a safe encryption mode is adopted, the safety of the whole data transmission cannot be guaranteed due to the insecurity of the acquisition process is overcome.
Drawings
Fig. 1 is a flowchart of a data encryption transmission method of a detection device according to an embodiment of the present invention.
Detailed Description
As shown in fig. 1, in view of this, in an embodiment of the present invention, the present invention provides a data encryption transmission method for a detection device, which includes the following steps:
s1, dividing the usage of the detection equipment according to the functions, wherein the usage dividing result is a detection module and a data sending module; numbering each use unit of the detection module;
s2, periodically detecting the functions of the detection module according to the numbers, wherein the functions comprise:
s21, initializing the function of each usage unit, and carrying out integrity check on each usage unit; and generating initial data vectors according to the complete check result, wherein the initial data vectors are arranged by numbers
Figure 8116DEST_PATH_IMAGE036
(ii) a And obtaining a data vector through a first preset algorithm
Figure 600771DEST_PATH_IMAGE037
Arrangement of
Figure 885122DEST_PATH_IMAGE038
Wherein n is the total number of usage units: in an embodiment of the invention, the individual use units are connected in series and the different use units assume the dominance of different items in the biochemical test.
Figure 563228DEST_PATH_IMAGE039
(ii) a Wherein the content of the first and second substances,
Figure 122385DEST_PATH_IMAGE040
as a configuration party of the nth use unitIn a case that the table is used,
Figure 569547DEST_PATH_IMAGE041
the initial optimal configuration scheme is the nth application unit;
Figure 555958DEST_PATH_IMAGE042
the configuration scheme for the nth application unit refers to the number of internal elements provided in the application unit for ensuring the item detection accuracy. The optimal configuration scheme refers to the minimum number of internal components provided for ensuring item detection accuracy.
S22, initialization
Figure 455781DEST_PATH_IMAGE043
Then the initial integrity of the detection module is
Figure 287470DEST_PATH_IMAGE044
Wherein
Figure 854718DEST_PATH_IMAGE045
Is a function of integrity, and
Figure 746451DEST_PATH_IMAGE046
wherein
Figure 399149DEST_PATH_IMAGE047
The initial integrity value of the detection module passing the detection is obtained; the integrity refers to the detection accuracy rate which meets the requirement when the detection module is used for detection.
S23, items detected by the detection module
Figure 300109DEST_PATH_IMAGE048
Figure 724792DEST_PATH_IMAGE049
Calculating and obtaining the influence value of each item,
Figure 53006DEST_PATH_IMAGE050
integrating the values of the items from large to small to obtain a sequence value, and ordering
Figure 927421DEST_PATH_IMAGE051
Is that
Figure 100913DEST_PATH_IMAGE052
And sequence value of (1), and
Figure 642753DEST_PATH_IMAGE053
(ii) a Wherein
Figure 876288DEST_PATH_IMAGE054
For balancing the factors, for increasing the integrity value of an item in an iteration,
Figure 503578DEST_PATH_IMAGE055
to represent the first
Figure 480762DEST_PATH_IMAGE056
The result value of the check of the use unit of the item is
Figure 877108DEST_PATH_IMAGE057
Overhead value of time, which is a cost expenditure due to the increase in the number of internal components;
s24, order
Figure 281545DEST_PATH_IMAGE058
And make a judgment on
Figure 130552DEST_PATH_IMAGE059
Whether or not it is greater than n, in
Figure 177005DEST_PATH_IMAGE059
If the value is larger than n, jumping to step S28; in that
Figure 162279DEST_PATH_IMAGE059
When n is less than or equal to n, go to step S25;
s25, order
Figure 737617DEST_PATH_IMAGE060
For a data set
Figure 339499DEST_PATH_IMAGE061
Whether there is a viable configuration scenario
Figure 658485DEST_PATH_IMAGE062
When no feasible configuration scheme exists, jumping to step S26; otherwise, calculating and judging
Figure 29424DEST_PATH_IMAGE063
Whether or not greater than
Figure 775663DEST_PATH_IMAGE064
Above that
Figure 864842DEST_PATH_IMAGE064
When it is used, order
Figure 721939DEST_PATH_IMAGE065
And will be
Figure 681805DEST_PATH_IMAGE064
Is updated to
Figure 130104DEST_PATH_IMAGE066
And simultaneously jumps to step S24 and step S27; at less than or equal to
Figure 175420DEST_PATH_IMAGE064
If yes, go to step S29;
s26, order
Figure 104717DEST_PATH_IMAGE067
And jumps to step S24;
s27, judgment
Figure 450248DEST_PATH_IMAGE068
Whether or not the value of (b) is increased at least once in the n-th loop of steps S24-S26, jumps to when increasedStep S23; otherwise, jumping to step S29;
s28, order
Figure 538290DEST_PATH_IMAGE069
Judgment of
Figure 70902DEST_PATH_IMAGE070
Whether or not less than the value
Figure 800961DEST_PATH_IMAGE071
If so, go to step S29; otherwise, jumping to step S23; when the number of internal components in each application unit is increased and the integrity of the detection module cannot be improved,
Figure 735419DEST_PATH_IMAGE070
will fall to a specific
Figure 994362DEST_PATH_IMAGE071
The iterative process is terminated.
S29, mixing
Figure 279850DEST_PATH_IMAGE068
The value passes the detected final integrity value and jumps to step S3,
and S3, after the detection is passed, starting the data sending function of the data sending module, and carrying out encrypted data transmission after the detection of the substance to be detected is finished. Only at
Figure 548020DEST_PATH_IMAGE068
And when the value meets the preset requirement, judging that the detection is passed.
In the data encryption transmission method of the detection device according to the present invention,
the step S1 further includes:
the data sending module is further divided into a data sending activation unit and a data sending unit according to functions, wherein the data sending activation unit is used for starting the data sending function of the data sending module after the function detection of the detection module is passed;
the data sending unit is used for carrying out data encryption transmission after the data sending function of the data sending module is started.
In the data encryption transmission method of the detection device according to the present invention,
the step S3 is followed by:
and in the detection process of the past, the actual detection values of all the application units in the detection module and the detection time corresponding to the actual detection values are obtained, a verification data set is generated, and the actual detection effect of the detection module is evaluated according to the verification matrix.
Optionally, the verification data set is in the form of:
Figure 602564DEST_PATH_IMAGE072
wherein
Figure 297987DEST_PATH_IMAGE073
Has a subscript of
Figure 70771DEST_PATH_IMAGE074
Unit of individual use, subscript
Figure 611474DEST_PATH_IMAGE075
Is the serial number of the time point, n is the total number of the application units, t is the last time point of the historical actual detection value,
Figure 520524DEST_PATH_IMAGE073
is shown as
Figure 386849DEST_PATH_IMAGE076
A unit of use in
Figure 646929DEST_PATH_IMAGE077
Actual detection values at time points;
estimating according to historical actual detection values of all past time points to obtain different estimation values of all the application units of the current time point as follows:
Figure 991323DEST_PATH_IMAGE078
always have
Figure 20459DEST_PATH_IMAGE079
A speculative value;
first, the
Figure 57685DEST_PATH_IMAGE074
The average of the guess values at the current time point of each usage unit is expressed as follows:
Figure 273902DEST_PATH_IMAGE080
then, then
Figure 687566DEST_PATH_IMAGE081
It represents the average value of the guess values of each application unit and converts the average value of the guess values of all application units into a vector expression form, and the estimation vector form is as follows:
Figure 308559DEST_PATH_IMAGE082
. Through the processing of the embodiment of the invention, the error that the use unit becomes an unreliable unit due to the deviation of the actual detection value which depends on one time can be effectively reduced, so that the unreliable use unit can be found and positioned more accurately, and the evaluation of the actual detection effect is more accurate through the cooperation with other use units of the detection module in the same detection process.
The determination of whether an unreliable usage unit exists according to the estimated vector may be in the form of:
calculating the minimum variance of the vector cluster formed by the estimation vectors, wherein the specific formula is as follows:
Figure 782266DEST_PATH_IMAGE083
wherein
Figure 751359DEST_PATH_IMAGE084
The variance of the cluster of vectors obtained for a single calculation,
Figure 437555DEST_PATH_IMAGE085
the predictors obtained are accumulated. The accuracy of use unit judgment of an unreliable unit can be improved by calculating a vector cluster of the constitution of the estimated vector.
Compared with the prior art, the data encryption transmission method of the detection equipment has the following advantages: by detecting the data sending module, starting the data sending function of the data sending module only after the detection is passed, and carrying out encrypted data transmission after the detection of the substance to be detected is finished, the defect that in the prior art, the whole data acquisition process is not checked before the data encryption transmission process of biochemical analysis and detection equipment, even if a safe encryption mode is adopted, the safety of the whole data transmission cannot be guaranteed due to the insecurity of the acquisition process is overcome.
It is understood that various other changes and modifications may be made by those skilled in the art based on the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the claims of the present invention.

Claims (3)

1. A data encryption transmission method of detection equipment is characterized by comprising the following steps:
s1, dividing the usage of the detection equipment according to the functions, wherein the usage dividing result is a detection module and a data sending module; numbering each use unit of the detection module;
s2, periodically detecting the functions of the detection module according to the numbers, wherein the functions comprise:
s21, initializing the function of each usage unit, and carrying out integrity check on each usage unit; and generating initial data vectors according to the complete check result, wherein the initial data vectors are arranged by numbers
Figure 292319DEST_PATH_IMAGE001
(ii) a And obtaining a data vector through a first preset algorithm
Figure 330682DEST_PATH_IMAGE002
Arrangement of
Figure 668122DEST_PATH_IMAGE003
Wherein n is the total number of usage units:
Figure 577172DEST_PATH_IMAGE004
(ii) a Wherein the content of the first and second substances,
Figure 243165DEST_PATH_IMAGE005
for the configuration of the nth use unit,
Figure 503245DEST_PATH_IMAGE006
the initial optimal configuration scheme is the nth application unit;
s22, initialization
Figure 378797DEST_PATH_IMAGE007
Then the initial integrity of the detection module is
Figure 939091DEST_PATH_IMAGE008
Wherein
Figure 241897DEST_PATH_IMAGE009
Is a function of integrity, and
Figure 989273DEST_PATH_IMAGE010
wherein
Figure 934095DEST_PATH_IMAGE011
The initial integrity value of the detection module passing the detection is obtained;
s23, items detected by the detection module
Figure 83317DEST_PATH_IMAGE012
Figure 291444DEST_PATH_IMAGE013
Calculating and obtaining the influence value of each item,
Figure 260537DEST_PATH_IMAGE014
integrating the values of the items from large to small to obtain a sequence value, and ordering
Figure 743471DEST_PATH_IMAGE015
Is that
Figure 750129DEST_PATH_IMAGE016
And sequence value of (1), and
Figure 394737DEST_PATH_IMAGE017
(ii) a Wherein
Figure 116705DEST_PATH_IMAGE018
For balancing the factors, for increasing the integrity value of an item in an iteration,
Figure 872171DEST_PATH_IMAGE019
to represent the first
Figure 261564DEST_PATH_IMAGE020
The result value of the check of the use unit of the item is
Figure 77074DEST_PATH_IMAGE021
An overhead value of time;
s24, order
Figure 755180DEST_PATH_IMAGE022
And make a judgment on
Figure 845495DEST_PATH_IMAGE023
Whether or not it is greater than n, in
Figure 558237DEST_PATH_IMAGE023
If the value is larger than n, jumping to step S28; in that
Figure 810226DEST_PATH_IMAGE023
When n is less than or equal to n, go to step S25;
s25, order
Figure 506787DEST_PATH_IMAGE024
For a data set
Figure 604056DEST_PATH_IMAGE025
Whether there is a viable configuration scenario
Figure 896935DEST_PATH_IMAGE026
When no feasible configuration scheme exists, jumping to step S26; otherwise, calculating and judging
Figure 54247DEST_PATH_IMAGE027
Whether or not greater than
Figure 706945DEST_PATH_IMAGE028
Above that
Figure 607905DEST_PATH_IMAGE028
When it is used, order
Figure 295238DEST_PATH_IMAGE029
And will be
Figure 623452DEST_PATH_IMAGE028
Is updated to
Figure 763446DEST_PATH_IMAGE030
And simultaneously jumps to step S24 and step S27; at less than or equal to
Figure 936938DEST_PATH_IMAGE028
If yes, go to step S29;
s26, order
Figure 478778DEST_PATH_IMAGE031
And jumps to step S24;
s27, judgment
Figure 977893DEST_PATH_IMAGE032
Whether or not the value of (d) is increased at least once in the n-th loop of steps S24-S26, jumping to step S23 when increased; otherwise, jumping to step S29;
s28, order
Figure 339604DEST_PATH_IMAGE033
Judgment of
Figure 582366DEST_PATH_IMAGE034
Whether or not less than the value
Figure 978712DEST_PATH_IMAGE035
If so, go to step S29; otherwise, jumping to step S23;
s29, mixing
Figure 648728DEST_PATH_IMAGE032
The value passes the detected final integrity value and jumps to step S3,
and S3, after the detection is passed, starting the data sending function of the data sending module, and carrying out encrypted data transmission after the detection of the substance to be detected is finished.
2. The data encryption transmission method of a detection apparatus according to claim 1,
the step S1 further includes:
the data sending module is further divided into a data sending activation unit and a data sending unit according to functions, wherein the data sending activation unit is used for starting the data sending function of the data sending module after the function detection of the detection module is passed;
the data sending unit is used for carrying out data encryption transmission after the data sending function of the data sending module is started.
3. The data encryption transmission method of a detection apparatus according to claim 2,
the step S3 is followed by:
and in the detection process of the past, the actual detection values of all the application units in the detection module and the detection time corresponding to the actual detection values are obtained, a verification data set is generated, and the actual detection effect of the detection module is evaluated according to the verification matrix.
CN202010960556.0A 2020-09-14 2020-09-14 Data encryption transmission method of detection equipment Active CN111935175B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010960556.0A CN111935175B (en) 2020-09-14 2020-09-14 Data encryption transmission method of detection equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010960556.0A CN111935175B (en) 2020-09-14 2020-09-14 Data encryption transmission method of detection equipment

Publications (2)

Publication Number Publication Date
CN111935175A true CN111935175A (en) 2020-11-13
CN111935175B CN111935175B (en) 2020-12-29

Family

ID=73333433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010960556.0A Active CN111935175B (en) 2020-09-14 2020-09-14 Data encryption transmission method of detection equipment

Country Status (1)

Country Link
CN (1) CN111935175B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006303A (en) * 2010-12-06 2011-04-06 河海大学 Method and terminal for increasing data transmission safety by using multi-encryption method
CN102664729A (en) * 2012-04-28 2012-09-12 中山大学 Field programmable gate array (FPGA)-based advanced encryption standard (AES) encryption and decryption network communication device and implementation method thereof
CN102932048A (en) * 2012-10-31 2013-02-13 内蒙古大学 Data information transmitting method and system
EP2777226A1 (en) * 2011-11-07 2014-09-17 Netflow Logic Corporation A streaming method and system for processing network metadata
CN104778141A (en) * 2015-02-10 2015-07-15 浙江大学 Control system trusted architecture-based TPCM (Trusted Platform Control Module) and trusted detection technology
US20160156590A1 (en) * 2014-11-28 2016-06-02 Qip Solutions Limited Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer program product
CN105791280A (en) * 2016-02-29 2016-07-20 西安交通大学 Method for defending data integrity attack in direct state estimation of power system
CN206698236U (en) * 2017-02-13 2017-12-01 陶晶 A kind of big data processing system with safe encryption function
CN109218321A (en) * 2018-09-25 2019-01-15 北京明朝万达科技股份有限公司 A kind of network inbreak detection method and system
US10581838B2 (en) * 2014-05-07 2020-03-03 Cryptography Research, Inc. Modules to securely provision an asset to a target device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006303A (en) * 2010-12-06 2011-04-06 河海大学 Method and terminal for increasing data transmission safety by using multi-encryption method
EP2777226A1 (en) * 2011-11-07 2014-09-17 Netflow Logic Corporation A streaming method and system for processing network metadata
CN102664729A (en) * 2012-04-28 2012-09-12 中山大学 Field programmable gate array (FPGA)-based advanced encryption standard (AES) encryption and decryption network communication device and implementation method thereof
CN102932048A (en) * 2012-10-31 2013-02-13 内蒙古大学 Data information transmitting method and system
US10581838B2 (en) * 2014-05-07 2020-03-03 Cryptography Research, Inc. Modules to securely provision an asset to a target device
US20160156590A1 (en) * 2014-11-28 2016-06-02 Qip Solutions Limited Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer program product
CN104778141A (en) * 2015-02-10 2015-07-15 浙江大学 Control system trusted architecture-based TPCM (Trusted Platform Control Module) and trusted detection technology
CN105791280A (en) * 2016-02-29 2016-07-20 西安交通大学 Method for defending data integrity attack in direct state estimation of power system
CN206698236U (en) * 2017-02-13 2017-12-01 陶晶 A kind of big data processing system with safe encryption function
CN109218321A (en) * 2018-09-25 2019-01-15 北京明朝万达科技股份有限公司 A kind of network inbreak detection method and system

Also Published As

Publication number Publication date
CN111935175B (en) 2020-12-29

Similar Documents

Publication Publication Date Title
EP2342603B1 (en) Method and apparatus for creating state estimation models in machine condition monitoring
JP4783394B2 (en) Sensor failure adaptation method
CN103675022A (en) TDS (total dissolved solids) detection method, device and system
CN111679035A (en) Data compensation method, device, equipment and medium for gas analyzer
CN108958226A (en) Based on existence information potential-Principal Component Analysis Algorithm TE procedure failure testing method
CN108829998A (en) A kind of detection method of deflection of bridge span, detection device and terminal device
CN111935175B (en) Data encryption transmission method of detection equipment
Du et al. Methods for large‐scale single mediator hypothesis testing: Possible choices and comparisons
CN113094702B (en) False data injection attack detection method and device based on LSTM network
CN110133381A (en) A kind of determination method of pulse rise time uncertainty
Nassar et al. Space telemetry anomaly detection based on statistical PCA algorithm
JP7380480B2 (en) Hydrogen flame ionization detection method and device for samples containing oxygen
US20180128701A1 (en) Strain gage calibration system
CN110646134A (en) Calibration method and calibration device for air pressure sensor
US20060085102A1 (en) Methods for establishing alerts and/or alert limits for monitoring mechanical devices
CN114460161A (en) Ion migration time-based trace substance detection method
CN110427330B (en) Code analysis method and related device
CN111679089B (en) Data processing method of detection equipment
CN110728007B (en) Dynamic fault diagnosis method based on model features
CN113239075A (en) Construction data self-checking method and system
CN111737684B (en) Data safety control method in biochemical analyzer system
US11687320B2 (en) Slip detection on multi-lane serial datalinks
US6728643B2 (en) Process and device for measuring the concentrations of a plurality of gas components in a gas sample
Klein On the adequate model for aircraft parameter estimation
CN104965980B (en) Method of abnormal value removing and correction and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant