CN107273070A - A kind of intelligent marketing bill bar code printing management control system - Google Patents
A kind of intelligent marketing bill bar code printing management control system Download PDFInfo
- Publication number
- CN107273070A CN107273070A CN201710615605.5A CN201710615605A CN107273070A CN 107273070 A CN107273070 A CN 107273070A CN 201710615605 A CN201710615605 A CN 201710615605A CN 107273070 A CN107273070 A CN 107273070A
- Authority
- CN
- China
- Prior art keywords
- data
- mrow
- msub
- information
- field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Electromagnetism (AREA)
- Mathematical Analysis (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Computer Hardware Design (AREA)
- Algebra (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of intelligent marketing bill bar code printing management control system, including housing, the surface of housing is provided with display screen, the lower section of display screen is provided with data input button, the upper end of housing is provided with hanging ring, suspension strap is cased with hanging ring, the rear surface of housing is provided with barcode scanning device, and the rear surface of housing, which is additionally provided with, ties up hand strap;Display screen is LED touch display screen;Hand strap is tied up to be made of soft rubber material;Also include camera, central processing unit, alarm, memory and mobile terminal.The present invention is simple in construction, it is reasonable in design, by setting hanging ring and suspension strap, it is easy to the carrying of marketing personnel, and the device can realize that barcode scanning is paid so that apparatus function variation, and by setting data input button, bar code can be generated by data processing unit, and is printed by internal printing bar code device, the use of the marketing personnel of great convenience.
Description
Technical field
The invention belongs to printing equipment technical field, more particularly to a kind of intelligent marketing bill bar code printing management
Control system.
Background technology
Printing bar code apparatus function in the market is single, and existing printing bar code device only supports DOS modes
Under printing, not only trouble but also fixation takes place frequently, and being continually changing with means of marketing, it is impossible to meet the marketing
Demand, therefore, it is necessary to improvement is designed to it, to meet the demand of the marketing.
Due to the dispersiveness of bar code monitoring point, artificial gathered data and wired data transfer will take for substantial amounts of material resources and
Human cost.Simultaneously as lacking unified research method, cause many result comparisons poor.Therefore, a kind of measurement is developed
Precisely, easily storage system is safeguarded;But in due to external environment change greatly, the factor such as environment is uncontrollable, wireless sensing system
The situation of damage occurs in data acquisition node or long distance wireless data transmission nodal, so as to occur that teledata can not be timely
Upload to data server, in addition loss of data situation, therefore there is room for improvement.
In summary, the problem of prior art is present be:Existing market marketing bill bar code printing management control system
Management method intelligence degree is low;Printing effect is poor.
The content of the invention
The present invention provides a kind of easy to operate, reasonable in design intelligence to solve technical problem present in known technology
Marketing bill bar code printing management control system.
The present invention is adopted the technical scheme that to solve technical problem present in known technology:
A kind of intelligent marketing bill bar code printing management control system, including housing, the surface of the housing is set
There is display screen, the lower section of the display screen is provided with data input button, and the upper end of the housing is provided with hanging ring, the hanging ring
On be cased with suspension strap, the rear surface of the housing is provided with barcode scanning device, and the rear surface of the housing, which is additionally provided with, ties up hand strap;It is described aobvious
Display screen is LED touch display screen;The hand strap of tying up is made of soft rubber material;
The barcode scanning device is provided with camera, with central processing unit wired connection, the marketing for realizing printing
The captured in real-time of bill bar code image;
Alarm, with central processing unit wired connection, the marketing bill bar code for monitoring printing in real time is abnormal
When, central processing unit is transmitted a signal to, is alarmed;
Memory, with central processing unit wired connection, the marketing account of the printing for storing central processing unit processing
Each index parameter and the information to alert process of single bar code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the memory
Storage method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to center
Data transmission nodal, far-end server is sent the data to by centre data transmission node, if centre data transmission node occurs
Damage, then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network,
For temporarily storing the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent to wireless sensor data acquisition node
Success feedback information;, should if wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal
Node will send request signal to centre data transmission node, determine whether centre data transmission node normally runs, if center
Data transmission nodal is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node, which will start to gather with other wireless sensor datas, to be saved
The communication of point, and the data for being stored this node using coding and storing method are distributed to using the uniform distribution method of coded data and are
In each node in system;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jTable
It is shown as the i-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
F:Show that r row check bit is according to step E:
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section believes the redundancy produced at random acquired environmental data and by the above method
Breath is distributed to other data acquisition nodes after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data
Node is 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be to damage number
According to being recovered, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy.
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described
WLAN includes:Network data download module, for being downloaded from carrier server by the network authentication after public key encryption
Data and network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Operator
Database, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and
The network data authentication module that the network data download module is connected, for obtain in the cipher key store with the public key institute
Corresponding private key, is decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption
Network authentication data and network configuration data afterwards is authenticated, and certification is after by Network authentication data and network configuration data
In operator database shown in deposit;The authentication module being connected with the operator database, for using the operator
Network authentication data in database completes authentication request;The network selection module being connected with the operator database, is used
In by setting the Network authentication data and network configuration data;Respectively with the network data download module, the authentication
The command interpretation module that module is connected with the network selection module, for explaining the order from central processing unit, and will
Order after explanation is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, is used
Communicated in mobile terminal;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial group of its addition and multiplication structure and n
Into;
B. private key is generated:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2;
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to report
Alert information is handled.
Further, described intelligent marketing bill bar code printing management control system also includes:
Mobile terminal, by WLAN and central processing unit wireless connection, for receiving central processing unit processing
Each index parameter information and the information to alert process of the marketing bill bar code of printing;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data point of mobile phone terminal APP data reception modules
Method is enjoyed, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media
Agreement results in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit root
The stream medium data is obtained according to the address information;
Based on the streaming media service, after the confirmation of the central processing unit is received, handled to the center
Device exports the stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the memory is got in request, really
The fixed any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Further, before the stream medium data is exported to the central processing unit, further comprise:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to described
Control information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtain the address information of the stream medium data;, will be described in the currently processed positional information of the acquisition any data file
It is untreated in any data file to be partially converted to stream medium data and generation one results in institute by stream media protocol
State the address information of stream medium data.
Further, request is shared in the acquisition includes:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The processing stream that any data file is terminated after the confirmation that the center has been handled is received
Journey;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described
The first data inputted in real time are converted into stream medium data by service.
Further, the data processing method of central processing unit includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table of the dimension table updated
Information;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, the dimension table matches somebody with somebody confidence
In breath synchronous purpose database is needed with the source database for needing to safeguard where the dimension table of renewal, the dimension table
And dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge that the subscriber identity information is
It is no to meet the dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard the dimension updated to described
Table is updated operation;
The dimension table being updated after operation is synchronized to the purpose database.
Further, the dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
Further, the maintenance more new command is increase content instruction, changes content instruction or delete content instruction;
Before operation is updated to the dimension table for needing maintenance to update, including:
More new command is safeguarded according to described, it is determined that needs safeguard the field updated, and the needs maintenance renewal is got
Field field identification;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Its
In, the field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
Further, it is described to need to safeguard the dimension updated to described if the maintenance more new command is increase content instruction
Table is updated operation, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated behaviour to described
Make, including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated behaviour to described
Make, including:
Field contents are deleted in one or more of dimension table field.
Further, need to safeguard that the dimension table updated is updated operation to described, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets
The field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is used to point out to be discontented with
The Field Count of the foot field restrictive condition, and point out to be unsatisfactory for the field relevant information of the field restrictive condition;The word
Section relevant information includes the field identification or field name of the field.
The present invention has the advantages and positive effects of:The present invention it is simple in construction, it is reasonable in design, by set hanging ring and
Suspension strap, is easy to the carrying of marketing personnel, and the device can realize that barcode scanning is paid so that apparatus function variation, and passes through
Data input button is set, bar code can be generated by data processing unit, and is printed by internal printing bar code device,
The use of the marketing personnel of great convenience.
Memory of the present invention is used for the information for storing central processing unit processing, when the memory space of storage node network occurs
When not enough, system will use freshly harvested data, the data that encoded later replacement is stored at first.If now system has been stored
K evidence.Then each data acquisition node will have k according to block group, respectively f1 f2 f3…fk-1 fkIf now adopting
The data integrated is fk+1, then to fk+1Encoded, the data block after coding is then replaced into f1Corresponding data block.System
The latter data f of collectionk+2The replacement rule of (when the replacement that such as system is set is at intervals of 2) can be set after encoded according to system
Then replace f4, by that analogy;This is the irrealizable technique effect of documents 1.Prior art does not disclose the application
Described coding and storing method.
The present invention is additionally provided with warning function, and information is transmitted to mobile terminal in time, realizes and alarm.
The present invention can realize the transmission of information by WLAN, while set by the multimode of WLAN,
Realize the accurate control of information.
The present invention can carry out data sharing with central processing unit in real time by mobile terminal, carry out remote operation and control.
Central processing unit data processing method of the present invention, has fully ensured that each transmission data constantly in change, there is standard
Really the data after processing, are that intelligentized control plays a key effect.
The data sharing of the present invention, the need for having fully ensured that remote control.
Brief description of the drawings
Fig. 1 is overall schematic provided in an embodiment of the present invention;
Fig. 2 is housing rearview provided in an embodiment of the present invention.
In figure:1st, housing;2nd, data input button;3rd, printing outlet;4th, display screen;5th, suspension strap;6th, hanging ring;7th, sweep
Imaging apparatus;8th, hand strap is tied up.
Embodiment
In order to further understand the content, features and effects of the present invention, hereby enumerating following examples, and coordinate accompanying drawing
Describe in detail as follows.
In summary, the problem of prior art is present be:Existing market marketing bill bar code printing management control system
Management method intelligence degree is low;Printing effect is poor.
With reference to knots of the Fig. 1 to Fig. 2 to the intelligent marketing bill bar code printing management control system of the present invention
Structure is explained in detail.
Intelligent marketing bill bar code printing management control system provided in an embodiment of the present invention, including housing 1, institute
The surface for stating housing 1 is provided with display screen 4, and the lower section of the display screen 4 is provided with data input button 2, and the upper end of the housing 1 is set
Have and suspension strap 5 is cased with hanging ring 6, the hanging ring 6, the rear surface of the housing 1 is provided with barcode scanning device 7, the housing 1
Surface, which is additionally provided with, afterwards ties up hand strap 8, and the inside of the housing 1 is provided with data processing unit and printing bar code device, the data
Processing unit is connected with printing bar code device telecommunications, and the display screen 4 is LED touch display screen, and the hand strap 8 of tying up is using soft
Elastomeric material is made, and the data processing unit is connected by wireless communication unit with payment system, the data processing unit
Also it is connected with the memory cell inside housing 1.
With reference to specific embodiment, the invention will be further described.
Barcode scanning device provided in an embodiment of the present invention is provided with camera, and central processing unit wired connection, for realizing
The captured in real-time of the marketing bill bar code image of printing;
Alarm, with central processing unit wired connection, the marketing bill bar code for monitoring printing in real time is abnormal
When, central processing unit is transmitted a signal to, is alarmed;
Memory, with central processing unit wired connection, the marketing account of the printing for storing central processing unit processing
Each index parameter and the information to alert process of single bar code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the memory
Storage method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to center
Data transmission nodal, far-end server is sent the data to by centre data transmission node, if centre data transmission node occurs
Damage, then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network,
For temporarily storing the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent to wireless sensor data acquisition node
Success feedback information;, should if wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal
Node will send request signal to centre data transmission node, determine whether centre data transmission node normally runs, if center
Data transmission nodal is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node, which will start to gather with other wireless sensor datas, to be saved
The communication of point, and the data for being stored this node using coding and storing method are distributed to using the uniform distribution method of coded data and are
In each node in system;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jTable
It is shown as the i-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
F:Show that r row check bit is according to step E:
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section believes the redundancy produced at random acquired environmental data and by the above method
Breath is distributed to other data acquisition nodes after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data
Node is 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be to damage number
According to being recovered, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy.
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described
WLAN includes:Network data download module, for being downloaded from carrier server by the network authentication after public key encryption
Data and network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Operator
Database, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and
The network data authentication module that the network data download module is connected, for obtain in the cipher key store with the public key institute
Corresponding private key, is decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption
Network authentication data and network configuration data afterwards is authenticated, and certification is after by Network authentication data and network configuration data
In operator database shown in deposit;The authentication module being connected with the operator database, for using the operator
Network authentication data in database completes authentication request;The network selection module being connected with the operator database, is used
In by setting the Network authentication data and network configuration data;Respectively with the network data download module, the authentication
The command interpretation module that module is connected with the network selection module, for explaining the order from central processing unit, and will
Order after explanation is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, is used
Communicated in mobile terminal;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial group of its addition and multiplication structure and n
Into;
B. private key is generated:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2;
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to report
Alert information is handled.
Described intelligent marketing bill bar code printing management control system also includes:
Mobile terminal, by WLAN and central processing unit wireless connection, for receiving central processing unit processing
Each index parameter information and the information to alert process of the marketing bill bar code of printing;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data point of mobile phone terminal APP data reception modules
Method is enjoyed, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media
Agreement results in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit root
The stream medium data is obtained according to the address information;
Based on the streaming media service, after the confirmation of the central processing unit is received, handled to the center
Device exports the stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the memory is got in request, really
The fixed any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Before the stream medium data is exported to the central processing unit, further comprise:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to described
Control information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtain the address information of the stream medium data;, will be described in the currently processed positional information of the acquisition any data file
It is untreated in any data file to be partially converted to stream medium data and generation one results in institute by stream media protocol
State the address information of stream medium data.
Request is shared in the acquisition to be included:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The processing stream that any data file is terminated after the confirmation that the center has been handled is received
Journey;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described
The first data inputted in real time are converted into stream medium data by service.
The data processing method of central processing unit includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table of the dimension table updated
Information;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, the dimension table matches somebody with somebody confidence
In breath synchronous purpose database is needed with the source database for needing to safeguard where the dimension table of renewal, the dimension table
And dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge that the subscriber identity information is
It is no to meet the dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard the dimension updated to described
Table is updated operation;
The dimension table being updated after operation is synchronized to the purpose database.
The dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
The maintenance more new command is increase content instruction, changes content instruction or delete content instruction;
Before operation is updated to the dimension table for needing maintenance to update, including:
More new command is safeguarded according to described, it is determined that needs safeguard the field updated, and the needs maintenance renewal is got
Field field identification;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Its
In, the field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
It is described to need to safeguard that the dimension table updated is carried out more to described if the maintenance more new command is increase content instruction
New operation, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated behaviour to described
Make, including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated behaviour to described
Make, including:
Field contents are deleted in one or more of dimension table field.
Further, need to safeguard that the dimension table updated is updated operation to described, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets
The field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is used to point out to be discontented with
The Field Count of the foot field restrictive condition, and point out to be unsatisfactory for the field relevant information of the field restrictive condition;The word
Section relevant information includes the field identification or field name of the field.
The present invention is simple in construction, reasonable in design, by setting hanging ring and suspension strap, is easy to the carrying of marketing personnel, and
The device can realize that barcode scanning is paid so that apparatus function variation, and by setting data input button, can be by data at
Unit generation bar code is managed, and is printed by internal printing bar code device, the use of the marketing personnel of great convenience.
Memory of the present invention is used for the information for storing central processing unit processing, when the memory space of storage node network occurs
When not enough, system will use freshly harvested data, the data that encoded later replacement is stored at first.If now system has been stored
K evidence.Then each data acquisition node will have k according to block group, respectively f1 f2 f3…fk-1 fkIf now adopting
The data integrated is fk+1, then to fk+1Encoded, the data block after coding is then replaced into f1Corresponding data block.System
The latter data f of collectionk+2The replacement rule of (when the replacement that such as system is set is at intervals of 2) can be set after encoded according to system
Then replace f4, by that analogy;This is the irrealizable technique effect of documents 1.Prior art does not disclose the application
Described coding and storing method.
The present invention is additionally provided with warning function, and information is transmitted to mobile terminal in time, realizes and alarm.
The present invention can realize the transmission of information by WLAN, while set by the multimode of WLAN,
Realize the accurate control of information.
The present invention can carry out data sharing with central processing unit in real time by mobile terminal, carry out remote operation and control.
Central processing unit data processing method of the present invention, has fully ensured that each transmission data constantly in change, there is standard
Really the data after processing, are that intelligentized control plays a key effect.
The data sharing of the present invention, the need for having fully ensured that remote control.
The present invention in use, input the input information of bar code by data input button 2, the information of input through data at
Manage cell processing after, by bar code generating into presentation of information on the display screen 4, and by printing bar code device to bar code carry out
Printing, the information of bar code will be stored by internal storage unit, when outdoor marketing, and the device can realize gathering functions, sweep
Imaging apparatus 7 can be scanned to the Quick Response Code at Client handset end, and data processing unit can be by wireless after handling scanning information
Communication unit is connected with payment system.
It is described above to be only the preferred embodiments of the present invention, any formal limitation not is made to the present invention,
Every technical spirit according to the present invention is belonged to any simple modification made for any of the above embodiments, equivalent variations and modification
In the range of technical solution of the present invention.
Claims (10)
1. a kind of intelligent marketing bill bar code printing management control system, including housing, it is characterised in that the housing
Surface be provided with display screen, the lower section of the display screen is provided with data input button, and the upper end of the housing is provided with hanging ring, institute
State and suspension strap is cased with hanging ring, the rear surface of the housing is provided with barcode scanning device, and the rear surface of the housing, which is additionally provided with, ties up hand
Band;The display screen is LED touch display screen;The hand strap of tying up is made of soft rubber material;
The barcode scanning device is provided with camera, with central processing unit wired connection, the marketing bill for realizing printing
The captured in real-time of bar code image;
Alarm, and central processing unit wired connection, will when the marketing bill bar code for monitoring printing in real time is abnormal
Signal is transmitted to central processing unit, is alarmed;
Memory, with central processing unit wired connection, the marketing bill bar of the printing for storing central processing unit processing
Each index parameter and the information to alert process of shape code;
The memory includes centre data transmission node and multiple wireless sensing data acquisition nodes, the storage of the memory
Method comprises the following steps:
(1) if centre data transmission node steady operation, wireless sensing data acquisition node sends the data to centre data
Transmission node, far-end server is sent the data to by centre data transmission node, if centre data transmission node is damaged,
Then carry out next step;
(2) if centre data transmission node is damaged, wireless sensor data acquisition node will form self-organizing network, be used for
Temporarily store the data that each wireless sensor data acquisition node is gathered;
(3) after centre data transmission node uploads data successfully, it will be sent successfully to wireless sensor data acquisition node
Feedback information;If wireless sensor data acquisition node does not receive in setting time and sends successfully feedback signal, the node
Request signal will be sent to centre data transmission node, and determine whether centre data transmission node will normally run, if centre data
Transmission node is unresponsive, then carries out next step;
(4) if centre data transmission node is unresponsive, the node will start and other wireless sensor data acquisition nodes
Communicate, and the data for being stored this node using coding and storing method are distributed in system using the uniform distribution method of coded data
Each node in;
Coding and storing method comprises the following steps described in step (4):
A:The type of two-dimension codeword of the coding and storing method is C=[ci,j];1≤i≤m-1,1≤j≤m+m, element ci,jIt is expressed as
I-th row, the information bit or check bit of jth row;
B:As 1≤i≤m-1,1≤j≤m-1, element ci,jFor information bit, for depositing original data;
C:As 1≤i≤m-1, m≤j≤m+m, element ci,jFor check bit, for depositing verification data;
D:Three steps show that first row check bit can be according to following rule constructs more than:
<mrow>
<msub>
<mi>c</mi>
<mrow>
<mi>i</mi>
<mo>,</mo>
<mi>m</mi>
</mrow>
</msub>
<mo>=</mo>
<munderover>
<mrow>
<mi></mi>
<mo>&CirclePlus;</mo>
</mrow>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>0</mn>
</mrow>
<mrow>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</munderover>
<msub>
<mi>c</mi>
<mrow>
<mi>i</mi>
<mo>,</mo>
<mi>j</mi>
</mrow>
</msub>
<mo>,</mo>
<mn>1</mn>
<mo>&le;</mo>
<mi>i</mi>
<mo><</mo>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
<mo>;</mo>
</mrow>
E:The redundancy check bit equation below of r row is represented, makes the public regulatory factor be:
<mrow>
<msub>
<mi>S</mi>
<mi>r</mi>
</msub>
<mo>=</mo>
<munderover>
<mrow>
<mi></mi>
<mo>&CirclePlus;</mo>
</mrow>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mrow>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</munderover>
<msub>
<mi>c</mi>
<mrow>
<mo><</mo>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
<mo>+</mo>
<mi>r</mi>
<mo>&CenterDot;</mo>
<mi>j</mi>
<msub>
<mo>></mo>
<mi>m</mi>
</msub>
<mo>,</mo>
<mi>j</mi>
</mrow>
</msub>
</mrow>
F:Show that r row check bit is according to step E:
<mrow>
<msub>
<mi>c</mi>
<mrow>
<mi>i</mi>
<mo>,</mo>
<mi>m</mi>
<mo>+</mo>
<mn>2</mn>
</mrow>
</msub>
<mo>=</mo>
<msub>
<mi>S</mi>
<mi>r</mi>
</msub>
<mo>&CirclePlus;</mo>
<mrow>
<mo>(</mo>
<munderover>
<munder>
<mo>&CirclePlus;</mo>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>0</mn>
</mrow>
</munder>
<mrow>
<mo><</mo>
<mi>i</mi>
<mo>+</mo>
<mi>r</mi>
<mo>&CenterDot;</mo>
<mi>j</mi>
<msub>
<mo>></mo>
<mi>m</mi>
</msub>
<mo>&NotEqual;</mo>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
<mrow>
<mi>m</mi>
<mo>-</mo>
<mn>1</mn>
</mrow>
</munderover>
<msub>
<mi>c</mi>
<mrow>
<mo><</mo>
<mi>i</mi>
<mo>+</mo>
<mi>r</mi>
<mo>&CenterDot;</mo>
<mi>j</mi>
<msub>
<mo>></mo>
<mi>m</mi>
</msub>
<mo>,</mo>
<mi>j</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
</mrow>
In formula:1≤i < m-1,1≤r≤m;
The uniform distribution method of coded data comprises the following steps described in step (4):
a:Each data acquisition section passes through the redundancy produced at random acquired environmental data and by the above method
Other data acquisition nodes are distributed to after piecemeal;
b:When the environment residing for wireless sensing system is more severe, when wireless sensing node is damaged, if initial data node
For 2m, prime number m adjacent with m and less than mlRepresent;
c:Then when damage node reaches 2 × (m-ml) when, i.e., system spare nodes are 2mlWhen, system will be entered to damage data
Row recovers, meanwhile, system will again be encoded to the initial data recovered, coding parameter mlParameter is carried out;
d:Freshly harvested node also will carry out code storage according to the strategy;
WLAN, and central processing unit wired connection, for realizing that the information of central processing unit is wirelessly transferred;It is described wireless
LAN includes:Network data download module, for being downloaded from carrier server by the Network authentication data after public key encryption
And network configuration data;Cipher key store, for storing the private key matched with the public key of the carrier server;Carrier data
Storehouse, for storing Network authentication data and network configuration data;Respectively with the cipher key store, the operator database and described
The network data authentication module that network data download module is connected, for obtain in the cipher key store with corresponding to the public key
Private key, be decrypted by the Network authentication data and network configuration data after the private key pair encryption, and to decryption after
Network authentication data and network configuration data are authenticated, and Network authentication data and network configuration data are stored in by certification after
In shown operator database;The authentication module being connected with the operator database, for using the carrier data
Network authentication data in storehouse completes authentication request;The network selection module being connected with the operator database, for leading to
Cross and the Network authentication data and network configuration data are set;Respectively with the network data download module, the authentication module
The command interpretation module being connected with the network selection module, for explaining the order from central processing unit, and will be explained
Order afterwards is sent to corresponding functional module;The interface communication module being connected with the command interpretation module, for
Mobile terminal is communicated;
The multivariate public key cryptography encipher-decipher method of the network data authentication module, including:
A. public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
B. private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
C. ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
D. this process of decrypting process is the inverse process of encryption, and decryption key used is the private key chosen;
The process that the centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
<mfenced open = "" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>z</mi>
<mn>1</mn>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mn>1</mn>
</msub>
<mo>,</mo>
<mn>...</mn>
<mo>,</mo>
<msub>
<mi>x</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</munderover>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>j</mi>
<mn>1</mn>
</mrow>
</msub>
<msub>
<mi>x</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<msub>
<mi>&beta;</mi>
<mn>1</mn>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
<mtr>
<mtd>
<mo>.</mo>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>z</mi>
<mi>r</mi>
</msub>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mn>1</mn>
</msub>
<mo>,</mo>
<mn>...</mn>
<mo>,</mo>
<msub>
<mi>x</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>=</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</munderover>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>j</mi>
<mi>r</mi>
</mrow>
</msub>
<msub>
<mi>x</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<msub>
<mi>&beta;</mi>
<mi>r</mi>
</msub>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
A1. finite field k, and its addition and multiplication structure are chosen;
A2. 2l secondary multinomial groups are chosen:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
B1. mapping is chosenI.e. two random number α1, α2;
B2. the z of r Line independent is randomly selected1,…,zr∈k[x1,…,xn];
B3. it is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
<mrow>
<mi>P</mi>
<mo>=</mo>
<mo>{</mo>
<mrow>
<mo>(</mo>
<mi>&mu;</mi>
<mo>,</mo>
<mi>&lambda;</mi>
<mo>)</mo>
</mrow>
<mo>|</mo>
<mover>
<mi>F</mi>
<mo>^</mo>
</mover>
<mrow>
<mo>(</mo>
<mi>&mu;</mi>
<mo>)</mo>
</mrow>
<mo>=</mo>
<mi>&lambda;</mi>
<mo>}</mo>
<mo>,</mo>
</mrow>
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
B4. two reversible affine transformation L are chosen1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
C1. message M '=(x is given1′,…,xn′);
C2. plaintext is encrypted with the public key chosen, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
Described decrypting process comprises the following steps:
D1. ciphertext Z '=(z is being obtained1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
D2. for the every bit (μ, λ) in point set P, calculate:
<mrow>
<mo>(</mo>
<msup>
<msub>
<mi>y</mi>
<mn>1</mn>
</msub>
<mrow>
<mo>&prime;</mo>
<mo>&prime;</mo>
</mrow>
</msup>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mrow>
<mo>&prime;</mo>
<mo>&prime;</mo>
</mrow>
</msup>
<mo>)</mo>
<mo>=</mo>
<msup>
<mover>
<mi>F</mi>
<mo>~</mo>
</mover>
<mrow>
<mo>-</mo>
<mn>1</mn>
</mrow>
</msup>
<mo>(</mo>
<mo>(</mo>
<mrow>
<msup>
<msub>
<mi>y</mi>
<mn>1</mn>
</msub>
<mo>&prime;</mo>
</msup>
<mo>,</mo>
<mo>...</mo>
<mo>,</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mn>2</mn>
<mi>l</mi>
</mrow>
</msub>
<mo>&prime;</mo>
</msup>
</mrow>
<mo>)</mo>
<mo>+</mo>
<mi>&lambda;</mi>
<mo>)</mo>
<mo>,</mo>
</mrow>
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
D3. it is last to calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if obtained more than one group
(m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase;
Central processing unit, each index parameter for the marketing bill bar code to printing is handled and to alarm
Information is handled.
2. intelligence marketing bill bar code printing management control system as claimed in claim 1, it is characterised in that described
Intelligent marketing bill bar code printing management control system also include:
Mobile terminal, by WLAN and central processing unit wireless connection, the printing for receiving central processing unit processing
Marketing bill bar code each index parameter information and the information to alert process;
The mobile terminal is provided with mobile phone terminal APP data reception modules, the data sharing side of mobile phone terminal APP data reception modules
Method, including:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by stream media protocol
Result in the address information of the stream medium data;
The address information is sent to central processing unit;Wherein, the address information is used to make the central processing unit according to institute
State address information and obtain the stream medium data;
It is defeated to the central processing unit after confirmation of the central processing unit is received based on the streaming media service
Go out the stream medium data.
3. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that according to
First data for sharing request determination for sharing include:
If from it is described share the fileinfo of any data file stored on the memory is got in request, it is determined that institute
It is the first data for sharing to state any data file;
If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as
For the first data shared.
4. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that to
The central processing unit is exported before the stream medium data, is further comprised:
Control information is sent to the central processing unit, the control information is used to make the central processing unit according to the control
Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing
The first data, and first data are converted into stream medium data and generation one by stream media protocol results in institute
State the address information of stream medium data;, will be described any in the currently processed positional information of the acquisition any data file
It is untreated in data file to be partially converted to stream medium data and generation one results in the stream by stream media protocol
The address information of media data.
5. intelligence marketing bill bar code printing management control system as claimed in claim 2, it is characterised in that described
Acquisition is shared request and included:
If detecting the operation information that user performs setting operation, request is shared according to operation information generation;
The handling process that any data file is terminated after the confirmation that the center has been handled is received;
Share described in obtaining after request, using the data inputted in real time as the first data, streaming media service is called based on described
The first data inputted in real time are converted into stream medium data.
6. intelligence marketing bill bar code printing management control system as claimed in claim 1, it is characterised in that center
The data processing method of processor includes:
Receive and safeguard more new command;
Subscriber identity information is obtained according to the maintenance more new command and needs to safeguard the dimension table information of the dimension table updated;
The dimension table configuration information pre-set according to the dimension table acquisition of information;Wherein, in the dimension table configuration information
With the source database needed to safeguard where the dimension table updated, the dimension table need synchronous purpose database and
Dimension table operating right information;
According to the subscriber identity information and the dimension table operating right information, judge whether the subscriber identity information is full
The foot dimension table operating right information;
If the subscriber identity information meets the dimension table operating right information, need to safeguard that the dimension table updated enters to described
Row updates operation;
The dimension table being updated after operation is synchronized to the purpose database.
7. intelligence marketing bill bar code printing management control system as claimed in claim 6, it is characterised in that described
Dimension table operating right information includes:User Identity with dimension table operating right;
It is described to judge whether the subscriber identity information meets the dimension table operating right information, including:
Judge the subscriber identity information whether in the User Identity with dimension table operating right.
8. intelligence marketing bill bar code printing management control system as claimed in claim 6, it is characterised in that described
More new command is safeguarded for increase content instruction, change content instruction or content instruction is deleted;
Before operation is updated to the dimension table for needing maintenance to update, including:
According to the maintenance more new command, it is determined that needs safeguard the field updated, and the word for needing to safeguard renewal is got
The field identification of section;
The field configuration information pre-set is got according to the field identification and the dimension table configuration information;Wherein,
The field configuration information includes field contents ordering rule, field ordering information, the field restrictive condition of the field.
9. intelligence marketing bill bar code printing management control system as claimed in claim 8, it is characterised in that if institute
It is increase content instruction to state maintenance more new command, described to need to safeguard that the dimension table updated is updated operation to described, including:
Obtain the corresponding batch data content of the increase content instruction;
According to the batch data content, field contents are increased in one or more of dimension table field;
According to the field contents ordering rule, the field contents are ranked up;
According to the field ordering information, each field in dimension table is ranked up;
If the maintenance more new command is change content instruction, need to safeguard that the dimension table updated is updated operation to described,
Including:
Obtain the corresponding batch data content of the change content instruction;
According to the batch data content, field contents are changed in one or more of dimension table field;
If the maintenance more new command is deletes content instruction, need to safeguard that the dimension table updated is updated operation to described,
Including:
Field contents are deleted in one or more of dimension table field.
10. intelligence marketing bill bar code printing management control system as claimed in claim 9, it is characterised in that right
It is described to need to safeguard that the dimension table updated is updated operation, in addition to:
Judge whether each field after the increase field contents, change field contents or deletion field contents meets described
Field restrictive condition;
If there is field to be unsatisfactory for the field restrictive condition, prompt message is generated;The prompt message is unsatisfactory for institute for prompting
The Field Count of field restrictive condition is stated, and points out to be unsatisfactory for the field relevant information of the field restrictive condition;The field phase
Closing information includes the field identification or field name of the field.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710615605.5A CN107273070A (en) | 2017-07-26 | 2017-07-26 | A kind of intelligent marketing bill bar code printing management control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710615605.5A CN107273070A (en) | 2017-07-26 | 2017-07-26 | A kind of intelligent marketing bill bar code printing management control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107273070A true CN107273070A (en) | 2017-10-20 |
Family
ID=60078229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710615605.5A Pending CN107273070A (en) | 2017-07-26 | 2017-07-26 | A kind of intelligent marketing bill bar code printing management control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107273070A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446752A (en) * | 2018-03-16 | 2018-08-24 | 北京摩拜科技有限公司 | A kind of portable bar code Preparation equipment |
CN108597562A (en) * | 2018-04-16 | 2018-09-28 | 刘民堂 | A kind of hospital clinical system based on Internet of Things |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202887340U (en) * | 2012-10-23 | 2013-04-17 | 郑葵 | Marketing management bill bar code printing management system |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN103886732A (en) * | 2014-03-27 | 2014-06-25 | 中国科学院成都生物研究所 | High-reliability ecological environmental parameter wireless-sensing system |
CN104182649A (en) * | 2014-09-10 | 2014-12-03 | 钟礼军 | Handheld mobile internet-of-things extracorporeal rapid detector and use method |
CN105455525A (en) * | 2015-11-20 | 2016-04-06 | 宁波大业产品造型艺术设计有限公司 | Internet of Things intelligent vase |
CN106651741A (en) * | 2016-12-09 | 2017-05-10 | 西华大学 | Cloud computing-based graphic processing system |
CN206271034U (en) * | 2016-12-05 | 2017-06-20 | 湖北迈士科技有限公司 | Bar code is false proof and checking system |
CN106860986A (en) * | 2017-03-03 | 2017-06-20 | 庞彩苓 | A kind of oxygen Ventilator Control System based on Internet of Things |
-
2017
- 2017-07-26 CN CN201710615605.5A patent/CN107273070A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202887340U (en) * | 2012-10-23 | 2013-04-17 | 郑葵 | Marketing management bill bar code printing management system |
CN103501227A (en) * | 2013-10-23 | 2014-01-08 | 西安电子科技大学 | Improved multi-variable public key cryptogram encryption and decryption scheme |
CN103886732A (en) * | 2014-03-27 | 2014-06-25 | 中国科学院成都生物研究所 | High-reliability ecological environmental parameter wireless-sensing system |
CN104182649A (en) * | 2014-09-10 | 2014-12-03 | 钟礼军 | Handheld mobile internet-of-things extracorporeal rapid detector and use method |
CN105455525A (en) * | 2015-11-20 | 2016-04-06 | 宁波大业产品造型艺术设计有限公司 | Internet of Things intelligent vase |
CN206271034U (en) * | 2016-12-05 | 2017-06-20 | 湖北迈士科技有限公司 | Bar code is false proof and checking system |
CN106651741A (en) * | 2016-12-09 | 2017-05-10 | 西华大学 | Cloud computing-based graphic processing system |
CN106860986A (en) * | 2017-03-03 | 2017-06-20 | 庞彩苓 | A kind of oxygen Ventilator Control System based on Internet of Things |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108446752A (en) * | 2018-03-16 | 2018-08-24 | 北京摩拜科技有限公司 | A kind of portable bar code Preparation equipment |
CN108597562A (en) * | 2018-04-16 | 2018-09-28 | 刘民堂 | A kind of hospital clinical system based on Internet of Things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11397829B2 (en) | Method for handling privacy data | |
CN109698822A (en) | Combination learning method and system based on publicly-owned block chain and encryption neural network | |
CN104363250B (en) | A kind of method and system for equipment connection | |
CN108475317A (en) | System and method for protecting Internet of Things (IoT) device preset | |
CN108696553A (en) | A kind of Internet of Things network control system based on mixed cloud | |
CN106982203A (en) | The ATM network system and its information processing method of robust based on block chain technology | |
CN110380844A (en) | A kind of quantum key delivering method, equipment and storage medium | |
CN101753564B (en) | A module and associated method for TR-069 object management | |
CN106059757A (en) | Audio and video monitoring device, data encryption and decryption method, and audio and video display device | |
JP5311459B2 (en) | Information collection system and external access device | |
CN103795529A (en) | Wireless sensor network data safety infusion method based secret key vectors | |
CN104580246B (en) | Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment | |
CN109544892A (en) | A kind of wisdom agricultural things-internet gateway system | |
CN207053552U (en) | A kind of digital home device based on mixed cloud and isomery Internet of Things | |
CN114615094B (en) | Storage method and device based on Internet of things and security chip | |
CN116405283B (en) | Data encryption authentication system based on information data protection | |
CN110049027A (en) | A kind of transmission platform for block chain network information | |
CN107273070A (en) | A kind of intelligent marketing bill bar code printing management control system | |
CN109040301A (en) | Wisdom security protection data system based on Internet of Things | |
CN103259787A (en) | Safety interactive method of cloud and terminal based on JSON protocol packet in medical field | |
KR101807429B1 (en) | Remote management apparatus and method fof updating batch parameter of smartmeter | |
CN103402242A (en) | Single-point payment wireless router connecting system | |
CN110995739A (en) | Industry internet control cloud platform | |
CN102056163B (en) | Distributed mesh network key management method and wireless access point device | |
CN106067892A (en) | Management data acquisition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171020 |
|
RJ01 | Rejection of invention patent application after publication |