CN113423109B - Designated data sharing method facing personal computer user - Google Patents

Designated data sharing method facing personal computer user Download PDF

Info

Publication number
CN113423109B
CN113423109B CN202110971565.4A CN202110971565A CN113423109B CN 113423109 B CN113423109 B CN 113423109B CN 202110971565 A CN202110971565 A CN 202110971565A CN 113423109 B CN113423109 B CN 113423109B
Authority
CN
China
Prior art keywords
data
equipment
pairing
algorithm
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110971565.4A
Other languages
Chinese (zh)
Other versions
CN113423109A (en
Inventor
高辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhaoruiyoupin Technology Co ltd
Original Assignee
Shenzhen Zhaoruiyoupin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhaoruiyoupin Technology Co ltd filed Critical Shenzhen Zhaoruiyoupin Technology Co ltd
Priority to CN202110971565.4A priority Critical patent/CN113423109B/en
Publication of CN113423109A publication Critical patent/CN113423109A/en
Application granted granted Critical
Publication of CN113423109B publication Critical patent/CN113423109B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

The invention relates to the technical field of electric digital data processing, in particular to a specified data sharing method facing to a personal computer user. Which comprises the following steps: the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the second encryption authentication pairing is realized by adopting a positioning matching algorithm; the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame; shaping data of a transmission data frame into a plurality of data blocks by adopting a token bucket segmentation algorithm, and integrating and distributing the plurality of data blocks into a token bucket allowing the maximum data frame memory to be less than or equal to the maximum data frame memory for data sharing through a data memory distribution algorithm; the method adopts the MD5 file detection algorithm to check the change before and after data transmission, ensures the security of shared data through twice encryption authentication, and can control the transmission flow.

Description

Designated data sharing method facing personal computer user
Technical Field
The invention relates to the technical field of electric digital data processing, in particular to a specified data sharing method facing to a personal computer user.
Background
The data sharing is that users using different computers and different software in different places can read data of other people and perform various operation operations and analyses, the data sharing degree reflects the information development level of one region and one country, and the higher the data sharing degree is, the higher the information development level is;
at present, two modes of wired and wireless transmission are adopted during data sharing, data on one computer is shared to the content of the other computer, and during wireless transmission, connection needs to be established wirelessly in a Bluetooth or network mode and the like, so that the two computers are configured to transmit the data, and the data are shared;
at present, when two computers share data and establish wireless connection, the two computers cannot be paired in a targeted manner, the transmission of a personal computer cannot be accurately appointed, and the data sharing is easy to be mistakenly connected with other computers, so that the data sharing causes disclosure to other people;
at present, data can not be transmitted according to the flow accepted by a personal computer when data sharing is carried out, when a large amount of data is transmitted, the data driven by the current mobile mode is in explosive growth, the flow of data transmission can not be controlled, the personal computer is easy to cause overload and serious damage during operation, and after the shared data is received, verification cannot be carried out on the data, the data can be damaged or modified in the transmission process, and the normal use of the data is influenced.
Disclosure of Invention
The present invention aims to provide a method for sharing specific data for a personal computer user, so as to solve the problems in the background art.
In order to achieve the above object, the present invention provides a method for sharing designated data for a personal computer user, comprising the steps of:
the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the shared link is established after the pairing is completed;
the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, the pairing is successfully carried out, a pairing success signal is sent, and through the two times of encryption authentication pairing, the pairing between the two computers is more accurate, and the data error transmission is effectively avoided;
the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by adopting a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared, so that the shared flow is controlled, the phenomenon that the computer is overloaded due to rapid increase of the data is avoided, and the personal computer is protected;
the response equipment receives the shared data, the MD5 file detection algorithm is adopted to check the change before and after the data transmission, verify whether the file is damaged or modified in the transmission process, recover the damaged or modified data, verify the received data, recover the damaged or modified data, ensure the safety of the shared data and improve the sharing quality.
As a further improvement of the technical solution, the wireless encryption pairing algorithm includes the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
and then carrying out the authentication in the opposite direction, generating an authentication random number a by the equipment A, sending the authentication random number a to the equipment B, calculating S2 by the equipment B, sending the authentication random number a to the equipment A, comparing whether the calculated S1 is consistent with the information sent by the equipment B by the equipment A, if so, successfully pairing, and otherwise, failing to pair.
As a further improvement of the present technical solution, the positioning matching algorithm includes the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure 276440DEST_PATH_IMAGE002
wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE003
in response to carrier phase observations at time tk from device R to satellite j,
Figure 865684DEST_PATH_IMAGE004
in response to the geometric distance of the device R from the satellite j at time tk,
Figure 100002_DEST_PATH_IMAGE005
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure 68258DEST_PATH_IMAGE006
is the clock offset for the satellite j,
Figure 100002_DEST_PATH_IMAGE007
in response to the clock difference of the device R,
Figure 384838DEST_PATH_IMAGE008
is the integer ambiguity of the carrier phase,
Figure 100002_DEST_PATH_IMAGE009
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure 871314DEST_PATH_IMAGE010
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure 100002_DEST_PATH_IMAGE011
for errors due to noise of the responding device R,
Figure 862753DEST_PATH_IMAGE012
for errors due to the multipath effect,
Figure 100002_DEST_PATH_IMAGE013
is the wavelength of the carrier;
the method and the device have the advantages that the position information input by the initiating device is compared with the position information positioned by the responding device by adopting a position information comparison algorithm, the verification is successful if the position information is matched with the position information of the initiating device, otherwise, the verification fails, when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
As a further improvement of the technical solution, the position information comparison algorithm includes the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
the character substrings X1 and Y1 are correspondingly matched, the verification fails when ambiguity occurs between X1 and Y1, and the verification succeeds when the ambiguity occurs between X1 and Y1, so that the comparison between the character position information and the positioned position information is more accurate, the matching verification of the position information is ensured, and the safety is higher.
As a further improvement of the present technical solution, the multilink encapsulation algorithm includes the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
the data packet is converted into a frame at a link layer, so that the data occupying a larger memory is encapsulated into a frame, the memory occupied by the data is reduced, the load in the transmission process is favorably reduced, and the transmission efficiency is improved.
As a further improvement of the technical solution, the token bucket partitioning algorithm has a calculation formula as follows:
and (3) segmentation calculation:
Figure 100002_DEST_PATH_IMAGE015
the token bucket stores data blocks:
Figure DEST_PATH_IMAGE017
number of redundant remaining blocks:
Figure DEST_PATH_IMAGE019
the data transmission method includes the steps that X is all data block memories, X1, X2, the page, xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowing the maximum data block to pass through, n is the total number of data blocks, k is the number of transmittable data blocks, and Y is the number of data blocks stored in a buffer mode.
As a further improvement of the technical solution, a data amount calculation formula of the data memory allocation algorithm is as follows:
Figure DEST_PATH_IMAGE021
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
Compared with the prior art, the invention has the beneficial effects that:
1. in the appointed data sharing method facing to the personal computer user, connection is established through twice encryption authentication pairing, then shared data is packaged into frames in initiating equipment, the data is shaped into small data blocks and stored in a token bucket memory and a buffer memory respectively and sequentially transmitted according to the maximum data frame allowed by keying in of responding equipment, shared flow is controlled, then received data is verified, damaged or modified data is recovered, and the safety of the shared data is guaranteed.
2. According to the designated data sharing method for the personal computer user, the positioning matching algorithm is adopted, so that when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the positioning position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is an overall algorithm block diagram of embodiment 1;
FIG. 3 is an overall schematic diagram of embodiment 1;
FIG. 4 is a flowchart of a wireless encryption pairing algorithm of embodiment 1;
FIG. 5 is a flowchart of the location matching algorithm of embodiment 1;
FIG. 6 is a flowchart of the multilink encapsulation algorithm of embodiment 1;
fig. 7 is a flowchart of the token bucket partitioning algorithm of embodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-7, the present embodiment provides a method for sharing designated data for a personal computer user, including the following steps:
s1, realizing the first encryption authentication pairing by adopting a wireless encryption pairing algorithm, and completing the pairing to establish a shared link;
s2, the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, the pairing is successful, a pairing success signal is sent, the two computers are paired more accurately through the two times of encryption authentication pairing, and the data mistransmission is effectively avoided;
s3, the initiating device receives the signal of 'pairing success', packages the data needing to be transmitted of the initiating device into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
s4, the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared, so that the shared flow is controlled, the phenomenon that the computer is overloaded due to rapid increase of the data is avoided, and the personal computer is protected;
s5, the response device receives the shared data, the MD5 file detection algorithm is adopted to check the change before and after the data transmission, whether the file is damaged or modified in the transmission process is verified, the damaged or modified data is recovered, the received data is verified, the damaged or modified data is recovered, the safety of the shared data is guaranteed, and the sharing quality is improved.
In this embodiment, the wireless encryption pairing algorithm includes the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
and then carrying out the authentication in the opposite direction, generating an authentication random number a by the equipment A, sending the authentication random number a to the equipment B, calculating S2 by the equipment B, sending the authentication random number a to the equipment A, comparing whether the calculated S1 is consistent with the information sent by the equipment B by the equipment A, if so, successfully pairing, and otherwise, failing to pair.
Further, the positioning matching algorithm comprises the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure 614939DEST_PATH_IMAGE002
wherein the content of the first and second substances,
Figure 282681DEST_PATH_IMAGE003
in response to carrier phase observations at time tk from device R to satellite j,
Figure 404090DEST_PATH_IMAGE004
in response to the geometric distance of the device R from the satellite j at time tk,
Figure 600716DEST_PATH_IMAGE005
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure 823887DEST_PATH_IMAGE006
is the clock offset for the satellite j,
Figure 514893DEST_PATH_IMAGE007
in response to the clock difference of the device R,
Figure 507120DEST_PATH_IMAGE008
is the integer ambiguity of the carrier phase,
Figure 140227DEST_PATH_IMAGE009
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure 834382DEST_PATH_IMAGE010
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure 312768DEST_PATH_IMAGE011
for errors due to noise of the responding device R,
Figure 425080DEST_PATH_IMAGE012
for errors due to the multipath effect,
Figure 714242DEST_PATH_IMAGE013
is the wavelength of the carrier;
the method and the device have the advantages that the position information input by the initiating device is compared with the position information positioned by the responding device by adopting a position information comparison algorithm, the verification is successful if the position information is matched with the position information of the initiating device, otherwise, the verification fails, when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
Specifically, the position information comparison algorithm includes the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
the character substrings X1 and Y1 are correspondingly matched, the verification fails when ambiguity occurs between X1 and Y1, and the verification succeeds when the ambiguity occurs between X1 and Y1, so that the comparison between the character position information and the positioned position information is more accurate, the matching verification of the position information is ensured, and the safety is higher.
Further, the multilink encapsulation algorithm comprises the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
the data packet is converted into a frame at a link layer, so that the data occupying a larger memory is encapsulated into a frame, the memory occupied by the data is reduced, the load in the transmission process is favorably reduced, and the transmission efficiency is improved.
Besides, the token bucket partitioning algorithm is calculated as follows:
and (3) segmentation calculation:
Figure 912005DEST_PATH_IMAGE015
the token bucket stores data blocks:
Figure 194082DEST_PATH_IMAGE017
number of redundant remaining blocks:
Figure 410168DEST_PATH_IMAGE019
the data transmission method includes the steps that X is all data block memories, X1, X2, the page, xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowing the maximum data block to pass through, n is the total number of data blocks, k is the number of transmittable data blocks, and Y is the number of data blocks stored in a buffer mode.
Specifically, the data amount calculation formula of the data memory allocation algorithm is as follows:
Figure 119498DEST_PATH_IMAGE021
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (2)

1. A specified data sharing method facing to a personal computer user is characterized by comprising the following steps:
the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the shared link is established after the pairing is completed;
the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, and a pairing success signal is sent after the pairing is successful;
the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by adopting a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared;
the response equipment receives the shared data, an MD5 file detection algorithm is adopted to check the change before and after the data transmission, whether the file is damaged or modified in the transmission process is verified, and the damaged or modified data is recovered;
the wireless encryption pairing algorithm comprises the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
then, the authentication in the opposite direction is carried out, the equipment A generates an authentication random number a, the authentication random number a is sent to the equipment B, the equipment B calculates S2 and sends the authentication random number a to the equipment A, the equipment A compares whether the S1 calculated by the equipment A is consistent with the information sent by the equipment B, if so, the pairing is successful, otherwise, the pairing is failed;
the positioning matching algorithm comprises the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE002
in response to carrier phase observations at time tk from device R to satellite j,
Figure DEST_PATH_IMAGE003
in response to the geometric distance of the device R from the satellite j at time tk,
Figure DEST_PATH_IMAGE004
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure DEST_PATH_IMAGE005
is the clock offset for the satellite j,
Figure DEST_PATH_IMAGE006
in response to the clock difference of the device R,
Figure DEST_PATH_IMAGE007
is the integer ambiguity of the carrier phase,
Figure DEST_PATH_IMAGE008
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure DEST_PATH_IMAGE009
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure DEST_PATH_IMAGE010
for errors due to noise of the responding device R,
Figure DEST_PATH_IMAGE011
for errors due to the multipath effect,
Figure DEST_PATH_IMAGE012
is the wavelength of the carrier;
comparing the position information input by the initiating equipment with the position information positioned by the responding equipment by adopting a position information comparison algorithm, and if the position information is matched with the position information, the verification is successful, otherwise, the verification fails;
the multilink encapsulation algorithm comprises the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
converting the data packet into a frame at a link layer;
the token bucket partitioning algorithm has the following calculation formula:
and (3) segmentation calculation:
Figure DEST_PATH_IMAGE013
the token bucket stores data blocks:
Figure DEST_PATH_IMAGE014
number of redundant remaining blocks:
Figure DEST_PATH_IMAGE015
wherein, X is all data block memories, X1, X2.., xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowed to pass through the maximum, n is the total number of data blocks, k is the number of data blocks capable of being transmitted, and Y is the number of data blocks in buffer storage;
the data volume calculation formula of the data memory allocation algorithm is as follows:
Figure DEST_PATH_IMAGE016
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
2. The personal computer user-oriented specified data sharing method according to claim 1, characterized in that: the position information comparison algorithm comprises the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
and correspondingly matching the character sub-strings X1 and Y1, wherein the verification fails when the ambiguity is generated between X1 and Y1, and the verification succeeds when the ambiguity is generated between X1 and Y1.
CN202110971565.4A 2021-08-24 2021-08-24 Designated data sharing method facing personal computer user Active CN113423109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110971565.4A CN113423109B (en) 2021-08-24 2021-08-24 Designated data sharing method facing personal computer user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110971565.4A CN113423109B (en) 2021-08-24 2021-08-24 Designated data sharing method facing personal computer user

Publications (2)

Publication Number Publication Date
CN113423109A CN113423109A (en) 2021-09-21
CN113423109B true CN113423109B (en) 2021-10-29

Family

ID=77719877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110971565.4A Active CN113423109B (en) 2021-08-24 2021-08-24 Designated data sharing method facing personal computer user

Country Status (1)

Country Link
CN (1) CN113423109B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114337992A (en) * 2022-03-09 2022-04-12 深圳市华星联科技有限公司 Multi-node-based long-distance data low-loss transmission method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088693A (en) * 1996-12-06 2000-07-11 International Business Machines Corporation Data management system for file and database management
CN1777143A (en) * 2004-10-25 2006-05-24 阿尔卡特公司 Internal load balancing in a data switch using distributed network processing
CN101778089A (en) * 2009-01-12 2010-07-14 武汉蓝鲸世纪科技开发有限公司 Bluetooth protocol-based high-security peer-to-peer file transmission method
CN101938396A (en) * 2009-06-30 2011-01-05 华为技术有限公司 Data stream control method and device
WO2019043687A2 (en) * 2017-08-28 2019-03-07 Luminati Networks Ltd. System and method for improving content fetching by selecting tunnel devices
CN110147915A (en) * 2018-02-11 2019-08-20 陕西爱尚物联科技有限公司 A kind of method and its system of resource distribution
CN110737918A (en) * 2019-10-15 2020-01-31 重庆远见信息产业集团有限公司 External data sharing management platform
CN111010437A (en) * 2019-12-12 2020-04-14 深圳市深智电科技有限公司 Intelligent media playing system and control method
CN111399874A (en) * 2020-03-05 2020-07-10 Tcl移动通信科技(宁波)有限公司 System upgrading method and device, storage medium and intelligent wearable device
CN112073521A (en) * 2020-09-10 2020-12-11 成都中科大旗软件股份有限公司 Sharing scheduling method and system for scattered data
CN112231284A (en) * 2020-09-28 2021-01-15 广西犇云科技股份有限公司 Block chain-based big data sharing system, method, device and storage medium
CN112787950A (en) * 2021-01-28 2021-05-11 西安交通大学 Fair network flow management and control method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088693A (en) * 1996-12-06 2000-07-11 International Business Machines Corporation Data management system for file and database management
CN1777143A (en) * 2004-10-25 2006-05-24 阿尔卡特公司 Internal load balancing in a data switch using distributed network processing
CN101778089A (en) * 2009-01-12 2010-07-14 武汉蓝鲸世纪科技开发有限公司 Bluetooth protocol-based high-security peer-to-peer file transmission method
CN101938396A (en) * 2009-06-30 2011-01-05 华为技术有限公司 Data stream control method and device
WO2019043687A2 (en) * 2017-08-28 2019-03-07 Luminati Networks Ltd. System and method for improving content fetching by selecting tunnel devices
CN110147915A (en) * 2018-02-11 2019-08-20 陕西爱尚物联科技有限公司 A kind of method and its system of resource distribution
CN110737918A (en) * 2019-10-15 2020-01-31 重庆远见信息产业集团有限公司 External data sharing management platform
CN111010437A (en) * 2019-12-12 2020-04-14 深圳市深智电科技有限公司 Intelligent media playing system and control method
CN111399874A (en) * 2020-03-05 2020-07-10 Tcl移动通信科技(宁波)有限公司 System upgrading method and device, storage medium and intelligent wearable device
CN112073521A (en) * 2020-09-10 2020-12-11 成都中科大旗软件股份有限公司 Sharing scheduling method and system for scattered data
CN112231284A (en) * 2020-09-28 2021-01-15 广西犇云科技股份有限公司 Block chain-based big data sharing system, method, device and storage medium
CN112787950A (en) * 2021-01-28 2021-05-11 西安交通大学 Fair network flow management and control method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
IoT Meets Blockchain: Parallel Distributed Architecture for Data Storage and Sharing;Shaowei Liu, Jing Wu, Chengnian Long;《2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing,Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics》;20190603;全文 *
基于API模式的高校数据共享平台建设研究;杨少冬;《电子技术与软件工程》;20210415;全文 *
基于集群共享存储的飞行数据处理系统设计;王敏,沈志平;《信息化研究》;20170220;全文 *

Also Published As

Publication number Publication date
CN113423109A (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN102771078B (en) Wireless communications device and authentication processing method
CN1846398B (en) Authenticated key exchange based on pairwise master key
CN113423109B (en) Designated data sharing method facing personal computer user
US20110093712A1 (en) Communication device supporting pairing
US10885814B2 (en) Share recovery system, share recovery apparatus, share recovery method, and program
CN101488854A (en) Wireless RFID system authentication method and apparatus
CN110856220B (en) Data transmission method and terminal
US11770212B2 (en) Data transmission methods, data transmission device, and data transmission apparatuses
US8966266B2 (en) Method for obtaining encryption keys corresponding terminals, server and computer program products
CN114004345A (en) Data processing system and method
CN102325025A (en) Data processing method and system for verifying provision source authenticity
EP3878115B1 (en) Apparatus and methods for real time soft combining of decrypted data
CN110287733B (en) File tamper-proofing method and device
CN103516478B (en) Method for sending information and equipment
CN113630895A (en) Data packet transmission method and device
JP3431136B2 (en) Transmission data loss detection system
Daraban et al. Protocol over uart for real-time applications
Liu et al. Self-adaptive path selection scheme in Concurrent Multipath Transfer
US20230189070A1 (en) Data transmission method and apparatus
US11665540B1 (en) Method for generating Bluetooth network authenticating through authentication code generated based on post-quantum cryptography and Bluetooth network operating system performing same
JP5112028B2 (en) An encryption / decryption device and a computer-readable storage medium storing an encryption / decryption program.
CN115580866B (en) Wireless communication data synchronous encryption system
US20220224458A1 (en) Eavesdropper detection apparatus and operating method thereof
CN111132383B (en) Data transmission method for narrow-band cluster terminal
CN1856956A (en) Data encryption method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant