CN114337992A - Multi-node-based long-distance data low-loss transmission method - Google Patents

Multi-node-based long-distance data low-loss transmission method Download PDF

Info

Publication number
CN114337992A
CN114337992A CN202210222288.1A CN202210222288A CN114337992A CN 114337992 A CN114337992 A CN 114337992A CN 202210222288 A CN202210222288 A CN 202210222288A CN 114337992 A CN114337992 A CN 114337992A
Authority
CN
China
Prior art keywords
data
memory
receiver
data packet
occupied
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210222288.1A
Other languages
Chinese (zh)
Inventor
许张欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huaxinglian Technology Co ltd
Original Assignee
Shenzhen Huaxinglian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huaxinglian Technology Co ltd filed Critical Shenzhen Huaxinglian Technology Co ltd
Priority to CN202210222288.1A priority Critical patent/CN114337992A/en
Publication of CN114337992A publication Critical patent/CN114337992A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of digital information transmission, in particular to a multi-node-based long-distance data low-loss transmission method. The method comprises the following steps of packaging transmitted data in a transmitter by adopting a data packaging encryption algorithm, detecting the memory occupied by a data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting a memory occupied comparison algorithm; the external memory opens a transmission link to receive a data packet, a data crawler removing algorithm is adopted to retrieve data in the receiver, a signal enhancement technology is adopted to connect the transmission link between the sender and the receiver, and the data packet is transmitted into the receiver; the receiver receives the data packet for decompression, and decrypts the data through the MD5 verification algorithm, the invention encrypts the data before data transmission, avoids interception by a third party, detects the maximum memory which can be used by the receiver and the occupied memory of the data packet, avoids overload operation, reduces the memory of the receiver and improves transmission safety.

Description

Multi-node-based long-distance data low-loss transmission method
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a multi-node-based long-distance data low-loss transmission method.
Background
In many management information systems, data exchange between different places, that is, remote data exchange, is often required, correct, stable, safe and reliable data exchange is directly related to normal operation of the system, and there are two main ways from the viewpoint of data transmission: direct data exchange among databases and data transmission taking files as intermediaries, under the condition that a network is smooth, firstly, a local database is connected with a database at a different place, then, data transmission is directly carried out between the databases, namely, operations such as inserting, modifying, deleting and the like of a corresponding table in the databases are carried out, and finally, the connection is disconnected;
in the process of data long-distance transmission, if a line is unstable or a machine is suddenly powered off, serious consequences such as data confusion, error loss and the like can be caused, because direct data exchange is adopted, the data security is relatively poor, if a hacker intercepts and changes the data, malignant events are easily caused, even a system is paralyzed, and the influence of human factors is particularly serious;
when data with a large memory is transmitted, the memory space which can be accommodated by the receiver is not detected, so that the data is directly transmitted to the receiver, the receiver is overloaded in operation, the system is easy to crash, and the service life of the receiver is influenced.
Disclosure of Invention
The present invention is directed to a low-loss transmission method based on multi-node long-distance data, so as to solve the problems mentioned in the above background art.
In order to achieve the above object, the present invention provides a low-loss transmission method based on multi-node long-distance data, comprising the following steps:
packaging the transmitted data in a transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting an occupied memory comparison algorithm;
when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens a transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
searching data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a transmission link is connected between the sender and the receiver by adopting a signal enhancement technology, and the data packet is transmitted into the receiver;
the receiver receives the data packet for decompression, decrypts the data through an MD5 verification algorithm, and performs summarization processing on the data to verify whether the data is modified or damaged in the data transmission process;
the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
As a further improvement of the technical solution, the data encapsulation encryption algorithm includes the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data block data are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data, until the physical layer is reached, the data are converted into bits and transmitted through a medium, so that a plurality of data blocks are encapsulated and integrated into a data packet, the data blocks are encrypted and decrypted after being received, interception of a third party in the transmission process can be avoided, and data leakage is avoided.
As a further improvement of the technical solution, the calculation formula of the data encapsulation encryption algorithm is as follows:
Figure 326397DEST_PATH_IMAGE002
wherein, X is a data packet, X1, X2.
As a further improvement of the present technical solution, the occupied memory comparison algorithm includes the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
Figure 364540DEST_PATH_IMAGE004
Figure 327947DEST_PATH_IMAGE006
Figure 673609DEST_PATH_IMAGE008
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0The data packet is a low-bit value of the memory, and the transmitted data can be safely transmitted by comparing the maximum memory which can be used by the receiver with the occupied memory of the data packet, so that the overload of the receiver in operation is avoided, and the safety is higher.
As a further improvement of the technical solution, the data crawler clearing algorithm includes the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
Figure 747876DEST_PATH_IMAGE010
wherein E is the average length of Chunk, SminIs the minimum length of Chunk, and Smax is the maximum of ChunkLarge length, n being the binary bits contained in the target pattern, p being the probability of signature and pattern matching;
data compression, which reduces the redundancy of data by adopting a related coding compression technology, achieves the purpose of reducing storage capacity, is beneficial to receiving data with larger memory and has stronger practicability.
As a further improvement of the technical solution, the related coding compression technology adopts a redundancy detection coding tree algorithm, which specifically includes:
calculating relative data redundancy:
Figure 289191DEST_PATH_IMAGE012
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
As a further improvement of the technical solution, the signal enhancement technology employs a signal amplification enhancer, which includes an external antenna, an amplifier, and an internal antenna, the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a transmitter to send or receive signals, the amplifier is used to enhance and then send out received signals, so as to form a wireless system to enhance cellular reception, and make the data transmission strength between the transmitter and the receiver higher.
As a further improvement of the present technical solution, the MD5 verification algorithm includes the following steps:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to be input of the MD5 function to generate a hash value, the hash value is compared with the data block of the receiver, whether the transmitted data is modified or damaged signals or not is judged, the influence on a system of the receiver caused by the modified data of a third party is avoided, and the safety of output transmission is further improved.
Compared with the prior art, the invention has the beneficial effects that:
in the multi-node remote data low-loss transmission method, data is encrypted before data transmission, so that the safety in the transmission process is improved, the data is prevented from being intercepted by a third party, the comparison between the maximum memory usable by a receiver and the occupied memory of a data packet is detected, the memory of the receiver is reduced, the data can be safely transmitted, the comparison between the maximum memory usable by the receiver and the occupied memory of the data packet can ensure that the transmitted data can be safely transmitted, the overload of the receiver is avoided, the safety is higher, the reduction of the space stored in the receiver is beneficial to receiving the data of a larger memory, the practicability is higher, a data block is encrypted through a data packaging encryption algorithm, the decryption is carried out after the data block is received, the interception of the third party in the transmission process can be avoided, the data leakage is avoided, and the MD5 is used for verifying whether the data is damaged or modified, the influence on a system of a receiver caused by using the data modified by the third party is avoided, and the safety of output transmission is further improved.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is an overall algorithm block diagram of embodiment 1;
FIG. 3 is a schematic view of the whole apparatus of embodiment 1;
FIG. 4 is a flow chart of a data packing encryption algorithm of embodiment 1;
FIG. 5 is a flowchart of the data crawler cleanup algorithm of example 1;
fig. 6 is a flow chart of the MD5 authentication algorithm of example 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-6, the present embodiment provides a multi-node based long-distance data low-loss transmission method, which includes the following steps:
s1, packaging the transmitted data in the transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
s2, detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by the receiver by adopting an occupied memory comparison algorithm;
s3, when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens the transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
s4, retrieving data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
s5, when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a signal enhancement technology is adopted to connect a transmission link between the sender and the receiver, and the data packet is transmitted into the receiver;
s6, the receiver receives the data packet and decompresses the data packet, then decrypts the data through the MD5 verification algorithm, and performs summary processing on the data to verify whether the data is modified or damaged in the data transmission process;
s7, the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
In this embodiment, the data encapsulation encryption algorithm includes the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data block data are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data, until the physical layer is reached, the data are converted into bits and transmitted through a medium, so that a plurality of data blocks are encapsulated and integrated into a data packet, the data blocks are encrypted and decrypted after being received, interception of a third party in the transmission process can be avoided, and data leakage is avoided.
Specifically, the calculation formula of the data encapsulation encryption algorithm is as follows:
Figure 954659DEST_PATH_IMAGE002
wherein, X is a data packet, X1, X2.
Further, the occupied memory comparison algorithm includes the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
Figure 990879DEST_PATH_IMAGE014
Figure 134415DEST_PATH_IMAGE006
Figure DEST_PATH_IMAGE016
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0For low values of memory, the receiver can be used to controlCompared with the occupied memory of the data packet, the maximum memory can ensure that the transmitted data can be safely transmitted, thereby avoiding overload operation of the receiver and having higher safety.
Further, the data crawler clearing algorithm comprises the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
Figure 795816DEST_PATH_IMAGE010
wherein E is the average length of Chunk, SminThe minimum length of the Chunk, Smax the maximum length of the Chunk, n the binary bits contained in the target pattern, and p the probability of signature and pattern matching;
data compression, which reduces the redundancy of data by adopting a related coding compression technology, achieves the purpose of reducing storage capacity, is beneficial to receiving data with larger memory and has stronger practicability.
Specifically, the related coding compression technology adopts a redundancy detection coding tree algorithm, and specifically includes:
calculating relative data redundancy:
Figure DEST_PATH_IMAGE018
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
It should be noted that the signal enhancement technology employs a signal amplification enhancer, which includes an external antenna, an amplifier, and an internal antenna, where the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a transmitter to send or receive signals, and the amplifier is used to enhance and then send out received signals, so as to form a wireless system to enhance cellular reception, so that the data transmission strength between the transmitter and the receiver is higher.
In addition, the MD5 verification algorithm includes the steps of:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to be input of the MD5 function to generate a hash value, the hash value is compared with the data block of the receiver, whether the transmitted data is modified or damaged signals or not is judged, the influence on a system of the receiver caused by the modified data of a third party is avoided, and the safety of output transmission is further improved.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (8)

1. The low-loss transmission method based on the multi-node long-distance data is characterized by comprising the following steps of:
packaging the transmitted data in a transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting an occupied memory comparison algorithm;
when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens a transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
searching data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a transmission link is connected between the sender and the receiver by adopting a signal enhancement technology, and the data packet is transmitted into the receiver;
the receiver receives the data packet for decompression, decrypts the data through an MD5 verification algorithm, and performs summarization processing on the data to verify whether the data is modified or damaged in the data transmission process;
the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
2. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the data encapsulation encryption algorithm comprises the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data blocks are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data until reaching a physical layer, the data is converted into bits and transmitted through a medium, and the plurality of data blocks are encapsulated and integrated into a data packet.
3. The multi-node long-distance data low-loss transmission method according to claim 2, wherein: the data encapsulation encryption algorithm has the following calculation formula:
Figure DEST_PATH_IMAGE001
wherein, X is a data packet, X1, X2.
4. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the occupied memory comparison algorithm comprises the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
Figure 395580DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE003
Figure 345344DEST_PATH_IMAGE004
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0Is the memory low value.
5. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the data crawler clearing algorithm comprises the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
Figure DEST_PATH_IMAGE005
wherein E is the average length of Chunk, SminThe minimum length of the Chunk, Smax the maximum length of the Chunk, n the binary bits contained in the target pattern, and p the probability of signature and pattern matching;
and data compression, namely, reducing the redundancy of data by adopting a related coding compression technology to achieve the aim of reducing the storage capacity.
6. The multi-node long-distance data low-loss transmission method according to claim 5, wherein: the related coding compression technology adopts a redundancy detection coding tree algorithm, and specifically comprises the following steps:
calculating relative data redundancy:
Figure 872884DEST_PATH_IMAGE006
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
7. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the signal enhancement technology adopts a signal amplification enhancer, which comprises an external antenna, an amplifier and an internal antenna, wherein the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a sender to send or receive signals, and the amplifier is used for enhancing the received signals and then sending the signals.
8. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the MD5 authentication algorithm includes the steps of:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to produce a hash value as an input to the MD5 function, and the hash value is compared to the data block of the receiver to determine whether the transmitted data has been modified or corrupted.
CN202210222288.1A 2022-03-09 2022-03-09 Multi-node-based long-distance data low-loss transmission method Pending CN114337992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210222288.1A CN114337992A (en) 2022-03-09 2022-03-09 Multi-node-based long-distance data low-loss transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210222288.1A CN114337992A (en) 2022-03-09 2022-03-09 Multi-node-based long-distance data low-loss transmission method

Publications (1)

Publication Number Publication Date
CN114337992A true CN114337992A (en) 2022-04-12

Family

ID=81033684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210222288.1A Pending CN114337992A (en) 2022-03-09 2022-03-09 Multi-node-based long-distance data low-loss transmission method

Country Status (1)

Country Link
CN (1) CN114337992A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811265A (en) * 2014-01-29 2015-07-29 上海数字电视国家工程研究中心有限公司 Base-band frame encapsulation method and de-encapsulation method
CN105786723A (en) * 2016-03-14 2016-07-20 深圳创维-Rgb电子有限公司 Application cache management method and device based on linked list
CN111611463A (en) * 2020-04-21 2020-09-01 天津大学 Scapy-Redis-based distributed web crawler optimization method
CN113423109A (en) * 2021-08-24 2021-09-21 深圳兆瑞优品科技有限公司 Designated data sharing method facing personal computer user
US20210312189A1 (en) * 2020-04-02 2021-10-07 Samsung Electronics Co., Ltd. Dynamic vision filtering for event detection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811265A (en) * 2014-01-29 2015-07-29 上海数字电视国家工程研究中心有限公司 Base-band frame encapsulation method and de-encapsulation method
CN105786723A (en) * 2016-03-14 2016-07-20 深圳创维-Rgb电子有限公司 Application cache management method and device based on linked list
US20210312189A1 (en) * 2020-04-02 2021-10-07 Samsung Electronics Co., Ltd. Dynamic vision filtering for event detection
CN111611463A (en) * 2020-04-21 2020-09-01 天津大学 Scapy-Redis-based distributed web crawler optimization method
CN113423109A (en) * 2021-08-24 2021-09-21 深圳兆瑞优品科技有限公司 Designated data sharing method facing personal computer user

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周斌: "面向大数据的高效存储容量缩减技术研究", 《CNKI中国博士学位论文全文数据库信息科技辑》 *
安会乐: "vJPEG_MJPEG中Huffman编解码的IP设计", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *
雷永旺: "基于二维图像压缩算法的解压缩设计", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Similar Documents

Publication Publication Date Title
US6567914B1 (en) Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system
US7298840B2 (en) Method and system for data integrity protection
US6711709B1 (en) Integrated block checking system for rapid file transfer of compressed data
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9064133B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US20220209897A1 (en) Indexing-Based Feedback Codes and Methods of Use
CN101779190A (en) Information transmission and integrated protection method
WO2021179518A1 (en) Methods and apparatuses for oblivious transfer using trusted environment
CN116887073A (en) Electric energy meter data acquisition control system based on computer network communication
WO2008036633A2 (en) Systems and methods for providing opportunistic security for physical communication channels
JP5902362B1 (en) Message authentication using a universal hash function computed using carryless multiplication
US9054864B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN113225180A (en) Method and system for protecting communication key
CN114337992A (en) Multi-node-based long-distance data low-loss transmission method
JP2022519671A (en) How to authenticate messages in resource-constrained systems
CN107395772B (en) Management method and management system for repeated data
KR102105428B1 (en) Decoder for multi-error-correction of sec-code and the decoding method thereof
JP3431136B2 (en) Transmission data loss detection system
CN113872753B (en) Encryption transmission method and device based on SHA256 sequence form data
CN113067892B (en) Method for realizing safe cloud synchronization and cloud storage by using public cloud
CN117353940B (en) Data storage device and method for data transmission chain
CN118018144A (en) SD-WAN network transmission error correction method based on quantum computation
CN117615176A (en) Encryption and decryption method and device for streaming media
CN117955653A (en) ECU identity authentication method of CAN bus and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220412