CN114337992A - Multi-node-based long-distance data low-loss transmission method - Google Patents
Multi-node-based long-distance data low-loss transmission method Download PDFInfo
- Publication number
- CN114337992A CN114337992A CN202210222288.1A CN202210222288A CN114337992A CN 114337992 A CN114337992 A CN 114337992A CN 202210222288 A CN202210222288 A CN 202210222288A CN 114337992 A CN114337992 A CN 114337992A
- Authority
- CN
- China
- Prior art keywords
- data
- memory
- receiver
- data packet
- occupied
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the technical field of digital information transmission, in particular to a multi-node-based long-distance data low-loss transmission method. The method comprises the following steps of packaging transmitted data in a transmitter by adopting a data packaging encryption algorithm, detecting the memory occupied by a data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting a memory occupied comparison algorithm; the external memory opens a transmission link to receive a data packet, a data crawler removing algorithm is adopted to retrieve data in the receiver, a signal enhancement technology is adopted to connect the transmission link between the sender and the receiver, and the data packet is transmitted into the receiver; the receiver receives the data packet for decompression, and decrypts the data through the MD5 verification algorithm, the invention encrypts the data before data transmission, avoids interception by a third party, detects the maximum memory which can be used by the receiver and the occupied memory of the data packet, avoids overload operation, reduces the memory of the receiver and improves transmission safety.
Description
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a multi-node-based long-distance data low-loss transmission method.
Background
In many management information systems, data exchange between different places, that is, remote data exchange, is often required, correct, stable, safe and reliable data exchange is directly related to normal operation of the system, and there are two main ways from the viewpoint of data transmission: direct data exchange among databases and data transmission taking files as intermediaries, under the condition that a network is smooth, firstly, a local database is connected with a database at a different place, then, data transmission is directly carried out between the databases, namely, operations such as inserting, modifying, deleting and the like of a corresponding table in the databases are carried out, and finally, the connection is disconnected;
in the process of data long-distance transmission, if a line is unstable or a machine is suddenly powered off, serious consequences such as data confusion, error loss and the like can be caused, because direct data exchange is adopted, the data security is relatively poor, if a hacker intercepts and changes the data, malignant events are easily caused, even a system is paralyzed, and the influence of human factors is particularly serious;
when data with a large memory is transmitted, the memory space which can be accommodated by the receiver is not detected, so that the data is directly transmitted to the receiver, the receiver is overloaded in operation, the system is easy to crash, and the service life of the receiver is influenced.
Disclosure of Invention
The present invention is directed to a low-loss transmission method based on multi-node long-distance data, so as to solve the problems mentioned in the above background art.
In order to achieve the above object, the present invention provides a low-loss transmission method based on multi-node long-distance data, comprising the following steps:
packaging the transmitted data in a transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting an occupied memory comparison algorithm;
when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens a transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
searching data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a transmission link is connected between the sender and the receiver by adopting a signal enhancement technology, and the data packet is transmitted into the receiver;
the receiver receives the data packet for decompression, decrypts the data through an MD5 verification algorithm, and performs summarization processing on the data to verify whether the data is modified or damaged in the data transmission process;
the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
As a further improvement of the technical solution, the data encapsulation encryption algorithm includes the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data block data are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data, until the physical layer is reached, the data are converted into bits and transmitted through a medium, so that a plurality of data blocks are encapsulated and integrated into a data packet, the data blocks are encrypted and decrypted after being received, interception of a third party in the transmission process can be avoided, and data leakage is avoided.
As a further improvement of the technical solution, the calculation formula of the data encapsulation encryption algorithm is as follows:
wherein, X is a data packet, X1, X2.
As a further improvement of the present technical solution, the occupied memory comparison algorithm includes the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0The data packet is a low-bit value of the memory, and the transmitted data can be safely transmitted by comparing the maximum memory which can be used by the receiver with the occupied memory of the data packet, so that the overload of the receiver in operation is avoided, and the safety is higher.
As a further improvement of the technical solution, the data crawler clearing algorithm includes the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
wherein E is the average length of Chunk, SminIs the minimum length of Chunk, and Smax is the maximum of ChunkLarge length, n being the binary bits contained in the target pattern, p being the probability of signature and pattern matching;
data compression, which reduces the redundancy of data by adopting a related coding compression technology, achieves the purpose of reducing storage capacity, is beneficial to receiving data with larger memory and has stronger practicability.
As a further improvement of the technical solution, the related coding compression technology adopts a redundancy detection coding tree algorithm, which specifically includes:
calculating relative data redundancy:
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
As a further improvement of the technical solution, the signal enhancement technology employs a signal amplification enhancer, which includes an external antenna, an amplifier, and an internal antenna, the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a transmitter to send or receive signals, the amplifier is used to enhance and then send out received signals, so as to form a wireless system to enhance cellular reception, and make the data transmission strength between the transmitter and the receiver higher.
As a further improvement of the present technical solution, the MD5 verification algorithm includes the following steps:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to be input of the MD5 function to generate a hash value, the hash value is compared with the data block of the receiver, whether the transmitted data is modified or damaged signals or not is judged, the influence on a system of the receiver caused by the modified data of a third party is avoided, and the safety of output transmission is further improved.
Compared with the prior art, the invention has the beneficial effects that:
in the multi-node remote data low-loss transmission method, data is encrypted before data transmission, so that the safety in the transmission process is improved, the data is prevented from being intercepted by a third party, the comparison between the maximum memory usable by a receiver and the occupied memory of a data packet is detected, the memory of the receiver is reduced, the data can be safely transmitted, the comparison between the maximum memory usable by the receiver and the occupied memory of the data packet can ensure that the transmitted data can be safely transmitted, the overload of the receiver is avoided, the safety is higher, the reduction of the space stored in the receiver is beneficial to receiving the data of a larger memory, the practicability is higher, a data block is encrypted through a data packaging encryption algorithm, the decryption is carried out after the data block is received, the interception of the third party in the transmission process can be avoided, the data leakage is avoided, and the MD5 is used for verifying whether the data is damaged or modified, the influence on a system of a receiver caused by using the data modified by the third party is avoided, and the safety of output transmission is further improved.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is an overall algorithm block diagram of embodiment 1;
FIG. 3 is a schematic view of the whole apparatus of embodiment 1;
FIG. 4 is a flow chart of a data packing encryption algorithm of embodiment 1;
FIG. 5 is a flowchart of the data crawler cleanup algorithm of example 1;
fig. 6 is a flow chart of the MD5 authentication algorithm of example 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-6, the present embodiment provides a multi-node based long-distance data low-loss transmission method, which includes the following steps:
s1, packaging the transmitted data in the transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
s2, detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by the receiver by adopting an occupied memory comparison algorithm;
s3, when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens the transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
s4, retrieving data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
s5, when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a signal enhancement technology is adopted to connect a transmission link between the sender and the receiver, and the data packet is transmitted into the receiver;
s6, the receiver receives the data packet and decompresses the data packet, then decrypts the data through the MD5 verification algorithm, and performs summary processing on the data to verify whether the data is modified or damaged in the data transmission process;
s7, the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
In this embodiment, the data encapsulation encryption algorithm includes the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data block data are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data, until the physical layer is reached, the data are converted into bits and transmitted through a medium, so that a plurality of data blocks are encapsulated and integrated into a data packet, the data blocks are encrypted and decrypted after being received, interception of a third party in the transmission process can be avoided, and data leakage is avoided.
Specifically, the calculation formula of the data encapsulation encryption algorithm is as follows:
wherein, X is a data packet, X1, X2.
Further, the occupied memory comparison algorithm includes the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0For low values of memory, the receiver can be used to controlCompared with the occupied memory of the data packet, the maximum memory can ensure that the transmitted data can be safely transmitted, thereby avoiding overload operation of the receiver and having higher safety.
Further, the data crawler clearing algorithm comprises the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
wherein E is the average length of Chunk, SminThe minimum length of the Chunk, Smax the maximum length of the Chunk, n the binary bits contained in the target pattern, and p the probability of signature and pattern matching;
data compression, which reduces the redundancy of data by adopting a related coding compression technology, achieves the purpose of reducing storage capacity, is beneficial to receiving data with larger memory and has stronger practicability.
Specifically, the related coding compression technology adopts a redundancy detection coding tree algorithm, and specifically includes:
calculating relative data redundancy:
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
It should be noted that the signal enhancement technology employs a signal amplification enhancer, which includes an external antenna, an amplifier, and an internal antenna, where the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a transmitter to send or receive signals, and the amplifier is used to enhance and then send out received signals, so as to form a wireless system to enhance cellular reception, so that the data transmission strength between the transmitter and the receiver is higher.
In addition, the MD5 verification algorithm includes the steps of:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to be input of the MD5 function to generate a hash value, the hash value is compared with the data block of the receiver, whether the transmitted data is modified or damaged signals or not is judged, the influence on a system of the receiver caused by the modified data of a third party is avoided, and the safety of output transmission is further improved.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (8)
1. The low-loss transmission method based on the multi-node long-distance data is characterized by comprising the following steps of:
packaging the transmitted data in a transmitter by adopting a data packaging encryption algorithm, encrypting the transmitted data block, and packaging the data block into a data packet;
detecting the memory occupied by the data packet, and comparing the memory occupied by the data packet with the maximum memory receivable by a receiver by adopting an occupied memory comparison algorithm;
when a signal that the memory occupied by the data packet is larger than the maximum memory receivable by the receiver is received, the external memory opens a transmission link to receive the data packet, and the data packet is temporarily stored in the external memory;
searching data in the receiver by adopting a data crawler removing algorithm, removing repeated and damaged data, reducing the data and relieving the memory of the receiver;
when a signal that the memory occupied by the data packet is less than or equal to the maximum memory receivable by the receiver is received, a transmission link is connected between the sender and the receiver by adopting a signal enhancement technology, and the data packet is transmitted into the receiver;
the receiver receives the data packet for decompression, decrypts the data through an MD5 verification algorithm, and performs summarization processing on the data to verify whether the data is modified or damaged in the data transmission process;
the receiver stores the data which is not modified or damaged, and outputs the modified or damaged data to the signal of the invalid file for retransmission.
2. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the data encapsulation encryption algorithm comprises the following steps:
searching a plurality of data blocks needing to be transmitted, and encrypting each data block to generate a ciphertext;
when a plurality of data blocks are transmitted downwards along a protocol stack, a header is added to each layer, the encapsulated content is transmitted to the next layer as data until reaching a physical layer, the data is converted into bits and transmitted through a medium, and the plurality of data blocks are encapsulated and integrated into a data packet.
4. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the occupied memory comparison algorithm comprises the following steps:
the occupied memory of the keying-in data packet and the usable memory of the receiver;
comparing the occupied memory of the data packet with the available memory value of the receiver, and calculating the formula as follows:
f is the result of the numerical comparison output, A is the occupied memory value of the data packet, B is the maximum memory value which can be received by the receiver, A1And B1For a high value of the memory, A0And B0Is the memory low value.
5. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the data crawler clearing algorithm comprises the following steps:
the data de-duplication method includes the steps of dividing a data object to be processed into a group of continuous and non-overlapping data blocks according to de-duplication granularity, calculating data fingerprints of each Chunk by using an encryption algorithm, storing the data fingerprints as unique identifiers of the chunks into a hash table, storing data in the data object by taking the Chunk as a unit, and deleting one of the same data by calculating fingerprint values FP of each Chunk in a new data object and comparing the fingerprint values FP with the identifiers stored in the hash table when the new data object is written, wherein the average length calculation formula of the Chunk is as follows:
wherein E is the average length of Chunk, SminThe minimum length of the Chunk, Smax the maximum length of the Chunk, n the binary bits contained in the target pattern, and p the probability of signature and pattern matching;
and data compression, namely, reducing the redundancy of data by adopting a related coding compression technology to achieve the aim of reducing the storage capacity.
6. The multi-node long-distance data low-loss transmission method according to claim 5, wherein: the related coding compression technology adopts a redundancy detection coding tree algorithm, and specifically comprises the following steps:
calculating relative data redundancy:
wherein, R is relative data redundancy value, CR is compression ratio, n1 is data volume before compression, and n2 is data volume after compression;
sequencing the information sources according to the symbol occurrence probability in a descending order;
adding and combining the probabilities of the two symbols with the minimum probability to form a new node, wherein the probability of the new node is equal to the sum of the probabilities of the two symbols until the sum of the probabilities is equal to 1;
tracing back to an original symbol from the root of the coding tree, and assigning a value of 1 to each lower branch and a value of 0 to each upper branch;
and finally, recording the 0 and 1 sequences from the probability 1 to the current source symbol to obtain the code of each symbol.
7. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the signal enhancement technology adopts a signal amplification enhancer, which comprises an external antenna, an amplifier and an internal antenna, wherein the external antenna is used for a receiver to send or receive signals, the internal antenna is used for a sender to send or receive signals, and the amplifier is used for enhancing the received signals and then sending the signals.
8. The multi-node long-distance data low-loss transmission method according to claim 1, wherein: the MD5 authentication algorithm includes the steps of:
decoding the data packet received by the receiver, and obtaining a data block through ciphertext decryption;
the original data of the transmitter is transformed to produce a hash value as an input to the MD5 function, and the hash value is compared to the data block of the receiver to determine whether the transmitted data has been modified or corrupted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210222288.1A CN114337992A (en) | 2022-03-09 | 2022-03-09 | Multi-node-based long-distance data low-loss transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210222288.1A CN114337992A (en) | 2022-03-09 | 2022-03-09 | Multi-node-based long-distance data low-loss transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114337992A true CN114337992A (en) | 2022-04-12 |
Family
ID=81033684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210222288.1A Pending CN114337992A (en) | 2022-03-09 | 2022-03-09 | Multi-node-based long-distance data low-loss transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114337992A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811265A (en) * | 2014-01-29 | 2015-07-29 | 上海数字电视国家工程研究中心有限公司 | Base-band frame encapsulation method and de-encapsulation method |
CN105786723A (en) * | 2016-03-14 | 2016-07-20 | 深圳创维-Rgb电子有限公司 | Application cache management method and device based on linked list |
CN111611463A (en) * | 2020-04-21 | 2020-09-01 | 天津大学 | Scapy-Redis-based distributed web crawler optimization method |
CN113423109A (en) * | 2021-08-24 | 2021-09-21 | 深圳兆瑞优品科技有限公司 | Designated data sharing method facing personal computer user |
US20210312189A1 (en) * | 2020-04-02 | 2021-10-07 | Samsung Electronics Co., Ltd. | Dynamic vision filtering for event detection |
-
2022
- 2022-03-09 CN CN202210222288.1A patent/CN114337992A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811265A (en) * | 2014-01-29 | 2015-07-29 | 上海数字电视国家工程研究中心有限公司 | Base-band frame encapsulation method and de-encapsulation method |
CN105786723A (en) * | 2016-03-14 | 2016-07-20 | 深圳创维-Rgb电子有限公司 | Application cache management method and device based on linked list |
US20210312189A1 (en) * | 2020-04-02 | 2021-10-07 | Samsung Electronics Co., Ltd. | Dynamic vision filtering for event detection |
CN111611463A (en) * | 2020-04-21 | 2020-09-01 | 天津大学 | Scapy-Redis-based distributed web crawler optimization method |
CN113423109A (en) * | 2021-08-24 | 2021-09-21 | 深圳兆瑞优品科技有限公司 | Designated data sharing method facing personal computer user |
Non-Patent Citations (3)
Title |
---|
周斌: "面向大数据的高效存储容量缩减技术研究", 《CNKI中国博士学位论文全文数据库信息科技辑》 * |
安会乐: "vJPEG_MJPEG中Huffman编解码的IP设计", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
雷永旺: "基于二维图像压缩算法的解压缩设计", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6567914B1 (en) | Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system | |
US7298840B2 (en) | Method and system for data integrity protection | |
US6711709B1 (en) | Integrated block checking system for rapid file transfer of compressed data | |
US9256499B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
US9122882B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
US9064133B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
US20220209897A1 (en) | Indexing-Based Feedback Codes and Methods of Use | |
CN101779190A (en) | Information transmission and integrated protection method | |
WO2021179518A1 (en) | Methods and apparatuses for oblivious transfer using trusted environment | |
CN116887073A (en) | Electric energy meter data acquisition control system based on computer network communication | |
WO2008036633A2 (en) | Systems and methods for providing opportunistic security for physical communication channels | |
JP5902362B1 (en) | Message authentication using a universal hash function computed using carryless multiplication | |
US9054864B2 (en) | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |
CN113225180A (en) | Method and system for protecting communication key | |
CN114337992A (en) | Multi-node-based long-distance data low-loss transmission method | |
JP2022519671A (en) | How to authenticate messages in resource-constrained systems | |
CN107395772B (en) | Management method and management system for repeated data | |
KR102105428B1 (en) | Decoder for multi-error-correction of sec-code and the decoding method thereof | |
JP3431136B2 (en) | Transmission data loss detection system | |
CN113872753B (en) | Encryption transmission method and device based on SHA256 sequence form data | |
CN113067892B (en) | Method for realizing safe cloud synchronization and cloud storage by using public cloud | |
CN117353940B (en) | Data storage device and method for data transmission chain | |
CN118018144A (en) | SD-WAN network transmission error correction method based on quantum computation | |
CN117615176A (en) | Encryption and decryption method and device for streaming media | |
CN117955653A (en) | ECU identity authentication method of CAN bus and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220412 |