CN115915118A - Wireless data processing method of anti-interference switch based on broadcast type propagation - Google Patents

Wireless data processing method of anti-interference switch based on broadcast type propagation Download PDF

Info

Publication number
CN115915118A
CN115915118A CN202211407771.3A CN202211407771A CN115915118A CN 115915118 A CN115915118 A CN 115915118A CN 202211407771 A CN202211407771 A CN 202211407771A CN 115915118 A CN115915118 A CN 115915118A
Authority
CN
China
Prior art keywords
signature
code
operation code
data
end character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211407771.3A
Other languages
Chinese (zh)
Other versions
CN115915118B (en
Inventor
卢智军
崔昊
王顺中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Utone Construction Consulting Co ltd
Original Assignee
China Utone Construction Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Utone Construction Consulting Co ltd filed Critical China Utone Construction Consulting Co ltd
Priority to CN202211407771.3A priority Critical patent/CN115915118B/en
Publication of CN115915118A publication Critical patent/CN115915118A/en
Application granted granted Critical
Publication of CN115915118B publication Critical patent/CN115915118B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a wireless data processing method of an anti-interference switch based on broadcast type propagation, and relates to the technical field of broadcast data processing. The data structure comprises a signature, encrypted data, an operation code, a verification code A and a verification code B, wherein the signature comprises a front end character, a signature middle end character and a signature tail end character, and the byte numbers of the signature front end character, the signature middle end character, the signature tail end character, the operation code, the verification code A and the verification code B are the same. The wireless data processing method of the anti-interference switch based on the broadcast type transmission verifies whether the receiving end is a command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to be matched with the signature mode, feeds back in time when finding out a signal error, and informs the sending end to resend the command, so that the condition of irrelevant receiving end (switch) operation errors caused by information loss/errors can be well avoided.

Description

Wireless data processing method of anti-interference switch based on broadcast type propagation
Technical Field
The invention relates to the technical field of broadcast data processing, in particular to a wireless data processing method of an anti-interference switch based on broadcast type propagation.
Background
Broadcast transmission networks, data is transmitted in a common medium. Wireless networks and bus-type networks are of this type, and due to production requirements and hardware conditions, remote control of the switch is sometimes required to be achieved by using broadcast-type propagation signals;
in the prior art, if a broadcast type propagation signal mode is needed to realize remote control of a switch, a mode of adding a receiving end number into a control signal is often used as a data processing method, a good error detection way is not provided, and if the number of receiving ends (switches) is large, the situation of operation errors of irrelevant receiving ends (switches) caused by information loss/errors is easy to occur, so that the working efficiency is reduced, and meanwhile, if the switches relate to industrial production, hidden troubles are brought to production.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a wireless data processing method of an anti-interference switch based on broadcast transmission, which solves the problems that in the prior art, a data transmission method of broadcast transmission signals does not have a good error detection way, and if the number of receiving ends (switches) is huge, the situation of operation errors of irrelevant receiving ends (switches) caused by information loss/errors is easy to occur, the working efficiency is reduced, and meanwhile, if the switches relate to industrial production, the hidden danger of production is also brought.
(II) technical scheme
In order to realize the purpose, the invention is realized by the following technical scheme: the utility model provides a data structure, includes signature, encrypted data, opcode, identifying code A and identifying code B, the signature includes front end character, the middle-end character of signature and the terminal character of signature, and the byte number of signature front end character, the middle-end character of signature, the terminal character of signature, the operating code, identifying code A and identifying code B is all the same, and encrypted data is formed by front end character, operating code, the middle-end character of signature, identifying code A, the terminal character of signature and identifying code B concatenation in proper order.
A signature encryption method comprises the data structure, and the specific operations are as follows:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the return value of the signature and the operation code is encrypted data;
SA2, acquiring the signature of the current receiving end so as to obtain a front end character Q7 of the current signature, a middle end character Q8 of the current signature and a tail end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation codes (the last x bits of the result are taken, and x is the bit number of the front signature character), and the verification code B = Q8+ operation codes (the last x bits of the result are taken, and x is the bit number of the front signature character);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the calculation.
A signature decryption method comprises the above data structure, and specifically comprises the following operations:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
A wireless data processing method based on an anti-interference switch of broadcast type transmission comprises the data structure, the signature encryption method and the signature decryption method, and specifically comprises the following operations:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, and acquiring a signature of a receiving end;
SC3, using a signature encryption method to encrypt data, wherein the parameters are a signature and an operation code, and the return value is encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are the signature of a receiving end, data are encrypted, and a return value is Y/N and an operation code;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving terminal pack the encrypted data to generate packed data, then the packed data is sent in a broadcasting mode, after the sending terminal receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
Preferably, in step SC2, the operation code is randomly generated according to the control request, the effective value of the operation code cannot be 0, the effective value of the operation code is an odd number if the operation code is an on signal, and the effective value of the operation code is an even number if the operation code is an off signal.
Preferably, in step SC8, the switch is controlled to be turned on if the valid value of the operation code is an odd number, and the switch is controlled to be turned off if the valid value of the operation code is an even number.
(III) advantageous effects
The invention provides a wireless data processing method of an anti-interference switch based on broadcast type propagation. The method has the following beneficial effects:
(1) The wireless data processing method of the anti-interference switch based on the broadcast type propagation verifies whether the receiving end is a command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to be matched with the signature mode, and timely feeds back when finding out signal errors, informs the sending end to resend the command, can well avoid the condition of irrelevant receiving end (switch) operation errors caused by information loss/errors, greatly strengthens the anti-interference capability of the receiving end (switch), improves the working efficiency, and reduces the error rate of work.
(2) The wireless data processing method of the anti-interference switch based on broadcast propagation realizes marking of the sent command to a certain extent by adopting the random operation codes (namely, under most conditions, the system can distinguish the sent command every time, but the distinguishing does not need to occupy larger resources), and the marking does not occupy large storage space like a serial number mark, is convenient for the intervention of other processes, and is beneficial to the processing of the data generated by the method by other processes.
Drawings
FIG. 1 is a schematic flow chart of a signature encryption algorithm according to the present invention;
FIG. 2 is a schematic flow chart of a signature decryption algorithm according to the present invention;
FIG. 3 is a schematic flow chart of a wireless data processing method of the broadcast-based anti-interference switch according to the present invention;
FIG. 4 is a diagram illustrating a data structure of a signature according to the present invention;
FIG. 5 is a diagram illustrating a data structure of encrypted data according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-5, the present invention provides a technical solution: a data structure, characterized by: the signature comprises a front end character, a signature middle end character and a signature tail end character, the number of bytes of the signature front end character, the signature middle end character, the signature tail end character, the operation code, the verification code A and the verification code B are the same, and the encrypted data is formed by sequentially splicing the front end character, the operation code, the signature middle end character, the verification code A, the signature tail end character and the verification code B.
A signature encryption method comprises the data structure and specifically comprises the following operations:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the signature and the operation code, and the return value is encrypted data;
SA2, acquiring the signature of the current receiving end so as to obtain a front end character Q7 of the current signature, a middle end character Q8 of the current signature and a tail end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature), and the verification code B = Q8+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the operation.
A signature decryption method, the data structure comprises the following operations:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
A wireless data processing method based on a broadcast-type propagation anti-interference switch comprises the data structure, a signature encryption method and a signature decryption method, and specifically comprises the following operations:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, acquiring the signature of the receiving end, randomly generating the operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, if the effective value is an opening signal, the effective value of the operation code is an odd number, and if the effective value is a closing signal, the effective value of the operation code is an even number;
SC3, using a signature encryption method to encrypt data, wherein parameters are signatures and operation codes, and return values are encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are signatures of a receiving end, data are encrypted, and return values are Y/N and operation codes;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed, wherein if the effective value of the operation code is an odd number, the control switch is turned on, and if the effective value of the operation code is an even number, the control switch is turned off;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving end pack the encrypted data to generate packed data, then the packed data is sent in a broadcast mode, after the sending end receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
To sum up, the wireless data processing method of the broadcast-based anti-interference switch verifies whether the receiving end is the command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to cooperate with the signature mode, feeds back in time when a signal error is found, and informs the sending end to resend the command, thereby well avoiding the situation of irrelevant receiving end (switch) operation error caused by information loss/error, greatly enhancing the anti-interference capability of the receiving end (switch), improving the working efficiency and reducing the error rate of work.
Meanwhile, the wireless data processing method of the anti-interference switch based on broadcast propagation realizes marking of the sent commands to a certain extent by adopting random operation codes (namely, under most conditions, the system can distinguish the sent commands each time, but the distinguishing does not need to occupy larger resources), and the marking does not occupy large storage space like serial number marking, thereby facilitating the intervention of other processes and being beneficial to the processing of the data generated by the method by other processes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A data structure, characterized by: the signature comprises a front-end character, a signature middle-end character and a signature tail-end character, the signature front-end character, the signature middle-end character, the signature tail-end character, the operation code, the verification code A and the verification code B are identical in byte number, and the encrypted data is formed by sequentially splicing the front-end character, the operation code, the signature middle-end character, the verification code A, the signature tail-end character and the verification code B.
2. A signature encryption method, characterized by: comprising the data structure of claim 1, and operating as follows:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the signature and the operation code, and the return value is encrypted data;
SA2, obtaining a signature of a current receiving end so as to obtain a front-end character Q7 of the current signature, a middle-end character Q8 of the current signature and a tail-end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature), and the verification code B = Q8+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the operation.
3. A signature decryption method, comprising: comprising the data structure of claim 1, the specific operations being as follows:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
4. A wireless data processing method of an anti-interference switch based on broadcast type propagation is characterized in that: the signature encryption method of claim 2 and the signature decryption method of claim 3, including the data structure of claim 1, the specific operations are as follows:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, and acquiring a signature of a receiving end;
SC3, using a signature encryption method to encrypt data, wherein parameters are signatures and operation codes, and return values are encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are the signature of a receiving end, data are encrypted, and a return value is Y/N and an operation code;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving end pack the encrypted data to generate packed data, then the packed data is sent in a broadcast mode, after the sending end receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
5. The method of claim 4, wherein the wireless data processing method comprises: in step SC2, an operation code is randomly generated according to the control requirement, the effective value of the operation code cannot be 0, if the operation code is an on signal, the effective value of the operation code is an odd number, and if the operation code is an off signal, the effective value of the operation code is an even number.
6. The method of claim 4, wherein the wireless data processing method comprises: in step SC8, the switch is controlled to be turned on if the valid value of the operation code is odd, and to be turned off if the valid value of the operation code is even.
CN202211407771.3A 2022-11-10 2022-11-10 Wireless data processing method of anti-interference switch based on broadcast transmission Active CN115915118B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211407771.3A CN115915118B (en) 2022-11-10 2022-11-10 Wireless data processing method of anti-interference switch based on broadcast transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211407771.3A CN115915118B (en) 2022-11-10 2022-11-10 Wireless data processing method of anti-interference switch based on broadcast transmission

Publications (2)

Publication Number Publication Date
CN115915118A true CN115915118A (en) 2023-04-04
CN115915118B CN115915118B (en) 2024-01-23

Family

ID=86481770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211407771.3A Active CN115915118B (en) 2022-11-10 2022-11-10 Wireless data processing method of anti-interference switch based on broadcast transmission

Country Status (1)

Country Link
CN (1) CN115915118B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848087A (en) * 2009-03-25 2010-09-29 资通电脑股份有限公司 Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system
CN106972924A (en) * 2017-03-23 2017-07-21 联想(北京)有限公司 Encryption, decryption, Electronic Signature, the method and device for verifying stamped signature
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN110458531A (en) * 2019-08-16 2019-11-15 中国银行股份有限公司 Signature method, device, computer equipment and computer readable storage medium
CN113658031A (en) * 2021-08-25 2021-11-16 河北冀联人力资源服务集团有限公司 Electronic signature method, system and storage medium
CN114697038A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Quantum attack resistant electronic signature method and system
WO2022161012A1 (en) * 2021-01-28 2022-08-04 京东科技控股股份有限公司 Method and device for updating digital certificate of electronic signature, and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848087A (en) * 2009-03-25 2010-09-29 资通电脑股份有限公司 Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system
CN106972924A (en) * 2017-03-23 2017-07-21 联想(北京)有限公司 Encryption, decryption, Electronic Signature, the method and device for verifying stamped signature
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN110458531A (en) * 2019-08-16 2019-11-15 中国银行股份有限公司 Signature method, device, computer equipment and computer readable storage medium
CN114697038A (en) * 2020-12-31 2022-07-01 科大国盾量子技术股份有限公司 Quantum attack resistant electronic signature method and system
WO2022161012A1 (en) * 2021-01-28 2022-08-04 京东科技控股股份有限公司 Method and device for updating digital certificate of electronic signature, and storage medium
CN113658031A (en) * 2021-08-25 2021-11-16 河北冀联人力资源服务集团有限公司 Electronic signature method, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄冠利;胡亦;: "基于PKI体系的数字签章安全系统设计", 计算机安全, no. 09 *

Also Published As

Publication number Publication date
CN115915118B (en) 2024-01-23

Similar Documents

Publication Publication Date Title
RU2008152288A (en) EFFECTIVE METHODS AND DEVICES OF ADDRESSING WIRELESS COMMUNICATION LINES
CN113301568B (en) Network distribution method and device and intelligent household equipment
CN110474711B (en) Encoding method, apparatus and readable storage medium
US11477308B2 (en) Adaptive payload extraction in wireless communications involving multi-access address packets
CN106650849A (en) Data transmission method, device and system
CN103442250A (en) System and method for debugging television
CN112817602A (en) JSON format data sending and receiving method, device and medium
US20080301537A1 (en) Packet transmission device and packet transmission method
CN115915118A (en) Wireless data processing method of anti-interference switch based on broadcast type propagation
Zhang et al. Towards sound and optimal leakage detection procedure
KR102397852B1 (en) Authenticated confirmation and activation messages
CN110400569B (en) Bluetooth audio repairing method and terminal equipment
CN112541102B (en) Abnormal data filtering method, device, equipment and storage medium
JP2012068769A (en) Wireless tag writing device, wireless tag reading device, wireless tag writing method, wireless tag reading method and wireless tag
CN109346080B (en) Voice control method, device, equipment and storage medium
KR20220038623A (en) Method and apparatus for detecting
JP6730138B2 (en) Data decoding system and data decoding method
CN107276683B (en) Decoding method, sending method and device of underwater sound signal
CN111866274A (en) Data transmission method and device, mobile device, intelligent terminal and medium
CN209845136U (en) Recorded broadcast camera system with android system
KR101459172B1 (en) Apparatus and method for repeating Power Line Communication
MY135662A (en) Data transformation for explicit transmission of control information
JP5757160B2 (en) Control bus system
CN113965275B (en) Wireless base function detection method based on Bluetooth communication
KR102617950B1 (en) Method and apparatus for self generating malware traffic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant