CN115915118A - Wireless data processing method of anti-interference switch based on broadcast type propagation - Google Patents
Wireless data processing method of anti-interference switch based on broadcast type propagation Download PDFInfo
- Publication number
- CN115915118A CN115915118A CN202211407771.3A CN202211407771A CN115915118A CN 115915118 A CN115915118 A CN 115915118A CN 202211407771 A CN202211407771 A CN 202211407771A CN 115915118 A CN115915118 A CN 115915118A
- Authority
- CN
- China
- Prior art keywords
- signature
- code
- operation code
- data
- end character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 18
- 238000012795 verification Methods 0.000 claims abstract description 48
- 238000000034 method Methods 0.000 claims description 44
- 230000008054 signal transmission Effects 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000007689 inspection Methods 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009776 industrial production Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a wireless data processing method of an anti-interference switch based on broadcast type propagation, and relates to the technical field of broadcast data processing. The data structure comprises a signature, encrypted data, an operation code, a verification code A and a verification code B, wherein the signature comprises a front end character, a signature middle end character and a signature tail end character, and the byte numbers of the signature front end character, the signature middle end character, the signature tail end character, the operation code, the verification code A and the verification code B are the same. The wireless data processing method of the anti-interference switch based on the broadcast type transmission verifies whether the receiving end is a command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to be matched with the signature mode, feeds back in time when finding out a signal error, and informs the sending end to resend the command, so that the condition of irrelevant receiving end (switch) operation errors caused by information loss/errors can be well avoided.
Description
Technical Field
The invention relates to the technical field of broadcast data processing, in particular to a wireless data processing method of an anti-interference switch based on broadcast type propagation.
Background
Broadcast transmission networks, data is transmitted in a common medium. Wireless networks and bus-type networks are of this type, and due to production requirements and hardware conditions, remote control of the switch is sometimes required to be achieved by using broadcast-type propagation signals;
in the prior art, if a broadcast type propagation signal mode is needed to realize remote control of a switch, a mode of adding a receiving end number into a control signal is often used as a data processing method, a good error detection way is not provided, and if the number of receiving ends (switches) is large, the situation of operation errors of irrelevant receiving ends (switches) caused by information loss/errors is easy to occur, so that the working efficiency is reduced, and meanwhile, if the switches relate to industrial production, hidden troubles are brought to production.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a wireless data processing method of an anti-interference switch based on broadcast transmission, which solves the problems that in the prior art, a data transmission method of broadcast transmission signals does not have a good error detection way, and if the number of receiving ends (switches) is huge, the situation of operation errors of irrelevant receiving ends (switches) caused by information loss/errors is easy to occur, the working efficiency is reduced, and meanwhile, if the switches relate to industrial production, the hidden danger of production is also brought.
(II) technical scheme
In order to realize the purpose, the invention is realized by the following technical scheme: the utility model provides a data structure, includes signature, encrypted data, opcode, identifying code A and identifying code B, the signature includes front end character, the middle-end character of signature and the terminal character of signature, and the byte number of signature front end character, the middle-end character of signature, the terminal character of signature, the operating code, identifying code A and identifying code B is all the same, and encrypted data is formed by front end character, operating code, the middle-end character of signature, identifying code A, the terminal character of signature and identifying code B concatenation in proper order.
A signature encryption method comprises the data structure, and the specific operations are as follows:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the return value of the signature and the operation code is encrypted data;
SA2, acquiring the signature of the current receiving end so as to obtain a front end character Q7 of the current signature, a middle end character Q8 of the current signature and a tail end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation codes (the last x bits of the result are taken, and x is the bit number of the front signature character), and the verification code B = Q8+ operation codes (the last x bits of the result are taken, and x is the bit number of the front signature character);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the calculation.
A signature decryption method comprises the above data structure, and specifically comprises the following operations:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
A wireless data processing method based on an anti-interference switch of broadcast type transmission comprises the data structure, the signature encryption method and the signature decryption method, and specifically comprises the following operations:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, and acquiring a signature of a receiving end;
SC3, using a signature encryption method to encrypt data, wherein the parameters are a signature and an operation code, and the return value is encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are the signature of a receiving end, data are encrypted, and a return value is Y/N and an operation code;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving terminal pack the encrypted data to generate packed data, then the packed data is sent in a broadcasting mode, after the sending terminal receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
Preferably, in step SC2, the operation code is randomly generated according to the control request, the effective value of the operation code cannot be 0, the effective value of the operation code is an odd number if the operation code is an on signal, and the effective value of the operation code is an even number if the operation code is an off signal.
Preferably, in step SC8, the switch is controlled to be turned on if the valid value of the operation code is an odd number, and the switch is controlled to be turned off if the valid value of the operation code is an even number.
(III) advantageous effects
The invention provides a wireless data processing method of an anti-interference switch based on broadcast type propagation. The method has the following beneficial effects:
(1) The wireless data processing method of the anti-interference switch based on the broadcast type propagation verifies whether the receiving end is a command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to be matched with the signature mode, and timely feeds back when finding out signal errors, informs the sending end to resend the command, can well avoid the condition of irrelevant receiving end (switch) operation errors caused by information loss/errors, greatly strengthens the anti-interference capability of the receiving end (switch), improves the working efficiency, and reduces the error rate of work.
(2) The wireless data processing method of the anti-interference switch based on broadcast propagation realizes marking of the sent command to a certain extent by adopting the random operation codes (namely, under most conditions, the system can distinguish the sent command every time, but the distinguishing does not need to occupy larger resources), and the marking does not occupy large storage space like a serial number mark, is convenient for the intervention of other processes, and is beneficial to the processing of the data generated by the method by other processes.
Drawings
FIG. 1 is a schematic flow chart of a signature encryption algorithm according to the present invention;
FIG. 2 is a schematic flow chart of a signature decryption algorithm according to the present invention;
FIG. 3 is a schematic flow chart of a wireless data processing method of the broadcast-based anti-interference switch according to the present invention;
FIG. 4 is a diagram illustrating a data structure of a signature according to the present invention;
FIG. 5 is a diagram illustrating a data structure of encrypted data according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-5, the present invention provides a technical solution: a data structure, characterized by: the signature comprises a front end character, a signature middle end character and a signature tail end character, the number of bytes of the signature front end character, the signature middle end character, the signature tail end character, the operation code, the verification code A and the verification code B are the same, and the encrypted data is formed by sequentially splicing the front end character, the operation code, the signature middle end character, the verification code A, the signature tail end character and the verification code B.
A signature encryption method comprises the data structure and specifically comprises the following operations:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the signature and the operation code, and the return value is encrypted data;
SA2, acquiring the signature of the current receiving end so as to obtain a front end character Q7 of the current signature, a middle end character Q8 of the current signature and a tail end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature), and the verification code B = Q8+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the operation.
A signature decryption method, the data structure comprises the following operations:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
A wireless data processing method based on a broadcast-type propagation anti-interference switch comprises the data structure, a signature encryption method and a signature decryption method, and specifically comprises the following operations:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, acquiring the signature of the receiving end, randomly generating the operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, if the effective value is an opening signal, the effective value of the operation code is an odd number, and if the effective value is a closing signal, the effective value of the operation code is an even number;
SC3, using a signature encryption method to encrypt data, wherein parameters are signatures and operation codes, and return values are encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are signatures of a receiving end, data are encrypted, and return values are Y/N and operation codes;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed, wherein if the effective value of the operation code is an odd number, the control switch is turned on, and if the effective value of the operation code is an even number, the control switch is turned off;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving end pack the encrypted data to generate packed data, then the packed data is sent in a broadcast mode, after the sending end receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
To sum up, the wireless data processing method of the broadcast-based anti-interference switch verifies whether the receiving end is the command end or not by adopting a three-section signature mode, realizes the inspection of the received data by adopting a random operation code, a verification code A and a verification code B to cooperate with the signature mode, feeds back in time when a signal error is found, and informs the sending end to resend the command, thereby well avoiding the situation of irrelevant receiving end (switch) operation error caused by information loss/error, greatly enhancing the anti-interference capability of the receiving end (switch), improving the working efficiency and reducing the error rate of work.
Meanwhile, the wireless data processing method of the anti-interference switch based on broadcast propagation realizes marking of the sent commands to a certain extent by adopting random operation codes (namely, under most conditions, the system can distinguish the sent commands each time, but the distinguishing does not need to occupy larger resources), and the marking does not occupy large storage space like serial number marking, thereby facilitating the intervention of other processes and being beneficial to the processing of the data generated by the method by other processes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. A data structure, characterized by: the signature comprises a front-end character, a signature middle-end character and a signature tail-end character, the signature front-end character, the signature middle-end character, the signature tail-end character, the operation code, the verification code A and the verification code B are identical in byte number, and the encrypted data is formed by sequentially splicing the front-end character, the operation code, the signature middle-end character, the verification code A, the signature tail-end character and the verification code B.
2. A signature encryption method, characterized by: comprising the data structure of claim 1, and operating as follows:
SA1, starting a signature encryption method, and acquiring related parameters, wherein the parameters comprise: the signature and the operation code, and the return value is encrypted data;
SA2, obtaining a signature of a current receiving end so as to obtain a front-end character Q7 of the current signature, a middle-end character Q8 of the current signature and a tail-end character Q9 of the current signature;
SA3, obtaining a verification code A and a verification code B through calculation, wherein the verification code A = Q7+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature), and the verification code B = Q8+ operation code (the number of the last x bits of the result is taken, and x is the number of bits of the characters at the front end of the signature);
SA4, splicing the Q7, the operation code, the Q8, the verification codes A, Q9 and the verification code B in sequence to obtain encrypted data;
SA5, outputting encrypted data;
and SA6, finishing the operation.
3. A signature decryption method, comprising: comprising the data structure of claim 1, the specific operations being as follows:
SB1, starting a signature decryption method, and obtaining relevant parameters, wherein the parameters comprise: signing, encrypting data, and returning a value of Y/N and an operation code;
SB2, acquiring the signature of the current receiving end so as to obtain a current signature front end character Q1, a current signature middle end character Q2 and a current signature tail end character Q3, and acquiring the signature in the parameters so as to obtain a parameter signature front end character Q4, a parameter signature middle end character Q5 and a parameter signature tail end character Q6, and acquiring the operation code, the verification code A and the verification code B in the parameters;
SB3, determining whether Q1= Q4 & Q2= Q5 & Q3= Q6, if the result is true, performing step SB4, and if the result is false, ending the calculation;
SB4, determining whether the Q1+ operation code = verification code a & Q2+ operation code = verification code B, if the result is true, performing step SB5, and if the result is false, performing step SB6;
SB5, the return value is Y, the operation code is operated, and then the operation is ended;
SB6, return value N, operation code, then finish the operation.
4. A wireless data processing method of an anti-interference switch based on broadcast type propagation is characterized in that: the signature encryption method of claim 2 and the signature decryption method of claim 3, including the data structure of claim 1, the specific operations are as follows:
SC1, starting single control signal transmission operation;
SC2, randomly generating an operation code according to the control requirement, wherein the effective value of the operation code cannot be 0, and acquiring a signature of a receiving end;
SC3, using a signature encryption method to encrypt data, wherein parameters are signatures and operation codes, and return values are encrypted data;
SC4, pack the encrypted data, thus produce the packed data, then send in the form of broadcasting;
SC5, the receiving end receives the packed data, and the packed data is analyzed into encrypted data to obtain the signature of the current receiving end;
SC6, judging whether the signature corresponding to the encrypted data is the same as the signature of the current receiving end, if the result is true, performing the step SC7, if the result is false, the receiving end does not respond, and then ending the single control signal transmission operation;
SC7, using a signature decryption method to perform data decryption operation, wherein parameters are the signature of a receiving end, data are encrypted, and a return value is Y/N and an operation code;
SC8, judging the return value of the signature decryption method, if the result is true, the receiving end performs corresponding operation according to the operation code, and then finishes single control signal transmission operation, if the result is false, the step SC9 is performed;
SC9, using a signature encryption method to encrypt data, wherein the effective value of the operation code is 0, the parameters are a signature and the operation code, and the return value is encrypted data;
the CS10 and the receiving end pack the encrypted data to generate packed data, then the packed data is sent in a broadcast mode, after the sending end receives the packed data, the signature is analyzed and determined to determine an error signal, and then the step S2 is carried out.
5. The method of claim 4, wherein the wireless data processing method comprises: in step SC2, an operation code is randomly generated according to the control requirement, the effective value of the operation code cannot be 0, if the operation code is an on signal, the effective value of the operation code is an odd number, and if the operation code is an off signal, the effective value of the operation code is an even number.
6. The method of claim 4, wherein the wireless data processing method comprises: in step SC8, the switch is controlled to be turned on if the valid value of the operation code is odd, and to be turned off if the valid value of the operation code is even.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211407771.3A CN115915118B (en) | 2022-11-10 | 2022-11-10 | Wireless data processing method of anti-interference switch based on broadcast transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211407771.3A CN115915118B (en) | 2022-11-10 | 2022-11-10 | Wireless data processing method of anti-interference switch based on broadcast transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115915118A true CN115915118A (en) | 2023-04-04 |
CN115915118B CN115915118B (en) | 2024-01-23 |
Family
ID=86481770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211407771.3A Active CN115915118B (en) | 2022-11-10 | 2022-11-10 | Wireless data processing method of anti-interference switch based on broadcast transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115915118B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101848087A (en) * | 2009-03-25 | 2010-09-29 | 资通电脑股份有限公司 | Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system |
CN106972924A (en) * | 2017-03-23 | 2017-07-21 | 联想(北京)有限公司 | Encryption, decryption, Electronic Signature, the method and device for verifying stamped signature |
CN109472166A (en) * | 2018-11-01 | 2019-03-15 | 恒生电子股份有限公司 | A kind of electronic signature method, device, equipment and medium |
CN110458531A (en) * | 2019-08-16 | 2019-11-15 | 中国银行股份有限公司 | Signature method, device, computer equipment and computer readable storage medium |
CN113658031A (en) * | 2021-08-25 | 2021-11-16 | 河北冀联人力资源服务集团有限公司 | Electronic signature method, system and storage medium |
CN114697038A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Quantum attack resistant electronic signature method and system |
WO2022161012A1 (en) * | 2021-01-28 | 2022-08-04 | 京东科技控股股份有限公司 | Method and device for updating digital certificate of electronic signature, and storage medium |
-
2022
- 2022-11-10 CN CN202211407771.3A patent/CN115915118B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101848087A (en) * | 2009-03-25 | 2010-09-29 | 资通电脑股份有限公司 | Method for realizing electronic signature-stamp by secret key infrastructure (SKI typo) system |
CN106972924A (en) * | 2017-03-23 | 2017-07-21 | 联想(北京)有限公司 | Encryption, decryption, Electronic Signature, the method and device for verifying stamped signature |
CN109472166A (en) * | 2018-11-01 | 2019-03-15 | 恒生电子股份有限公司 | A kind of electronic signature method, device, equipment and medium |
CN110458531A (en) * | 2019-08-16 | 2019-11-15 | 中国银行股份有限公司 | Signature method, device, computer equipment and computer readable storage medium |
CN114697038A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Quantum attack resistant electronic signature method and system |
WO2022161012A1 (en) * | 2021-01-28 | 2022-08-04 | 京东科技控股股份有限公司 | Method and device for updating digital certificate of electronic signature, and storage medium |
CN113658031A (en) * | 2021-08-25 | 2021-11-16 | 河北冀联人力资源服务集团有限公司 | Electronic signature method, system and storage medium |
Non-Patent Citations (1)
Title |
---|
黄冠利;胡亦;: "基于PKI体系的数字签章安全系统设计", 计算机安全, no. 09 * |
Also Published As
Publication number | Publication date |
---|---|
CN115915118B (en) | 2024-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2008152288A (en) | EFFECTIVE METHODS AND DEVICES OF ADDRESSING WIRELESS COMMUNICATION LINES | |
CN113301568B (en) | Network distribution method and device and intelligent household equipment | |
CN110474711B (en) | Encoding method, apparatus and readable storage medium | |
US11477308B2 (en) | Adaptive payload extraction in wireless communications involving multi-access address packets | |
CN106650849A (en) | Data transmission method, device and system | |
CN103442250A (en) | System and method for debugging television | |
CN112817602A (en) | JSON format data sending and receiving method, device and medium | |
US20080301537A1 (en) | Packet transmission device and packet transmission method | |
CN115915118A (en) | Wireless data processing method of anti-interference switch based on broadcast type propagation | |
Zhang et al. | Towards sound and optimal leakage detection procedure | |
KR102397852B1 (en) | Authenticated confirmation and activation messages | |
CN110400569B (en) | Bluetooth audio repairing method and terminal equipment | |
CN112541102B (en) | Abnormal data filtering method, device, equipment and storage medium | |
JP2012068769A (en) | Wireless tag writing device, wireless tag reading device, wireless tag writing method, wireless tag reading method and wireless tag | |
CN109346080B (en) | Voice control method, device, equipment and storage medium | |
KR20220038623A (en) | Method and apparatus for detecting | |
JP6730138B2 (en) | Data decoding system and data decoding method | |
CN107276683B (en) | Decoding method, sending method and device of underwater sound signal | |
CN111866274A (en) | Data transmission method and device, mobile device, intelligent terminal and medium | |
CN209845136U (en) | Recorded broadcast camera system with android system | |
KR101459172B1 (en) | Apparatus and method for repeating Power Line Communication | |
MY135662A (en) | Data transformation for explicit transmission of control information | |
JP5757160B2 (en) | Control bus system | |
CN113965275B (en) | Wireless base function detection method based on Bluetooth communication | |
KR102617950B1 (en) | Method and apparatus for self generating malware traffic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |