CN116319119A - Accompanying type iterative communication verification method - Google Patents

Accompanying type iterative communication verification method Download PDF

Info

Publication number
CN116319119A
CN116319119A CN202310605856.0A CN202310605856A CN116319119A CN 116319119 A CN116319119 A CN 116319119A CN 202310605856 A CN202310605856 A CN 202310605856A CN 116319119 A CN116319119 A CN 116319119A
Authority
CN
China
Prior art keywords
verification
node
line
communication
accompanying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310605856.0A
Other languages
Chinese (zh)
Other versions
CN116319119B (en
Inventor
赵尚谦
庄广壬
汤智彬
邹晟
许超
邓超河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Guangyu Technology Development Co Ltd
Original Assignee
Guangdong Guangyu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Guangyu Technology Development Co Ltd filed Critical Guangdong Guangyu Technology Development Co Ltd
Priority to CN202310605856.0A priority Critical patent/CN116319119B/en
Publication of CN116319119A publication Critical patent/CN116319119A/en
Application granted granted Critical
Publication of CN116319119B publication Critical patent/CN116319119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention relates to the field of communication verification, in particular to a concomitant iterative communication verification method, which comprises the following steps: s1, acquiring a data communication transmission line; s2, establishing an accompanying verification line according to the data communication transmission line; s3, acquiring a data communication transmission line verification node according to the communication data to be verified by utilizing the data communication transmission line; s4, utilizing the data communication transmission line verification node and the accompanying verification line to complete accompanying iterative communication verification, establishing independent overlapped circulation steps by acquiring various data of data transmission communication in each period, combining the communication line and the verification step, ensuring that the high lamination of verification is consistent with a result, being applicable to multi-node communication or double-end transmission, dividing actual and virtual two lines, being mutually independent, and ensuring the accuracy of the verification result.

Description

Accompanying type iterative communication verification method
Technical Field
The invention relates to the field of communication verification, in particular to a concomitant iterative communication verification method.
Background
In the prior art, the verification of communication consistency is often performed based on a fixed method, such as C/S communication bidirectional authentication, I2C bus verification, etc., and due to the fixity of a test or a protocol, a normal communication verification result cannot be obtained for exhaustive decoding or analog transmission, and a communication line which cannot be ensured brings a certain risk to the security of a transmitting end and a receiving end or the transmission of important files, thereby causing other losses.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a concomitant iterative communication verification method, which ensures the real-time performance and accuracy of verification by setting the integral circulation of a communication line and simultaneously comprising the verification line and the internal detail circulation of the verification process.
In order to achieve the above object, the present invention provides a method for iterative communication verification of a companion type, comprising:
s1, acquiring a data communication transmission line;
s2, establishing an accompanying verification line according to the data communication transmission line;
s3, acquiring a data communication transmission line verification node according to the communication data to be verified by utilizing the data communication transmission line;
s4, utilizing the data communication transmission line verification node and the accompanying verification line to complete accompanying type iterative communication verification.
Preferably, the acquiring the data communication transmission line includes:
acquiring a communication transmitting end as an initial node;
acquiring a communication receiving end as a termination node;
acquiring a basic data communication transmission line by using the initial node and the termination node;
judging whether other nodes exist in the basic data communication transmission line, if so, establishing other node groups by using the other nodes according to the transmission direction of the basic data communication transmission line, otherwise, directly using the basic data communication transmission line as a data communication transmission line;
utilizing the basic data communication transmission line and other node groups as data communication transmission lines;
the other nodes are not initial nodes or terminal nodes, and the transmission direction of the basic data communication transmission line is that the initial nodes point to the terminal nodes.
Further, establishing a companion verification line from the data communication transmission line includes:
s2-1, judging whether the data communication transmission line has other node groups, if so, establishing a bidirectional verification line by using the other node groups of the data communication transmission line, otherwise, establishing a virtual synchronous line according to the data communication transmission line;
s2-2, utilizing the bidirectional verification line or the virtual synchronous line as an accompanying verification line;
wherein the virtual synchronous line and the data communication transmission line have the same direction.
Further, establishing a bidirectional authentication line using the other node group of the data communication transmission line includes;
s2-1-1, using other node groups of the data communication transmission line to carry out sequential connection to obtain a forward direction accompanying verification line;
s2-1-2, performing reverse mapping by using the forward direction accompanying verification line to obtain an initial reverse direction accompanying verification line;
s2-1-3, judging whether the initial reverse accompanying verification line corresponds to other node groups in a reverse way, if so, using the initial reverse accompanying verification line as a reverse accompanying verification line, otherwise, returning to S2-1-1;
s2-1-4, the forward direction accompanying verification line and the reverse direction accompanying verification line are used as bidirectional verification lines.
Preferably, the data communication transmission line obtaining a data communication transmission line verification node according to communication data to be verified by using the data communication transmission line includes:
acquiring the generation time of the communication data to be verified as a reference time;
judging whether other node groups exist on the data communication transmission line, if so, acquiring actual communication transmission nodes by using the communication data to be verified and the other node groups, otherwise, acquiring random verification time by using the data communication transmission line;
when an actual communication transmission node exists, the actual communication transmission node is used as a data communication transmission line verification node;
when the random verification moment exists, the virtual verification node corresponding to the random verification moment is obtained to serve as the verification node of the data communication transmission line.
Further, the obtaining the actual communication transmission node by using the communication data to be verified and other node groups includes:
judging whether the communication data to be verified flows through all nodes in other node groups or not, if so, utilizing all nodes in the other node groups as actual communication transmission nodes, otherwise, acquiring actual transmission path nodes of the communication data to be verified as actual communication transmission node groups of the communication data to be verified;
judging whether the actual communication transmission node group of the communication data to be verified is a subset of other node groups, if so, using the corresponding node of the actual communication transmission node group of the communication data to be verified as an actual communication transmission node, otherwise, acquiring nodes which do not belong to other node groups in the actual communication transmission node group of the communication data to be verified as different nodes;
and using the dissimilar node and the actual communication transmission node group of the communication data to be verified corresponding to the dissimilar node as actual communication transmission nodes.
Further, the acquiring the random verification time by using the data communication transmission line includes:
using all corresponding moments of the data communication transmission line as a sampling moment sequence;
using the reference time as a sampling basis;
and obtaining the random verification time of the data communication transmission line based on a reservoir algorithm by using the sampling time sequence and the sampling basis.
Further, the step of completing the companion type iterative communication verification by using the data communication transmission line verification node and the companion verification line includes:
s4-1, judging whether the accompanying verification line is a bidirectional verification line, if so, executing S4-2, otherwise, executing S4-3;
s4-2, judging whether the data communication transmission line verification node is an actual communication transmission node, if so, acquiring the corresponding state of the bidirectional verification line and the actual communication transmission node, otherwise, returning to S2-1;
s4-3, judging whether the data communication transmission line verification node is a virtual verification node, if so, acquiring the corresponding states of the virtual synchronous line and the virtual verification node, otherwise, returning to S2-1;
s4-4, when the corresponding states of the two-way verification line and the actual communication transmission node are corresponding, carrying out real-time concomitant iterative communication verification by using the two-way verification line and the actual communication transmission node to obtain a real-time concomitant iterative communication verification result;
s4-5, when the corresponding states of the virtual synchronous line and the virtual verification node are corresponding, performing virtual syndrome iterative communication verification by using the virtual synchronous line and the virtual verification node to obtain a virtual syndrome iterative communication verification result;
s4-6, completing random iteration communication verification by using the real-time random iteration communication verification result or the virtual random iteration communication verification result.
Further, the performing real-time companion type iterative communication verification with the actual communication transmission node by using the bidirectional verification line to obtain a real-time companion type iterative communication verification result includes:
s4-4-1, judging whether each node corresponding to the forward accompanying verification line and the reverse accompanying verification line in the bidirectional verification line corresponds to an actual communication transmission node, if so, executing S4-5-2, otherwise, returning to S4-2;
s4-4-2, establishing a forward direction accompanying verification mapping by utilizing each node of the forward direction accompanying verification line and the corresponding moment;
s4-4-3, obtaining a reverse time to be verified according to the forward accompanying verification mapping by utilizing each node of the reverse accompanying verification line;
s4-4-4, judging whether the reverse to-be-verified time is consistent with the corresponding time of each node of the forward accompanying verification line, if so, executing S4-4-5, otherwise, executing S4-4-6;
s4-4-5, judging whether the actual communication transmission node has different nodes, if so, acquiring corresponding states of the different nodes of the actual communication transmission node and the forward accompanying verification line and the reverse accompanying verification line respectively, otherwise, outputting a real-time accompanying iterative communication verification result to be consistent;
s4-4-6, establishing reverse accompanying verification mapping by utilizing each node of the reverse accompanying verification line and the corresponding moment;
s4-4-7, obtaining a forward time to be verified according to reverse accompanying verification mapping by utilizing each node of the forward accompanying verification line;
s4-4-8, judging whether the time to be verified in the forward direction is consistent with the corresponding time of each node of the forward direction accompanying verification line, if so, returning to S4-4-2, otherwise, giving up processing;
s4-4-9, judging whether different nodes of the actual communication transmission node repel each node in the forward accompanying verification line and the reverse accompanying verification line, if so, the real-time accompanying iterative communication verification result is consistent, otherwise, the real-time accompanying iterative communication verification result is inconsistent.
Further, the performing virtual companion type iterative communication verification with the virtual verification node by using the virtual synchronous line to obtain a virtual companion type iterative communication verification result includes:
s4-5-1, establishing a virtual companion verification node set by utilizing the virtual verification node;
s4-5-2, judging whether the number of subsets of the virtual accompanying verification node set is 1, if yes, executing S4-5-3, otherwise, executing S4-5-4;
s4-5-3, judging whether the corresponding time of the subset of the virtual accompanying verification node set is within the start-stop time of the virtual synchronous line, if so, the virtual accompanying iterative communication verification result is consistent, otherwise, returning to S2-1;
s4-5-4, judging whether the transmission direction of the virtual accompanying verification node set is the same as the transmission direction of the virtual synchronous line, if so, the virtual accompanying type iterative communication verification result is consistent, otherwise, the virtual accompanying type iterative communication verification result is inconsistent;
the start-stop time of the virtual synchronous line is the corresponding time of the initial node and the corresponding time of the termination node, and the transmission direction of the virtual accompanying verification node set is the transmission direction of each virtual accompanying verification node.
Compared with the closest prior art, the invention has the following beneficial effects:
by acquiring various data of data transmission communication in each period, an independent superposition circulation step is established, and meanwhile, a communication line and a verification step are combined, so that the consistency of the high fit and the result of verification is ensured, the method can be applied to multi-node communication or double-end transmission, the two actual and virtual lines are divided and mutually independent, and the accuracy of the verification result is ensured.
Drawings
Fig. 1 is a flowchart of a method for iterative communication verification of syndromes provided by the invention.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1: the invention provides a concomitant iterative communication verification method, as shown in figure 1, comprising the following steps:
s1, acquiring a data communication transmission line;
s2, establishing an accompanying verification line according to the data communication transmission line;
s3, acquiring a data communication transmission line verification node according to the communication data to be verified by utilizing the data communication transmission line;
s4, utilizing the data communication transmission line verification node and the accompanying verification line to complete accompanying type iterative communication verification.
S1 specifically comprises:
s1-1, acquiring a communication transmitting end as an initial node;
s1-2, acquiring a communication receiving end as a termination node;
s1-3, acquiring a basic data communication transmission line by using the initial node and the termination node;
s1-4, judging whether other nodes exist in the basic data communication transmission line, if so, establishing other node groups by using the other nodes according to the transmission direction of the basic data communication transmission line, otherwise, directly using the basic data communication transmission line as a data communication transmission line;
s1-5, utilizing the basic data communication transmission line and other node groups as data communication transmission lines;
the other nodes are not initial nodes or terminal nodes, and the transmission direction of the basic data communication transmission line is that the initial nodes point to the terminal nodes.
S2 specifically comprises:
s2-1, judging whether the data communication transmission line has other node groups, if so, establishing a bidirectional verification line by using the other node groups of the data communication transmission line, otherwise, establishing a virtual synchronous line according to the data communication transmission line;
s2-2, utilizing the bidirectional verification line or the virtual synchronous line as an accompanying verification line;
wherein the virtual synchronous line and the data communication transmission line have the same direction.
In this embodiment, in the method for verifying the concomitant iterative communication, all virtual lines, moments or nodes are set by using synchronous threads according to actual communication lines, so that concomitant instantaneity is ensured.
S2-1 specifically comprises;
s2-1-1, using other node groups of the data communication transmission line to carry out sequential connection to obtain a forward direction accompanying verification line;
s2-1-2, performing reverse mapping by using the forward direction accompanying verification line to obtain an initial reverse direction accompanying verification line;
s2-1-3, judging whether the initial reverse accompanying verification line corresponds to other node groups in a reverse way, if so, using the initial reverse accompanying verification line as a reverse accompanying verification line, otherwise, returning to S2-1-1;
s2-1-4, the forward direction accompanying verification line and the reverse direction accompanying verification line are used as bidirectional verification lines.
In this embodiment, in the syndrome iterative communication verification method, the reverse correspondence is defined as that an initial reverse syndrome verification line corresponds to each node in the other node groups after being arranged in reverse order.
S3 specifically comprises:
s3-1, acquiring the generation time of the communication data to be verified as a reference time;
s3-2, judging whether other node groups exist in the data communication transmission line, if so, acquiring an actual communication transmission node by using the communication data to be verified and the other node groups, otherwise, acquiring a random verification moment by using the data communication transmission line;
s3-3, when an actual communication transmission node exists, using the actual communication transmission node as a data communication transmission line verification node;
s3-4, when random verification time exists, the virtual verification node corresponding to the random verification time is obtained to serve as a data communication transmission line verification node.
S3-2 specifically comprises:
s3-2-1, judging whether the communication data to be verified flows through all nodes in other node groups, if so, using all nodes in the other node groups as actual communication transmission nodes, otherwise, acquiring an actual transmission path node of the communication data to be verified as an actual communication transmission node group of the communication data to be verified;
s3-2-2, judging whether the actual communication transmission node group of the communication data to be verified is a subset of other node groups, if so, using the corresponding node of the actual communication transmission node group of the communication data to be verified as an actual communication transmission node, otherwise, acquiring nodes which do not belong to other node groups in the actual communication transmission node group of the communication data to be verified as different nodes;
s3-2-3, using the dissimilar node and the actual communication transmission node group of the communication data to be verified corresponding to the dissimilar node as actual communication transmission nodes.
S3-2-4, using all corresponding moments of the data communication transmission line as a sampling moment sequence;
s3-2-5, using the reference moment as a sampling basis;
s3-2-6, obtaining random verification time of the data communication transmission line based on a reservoir algorithm by using the sampling time sequence and the sampling basis.
S4 specifically comprises the following steps:
s4-1, judging whether the accompanying verification line is a bidirectional verification line, if so, executing S4-2, otherwise, executing S4-3;
s4-2, judging whether the data communication transmission line verification node is an actual communication transmission node, if so, acquiring the corresponding state of the bidirectional verification line and the actual communication transmission node, otherwise, returning to S2-1;
s4-3, judging whether the data communication transmission line verification node is a virtual verification node, if so, acquiring the corresponding states of the virtual synchronous line and the virtual verification node, otherwise, returning to S2-1;
s4-4, when the corresponding states of the two-way verification line and the actual communication transmission node are corresponding, carrying out real-time concomitant iterative communication verification by using the two-way verification line and the actual communication transmission node to obtain a real-time concomitant iterative communication verification result;
s4-5, when the corresponding states of the virtual synchronous line and the virtual verification node are corresponding, performing virtual syndrome iterative communication verification by using the virtual synchronous line and the virtual verification node to obtain a virtual syndrome iterative communication verification result;
s4-6, completing random iteration communication verification by using the real-time random iteration communication verification result or the virtual random iteration communication verification result.
S4-4 specifically comprises:
s4-4-1, judging whether each node corresponding to the forward accompanying verification line and the reverse accompanying verification line in the bidirectional verification line corresponds to an actual communication transmission node, if so, executing S4-5-2, otherwise, returning to S4-2;
s4-4-2, establishing a forward direction accompanying verification mapping by utilizing each node of the forward direction accompanying verification line and the corresponding moment;
s4-4-3, obtaining a reverse time to be verified according to the forward accompanying verification mapping by utilizing each node of the reverse accompanying verification line;
s4-4-4, judging whether the reverse to-be-verified time is consistent with the corresponding time of each node of the forward accompanying verification line, if so, executing S4-4-5, otherwise, executing S4-4-6;
s4-4-5, judging whether the actual communication transmission node has different nodes, if so, acquiring corresponding states of the different nodes of the actual communication transmission node and the forward accompanying verification line and the reverse accompanying verification line respectively, otherwise, outputting a real-time accompanying iterative communication verification result to be consistent;
s4-4-6, establishing reverse accompanying verification mapping by utilizing each node of the reverse accompanying verification line and the corresponding moment;
s4-4-7, obtaining a forward time to be verified according to reverse accompanying verification mapping by utilizing each node of the forward accompanying verification line;
s4-4-8, judging whether the time to be verified in the forward direction is consistent with the corresponding time of each node of the forward direction accompanying verification line, if so, returning to S4-4-2, otherwise, giving up processing;
s4-4-9, judging whether different nodes of the actual communication transmission node repel each node in the forward accompanying verification line and the reverse accompanying verification line, if so, the real-time accompanying iterative communication verification result is consistent, otherwise, the real-time accompanying iterative communication verification result is inconsistent.
S4-5 specifically comprises:
s4-5-1, establishing a virtual companion verification node set by utilizing the virtual verification node;
s4-5-2, judging whether the number of subsets of the virtual accompanying verification node set is 1, if yes, executing S4-5-3, otherwise, executing S4-5-4;
s4-5-3, judging whether the corresponding time of the subset of the virtual accompanying verification node set is within the start-stop time of the virtual synchronous line, if so, the virtual accompanying iterative communication verification result is consistent, otherwise, returning to S2-1;
s4-5-4, judging whether the transmission direction of the virtual accompanying verification node set is the same as the transmission direction of the virtual synchronous line, if so, the virtual accompanying type iterative communication verification result is consistent, otherwise, the virtual accompanying type iterative communication verification result is inconsistent;
the start-stop time of the virtual synchronous line is the corresponding time of the initial node and the corresponding time of the termination node, and the transmission direction of the virtual accompanying verification node set is the transmission direction of each virtual accompanying verification node.
In this embodiment, a concomitant iterative communication verification method is different from a port or a third party verification mode of a line, and the scheme finds out and provides a solution to each step potentially having a problem through a self-combination loop with the line to be verified, so as to ensure uninterrupted real-time verification of the verification method on the same communication line.
In this embodiment, in the syndrome type iterative communication verification method, the syndrome of the communication line is realized by means of an actual or virtual synchronization process, and at the same time, the iteration function is realized by means of returning to a superior step when a problem exists in the verification process.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (10)

1. A companion iterative communication verification method, comprising:
s1, acquiring a data communication transmission line;
s2, establishing an accompanying verification line according to the data communication transmission line;
s3, acquiring a data communication transmission line verification node according to the communication data to be verified by utilizing the data communication transmission line;
s4, utilizing the data communication transmission line verification node and the accompanying verification line to complete accompanying type iterative communication verification.
2. The companion iterative communication verification method of claim 1, wherein said acquiring the data communication transmission line comprises:
acquiring a communication transmitting end as an initial node;
acquiring a communication receiving end as a termination node;
acquiring a basic data communication transmission line by using the initial node and the termination node;
judging whether other nodes exist in the basic data communication transmission line, if so, establishing other node groups by using the other nodes according to the transmission direction of the basic data communication transmission line, otherwise, directly using the basic data communication transmission line as a data communication transmission line;
utilizing the basic data communication transmission line and other node groups as data communication transmission lines;
the other nodes are not initial nodes or terminal nodes, and the transmission direction of the basic data communication transmission line is that the initial nodes point to the terminal nodes.
3. The accompanying iterative communication verification method of claim 2, wherein establishing an accompanying verification line from the data communication transmission line comprises:
s2-1, judging whether the data communication transmission line has other node groups, if so, establishing a bidirectional verification line by using the other node groups of the data communication transmission line, otherwise, establishing a virtual synchronous line according to the data communication transmission line;
s2-2, utilizing the bidirectional verification line or the virtual synchronous line as an accompanying verification line;
wherein the virtual synchronous line and the data communication transmission line have the same direction.
4. A method of iterative communication verification as claimed in claim 3, wherein establishing a bi-directional verification line using the other node groups of the data communication transmission line comprises;
s2-1-1, using other node groups of the data communication transmission line to carry out sequential connection to obtain a forward direction accompanying verification line;
s2-1-2, performing reverse mapping by using the forward direction accompanying verification line to obtain an initial reverse direction accompanying verification line;
s2-1-3, judging whether the initial reverse accompanying verification line corresponds to other node groups in a reverse way, if so, using the initial reverse accompanying verification line as a reverse accompanying verification line, otherwise, returning to S2-1-1;
s2-1-4, the forward direction accompanying verification line and the reverse direction accompanying verification line are used as bidirectional verification lines.
5. The accompanying iterative communication verification method of claim 1, wherein obtaining a data communication transmission line verification node from communication data to be verified using the data communication transmission line comprises:
acquiring the generation time of the communication data to be verified as a reference time;
judging whether other node groups exist on the data communication transmission line, if so, acquiring actual communication transmission nodes by using the communication data to be verified and the other node groups, otherwise, acquiring random verification time by using the data communication transmission line;
when an actual communication transmission node exists, the actual communication transmission node is used as a data communication transmission line verification node;
when the random verification moment exists, the virtual verification node corresponding to the random verification moment is obtained to serve as the verification node of the data communication transmission line.
6. The method of claim 5, wherein obtaining actual communication transmission nodes using the communication data to be verified and other node groups comprises:
judging whether the communication data to be verified flows through all nodes in other node groups or not, if so, utilizing all nodes in the other node groups as actual communication transmission nodes, otherwise, acquiring actual transmission path nodes of the communication data to be verified as actual communication transmission node groups of the communication data to be verified;
judging whether the actual communication transmission node group of the communication data to be verified is a subset of other node groups, if so, using the corresponding node of the actual communication transmission node group of the communication data to be verified as an actual communication transmission node, otherwise, acquiring nodes which do not belong to other node groups in the actual communication transmission node group of the communication data to be verified as different nodes;
and using the dissimilar node and the actual communication transmission node group of the communication data to be verified corresponding to the dissimilar node as actual communication transmission nodes.
7. The method for iterative communication verification of claim 5, wherein said obtaining random verification time using the data communication transmission line comprises:
using all corresponding moments of the data communication transmission line as a sampling moment sequence;
using the reference time as a sampling basis;
and obtaining the random verification time of the data communication transmission line based on a reservoir algorithm by using the sampling time sequence and the sampling basis.
8. The method of iterative communication verification of claim 5, wherein performing iterative communication verification of a companion equation using the data communication transmission line verification node and a companion verification line comprises:
s4-1, judging whether the accompanying verification line is a bidirectional verification line, if so, executing S4-2, otherwise, executing S4-3;
s4-2, judging whether the data communication transmission line verification node is an actual communication transmission node, if so, acquiring the corresponding state of the bidirectional verification line and the actual communication transmission node, otherwise, returning to S2-1;
s4-3, judging whether the data communication transmission line verification node is a virtual verification node, if so, acquiring the corresponding states of the virtual synchronous line and the virtual verification node, otherwise, returning to S2-1;
s4-4, when the corresponding states of the two-way verification line and the actual communication transmission node are corresponding, carrying out real-time concomitant iterative communication verification by using the two-way verification line and the actual communication transmission node to obtain a real-time concomitant iterative communication verification result;
s4-5, when the corresponding states of the virtual synchronous line and the virtual verification node are corresponding, performing virtual syndrome iterative communication verification by using the virtual synchronous line and the virtual verification node to obtain a virtual syndrome iterative communication verification result;
s4-6, completing random iteration communication verification by using the real-time random iteration communication verification result or the virtual random iteration communication verification result.
9. The method for iterative communication validation of syndrome of claim 8, wherein said performing iterative communication validation of syndrome in real time with the actual communication transmission node using the bi-directional validation line to obtain the iterative communication validation result of syndrome in real time comprises:
s4-4-1, judging whether each node corresponding to the forward accompanying verification line and the reverse accompanying verification line in the bidirectional verification line corresponds to an actual communication transmission node, if so, executing S4-5-2, otherwise, returning to S4-2;
s4-4-2, establishing a forward direction accompanying verification mapping by utilizing each node of the forward direction accompanying verification line and the corresponding moment;
s4-4-3, obtaining a reverse time to be verified according to the forward accompanying verification mapping by utilizing each node of the reverse accompanying verification line;
s4-4-4, judging whether the reverse to-be-verified time is consistent with the corresponding time of each node of the forward accompanying verification line, if so, executing S4-4-5, otherwise, executing S4-4-6;
s4-4-5, judging whether the actual communication transmission node has different nodes, if so, acquiring corresponding states of the different nodes of the actual communication transmission node and the forward accompanying verification line and the reverse accompanying verification line respectively, otherwise, outputting a real-time accompanying iterative communication verification result to be consistent;
s4-4-6, establishing reverse accompanying verification mapping by utilizing each node of the reverse accompanying verification line and the corresponding moment;
s4-4-7, obtaining a forward time to be verified according to reverse accompanying verification mapping by utilizing each node of the forward accompanying verification line;
s4-4-8, judging whether the time to be verified in the forward direction is consistent with the corresponding time of each node of the forward direction accompanying verification line, if so, returning to S4-4-2, otherwise, giving up processing;
s4-4-9, judging whether different nodes of the actual communication transmission node repel each node in the forward accompanying verification line and the reverse accompanying verification line, if so, the real-time accompanying iterative communication verification result is consistent, otherwise, the real-time accompanying iterative communication verification result is inconsistent.
10. The method for iterative communication verification of syndrome of claim 8, wherein said performing the iterative communication verification of the syndrome of syndrome with the virtual verification node using the virtual synchronization line to obtain the iterative communication verification result of the syndrome of syndrome comprises:
s4-5-1, establishing a virtual companion verification node set by utilizing the virtual verification node;
s4-5-2, judging whether the number of the subsets of the virtual accompanying verification node set is 1, if yes, executing S4-5-3, otherwise, executing S4-5-4;
s4-5-3, judging whether the corresponding time of the subset of the virtual accompanying verification node set is within the start-stop time of the virtual synchronous line, if so, the virtual accompanying iterative communication verification result is consistent, otherwise, returning to S2-1;
s4-5-4, judging whether the transmission direction of the virtual accompanying verification node set is the same as the transmission direction of the virtual synchronous line, if so, the virtual accompanying type iterative communication verification result is consistent, otherwise, the virtual accompanying type iterative communication verification result is inconsistent;
the start-stop time of the virtual synchronous line is the corresponding time of the initial node and the corresponding time of the termination node, and the transmission direction of the virtual accompanying verification node set is the transmission direction of each virtual accompanying verification node.
CN202310605856.0A 2023-05-26 2023-05-26 Accompanying type iterative communication verification method Active CN116319119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310605856.0A CN116319119B (en) 2023-05-26 2023-05-26 Accompanying type iterative communication verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310605856.0A CN116319119B (en) 2023-05-26 2023-05-26 Accompanying type iterative communication verification method

Publications (2)

Publication Number Publication Date
CN116319119A true CN116319119A (en) 2023-06-23
CN116319119B CN116319119B (en) 2023-09-26

Family

ID=86787346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310605856.0A Active CN116319119B (en) 2023-05-26 2023-05-26 Accompanying type iterative communication verification method

Country Status (1)

Country Link
CN (1) CN116319119B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723056A (en) * 2023-08-09 2023-09-08 广东广宇科技发展有限公司 Multichannel communication verification method based on http protocol
CN117478707A (en) * 2023-12-27 2024-01-30 天津数智物联科技有限公司 Multi-target energy management data transmission method

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040064725A1 (en) * 2002-09-18 2004-04-01 Microsoft Corporation Method and system for detecting a communication problem in a computer network
US20070271452A1 (en) * 2006-05-19 2007-11-22 Honeywell International Inc. Method and computer product to increase accuracy of time-based software verification for sensor networks
WO2011080228A1 (en) * 2009-12-30 2011-07-07 Thales Method for determining or optimizing the availability of a communication network
US8160055B1 (en) * 2006-02-24 2012-04-17 Cisco Technology, Inc. System and methods for identifying network path performance
CN103039038A (en) * 2010-06-21 2013-04-10 德国电信股份公司 Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment
US20180006829A1 (en) * 2010-04-30 2018-01-04 T-Central, Inc. Secure communication of iot devices for vehicles
CN108600231A (en) * 2018-04-27 2018-09-28 广东复安科技发展有限公司 A kind of network security transmission method based on simultaneous techniques
CN109698856A (en) * 2017-10-21 2019-04-30 苹果公司 The device-to-device communication channel of safety
US20190159026A1 (en) * 2017-11-20 2019-05-23 Valeo North America, Inc. Hybrid authentication of vehicle devices and/or mobile user devices
US20190227851A1 (en) * 2016-08-18 2019-07-25 Suzhou Superblock Chain Information Science & Technology Co., Ltd. A method for accumulating and co-assembling consistent data
US20190289004A1 (en) * 2018-03-13 2019-09-19 Bank Of America Corporation Internet of things ("iot") chain link
CN112636465A (en) * 2020-11-30 2021-04-09 国网山东省电力公司滨州供电公司 Intelligent processing method, system, terminal and storage medium for transmission line fault
WO2021092809A1 (en) * 2019-11-13 2021-05-20 深圳市欢太科技有限公司 Function calling method and device, electronic device, and computer-readable medium
WO2021213452A1 (en) * 2020-04-24 2021-10-28 清华大学 Reconfigurable dynamic path verification method based on authentication fragments
US20220197881A1 (en) * 2020-12-23 2022-06-23 Sri International Multipath verification of data transforms in a system of systems
CN115185744A (en) * 2022-07-14 2022-10-14 国信证券股份有限公司 Validity verification method and device of backup data and computer equipment
CN115733696A (en) * 2022-11-17 2023-03-03 国家电网有限公司 Terminal safe access method for edge computing node of power satellite internet of things
CN115941363A (en) * 2023-03-08 2023-04-07 广东广宇科技发展有限公司 Network communication security analysis method based on http protocol

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040064725A1 (en) * 2002-09-18 2004-04-01 Microsoft Corporation Method and system for detecting a communication problem in a computer network
US8160055B1 (en) * 2006-02-24 2012-04-17 Cisco Technology, Inc. System and methods for identifying network path performance
US20070271452A1 (en) * 2006-05-19 2007-11-22 Honeywell International Inc. Method and computer product to increase accuracy of time-based software verification for sensor networks
WO2011080228A1 (en) * 2009-12-30 2011-07-07 Thales Method for determining or optimizing the availability of a communication network
US20180006829A1 (en) * 2010-04-30 2018-01-04 T-Central, Inc. Secure communication of iot devices for vehicles
CN103039038A (en) * 2010-06-21 2013-04-10 德国电信股份公司 Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment
US20190227851A1 (en) * 2016-08-18 2019-07-25 Suzhou Superblock Chain Information Science & Technology Co., Ltd. A method for accumulating and co-assembling consistent data
CN114630302A (en) * 2017-10-21 2022-06-14 苹果公司 Secure device-to-device communication channel
CN109698856A (en) * 2017-10-21 2019-04-30 苹果公司 The device-to-device communication channel of safety
US20190159026A1 (en) * 2017-11-20 2019-05-23 Valeo North America, Inc. Hybrid authentication of vehicle devices and/or mobile user devices
US20190289004A1 (en) * 2018-03-13 2019-09-19 Bank Of America Corporation Internet of things ("iot") chain link
CN108600231A (en) * 2018-04-27 2018-09-28 广东复安科技发展有限公司 A kind of network security transmission method based on simultaneous techniques
WO2021092809A1 (en) * 2019-11-13 2021-05-20 深圳市欢太科技有限公司 Function calling method and device, electronic device, and computer-readable medium
WO2021213452A1 (en) * 2020-04-24 2021-10-28 清华大学 Reconfigurable dynamic path verification method based on authentication fragments
CN112636465A (en) * 2020-11-30 2021-04-09 国网山东省电力公司滨州供电公司 Intelligent processing method, system, terminal and storage medium for transmission line fault
US20220197881A1 (en) * 2020-12-23 2022-06-23 Sri International Multipath verification of data transforms in a system of systems
CN115185744A (en) * 2022-07-14 2022-10-14 国信证券股份有限公司 Validity verification method and device of backup data and computer equipment
CN115733696A (en) * 2022-11-17 2023-03-03 国家电网有限公司 Terminal safe access method for edge computing node of power satellite internet of things
CN115941363A (en) * 2023-03-08 2023-04-07 广东广宇科技发展有限公司 Network communication security analysis method based on http protocol

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723056A (en) * 2023-08-09 2023-09-08 广东广宇科技发展有限公司 Multichannel communication verification method based on http protocol
CN116723056B (en) * 2023-08-09 2023-10-27 广东广宇科技发展有限公司 Multichannel communication verification method based on http protocol
CN117478707A (en) * 2023-12-27 2024-01-30 天津数智物联科技有限公司 Multi-target energy management data transmission method

Also Published As

Publication number Publication date
CN116319119B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
CN116319119B (en) Accompanying type iterative communication verification method
CN109189853B (en) Method and device for synchronizing data between block chains
CN110399424B (en) Block generation method, block generation device, block chain node and storage medium
CN109361740A (en) A kind of block generation method, device, equipment and the medium of block chain
CN109889505A (en) The data property held verification method and terminal device
CN108765159B (en) Block chain-based uplink and state processing method and device and interconnection system
CN109508295B (en) Block chain consensus algorithm testing method and device, calculating device and storage medium
CN116155507A (en) Message hash chain construction method
CN112348518B (en) Block chain transaction certification method and device
CN111640018B (en) Block chain transaction existence verification method and device
CN112785408A (en) Account checking method and device based on Hash
CN116614430A (en) Multi-channel communication synchronous test method
CN117278339B (en) Data independent transmission verification method based on bidirectional synchronous key pool
CN109858285B (en) Block chain data processing method, device, equipment and medium
CN105302486A (en) Virtual offline desktop block device storage synchronization method
CN111061813B (en) Method, apparatus and computing device for data synchronization in blockchain network
CN116723056B (en) Multichannel communication verification method based on http protocol
CN111967060A (en) Data file integrity verification method and device
CN112069259A (en) Multi-cloud environment data storage system and method based on block chain
CN111522648A (en) Transaction processing method and device for block chain and electronic equipment
CN105007286A (en) Decoding method, decoding device, and cloud storage method and system
CN111241069A (en) Data flattening method and system based on block chain
CN115174090A (en) Block chain consensus method and device
CN107273164A (en) A kind of method for realizing Auto-matching scene optimization strategy when linux system performance optimizes
Zielinski Optimistically terminating consensus: All asynchronous consensus protocols in one framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant