WO1999014890A1 - An identification method for mode series of the open information network - Google Patents

An identification method for mode series of the open information network Download PDF

Info

Publication number
WO1999014890A1
WO1999014890A1 PCT/CN1998/000189 CN9800189W WO9914890A1 WO 1999014890 A1 WO1999014890 A1 WO 1999014890A1 CN 9800189 W CN9800189 W CN 9800189W WO 9914890 A1 WO9914890 A1 WO 9914890A1
Authority
WO
WIPO (PCT)
Prior art keywords
layer
status
group
called
data
Prior art date
Application number
PCT/CN1998/000189
Other languages
French (fr)
Chinese (zh)
Inventor
Weiguo Chen
Original Assignee
Weiguo Chen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weiguo Chen filed Critical Weiguo Chen
Priority to AU91509/98A priority Critical patent/AU9150998A/en
Publication of WO1999014890A1 publication Critical patent/WO1999014890A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to the construction method of the technical structure of the software and hardware of the identification system in the information network, that is, the method of using the identification device to identify the other party during the operation of the information network, referred to as the identification method, especially related to the identification of the object that the open information network applies to the center for services.
  • the authenticity of the central identity the first to mark the authenticity of the object identity, the model of the authenticity of each terminal under various attacks, and the perfect method for the security of the existing identity system.
  • Users and their sub-devices are collectively referred to as objects.
  • Center staff and equipment are collectively referred to as the Center. Background technique
  • the existing simple identification method is as follows: The identification equipment of the identified party is given a code and a password. When it is necessary to identify the authenticity of the identification equipment of the identified party claiming to be a certain code during operation, it depends on the correctness of its password.
  • Common applications include bank terminals (ATMs, POS machines) identifying inserted magnetic stripe credit cards, phone card system hosts identifying phone card users, and Windows NT server security systems identifying visiting workstations.
  • the identification device of the identified party is awarded a code and an algorithm
  • the identifying party sends out a random number X, and both parties use the agreed algorithm f to combine the random number X with the key X. operation, and the identifying party collects and compares the operating result y that the code should have obtained by both parties, depending on whether the identified party y is correct or not.
  • Identify the inserted smart credit card (IC card) the host of the GSM mobile phone system identifies a mobile phone user, and the host in the bank's computer network identifies the remote visiting attached machine.
  • the starting point of the existing network identification security theory is to find a more rigorous algorithm. This lack of understanding has led to the established identification system, which can be counterfeited as long as the element information of the algorithmic network operation rules is mastered. At the same time, the network resource occupied by the identification method becomes larger and larger.
  • the attacks that should be prevented and resisted in the open information network can come from users, usage environment, transmission process, especially the internal personnel of the center.
  • the technical activities carried out to achieve counterfeiting are called intrusive attacks, or attacks for short. If the attack is successful, it is called intrusion. Since the types and intensities of different networks being attacked are usually constrained by the ratio of profit to cost, and the harm of intrusion is different, the ability to prevent and resist attacks in the network depends on the requirements of network construction.
  • the sign relations are definite for the inside of the protection interface, and for From the outside of the protection interface, the logo relationship is random, and the network resources can be saved to the maximum, then the logo security can be realized, which is called the starting point of the logo security theory of Mo-Cheng, referred to as Mo-Cai Conception.
  • One of the purposes of the present invention is to provide a technical method for realizing the modeling concept in a completely open network, that is, to establish an identification method that can effectively defend against various attacks of various degrees, and to realize real correlation, which is called a modeling method.
  • the second purpose of the present invention is to provide models with different safety levels and different construction difficulties to form a serialization method.
  • the third purpose of the present invention is that each modular method can be used in the existing networks of various signaling standards, using the structure of the existing identification system after removing the unsafe related structure as a platform, and establishing a modular method as the core structure.
  • the new identification system forms a standardized and generalized feature.
  • the fourth purpose of the present invention is that after a vicious attack that violates the profit-to-consumption ratio rule during the operation of the low-security-level sign, and an intrusion is caused, an intrusion alarm can be issued during the real related operation.
  • the fifth purpose of the present invention is to reduce the resources occupied by the modeling method and improve the credit-to-cost ratio.
  • the sixth purpose of the present invention is that the modeling method has the characteristics of automatic application, especially digital application, which reduces the burden of user identification and improves convenience.
  • the premise of realizing the above-mentioned purpose is to provide a technical structure construction method of the modular series, and to provide a perfect method for the real related safety degree of the existing identification system. Based on the model for real correlation, it provides a method for object identification.
  • the present invention provides a method for identifying the center of the object that the open information network applies for service from the center.
  • the objects that each have a generalized unique definition and the center have a generalized unique correlation with each other, and the identification constraints are implemented.
  • the method further includes the following steps: the dense layer model uniquely establishes the given; in the process of reading out the target identification operation of the final central knowledge, the dense layer implements the direct source target operation.
  • the dense layer model can be replaced by the filter layer model, and the readout target recognition operation process of the final recognition Among them, the filter layer controls the code layer to implement the indirect source-target operation.
  • the dense layer model can also be replaced by the weight layer model, and during the rest period, the authorization layer controls the source change of the secret layer.
  • the dense layer model can also be replaced by the hierarchical model, and in the rest period, the structure of the authority layer controls the authority layer changes.
  • the dense layer model can also be replaced by the hidden layer model, which embeds the icon and provides the virtual label to the required layer.
  • the dense model can also be replaced by the repair model.
  • the present invention also provides an object identification method for objects that apply for services from the center through an open information network.
  • the objects that each have a generalized unique definition are related to each other in a generalized and unique manner with the center, and the method also includes the following steps:
  • the model is used for the only operable correlation between the object and the center in a narrow sense to form a real correlation; there is a final knowledge in the object sub-label device; the final object recognition under the constraints of the recognition is implemented to realize the real using the model series method Identify the center.
  • Events generated by objects or objects, and events derived from events or events are collectively referred to as events.
  • the broad and narrow meanings of things and signs are unique, respectively collectively referred to as unique things and signs, collectively referred to as unique.
  • correlation There is a certain relationship between two or more things, which is called correlation. Based on the uniqueness, one thing has an agreed mark, and another thing has an agreed relationship with the one thing, so it has the agreed mark, which is called the unique correlation of the mark; based on the unique correlation of the mark, one thing has a corresponding event, and the other thing Therefore, there is the corresponding event, and the corresponding event will cause the change of the agreed sign, which is called the corresponding unique correlation.
  • the sign, the corresponding broad and narrow sense unique correlation are collectively called the symbol and the corresponding unique correlation, collectively called the unique correlation.
  • the mutual unique correlation is called true correlation. Based on the real correlation, they can identify each other as real, which is called mutual identification of real. running between one thing and other things.
  • the conclusion of identifying the only sign in the broad and narrow sense is the true identification of one thing on other things; the conclusion of identifying the only sign in the narrow sense (equivalent to identifying the real relationship) by the real related things in other things is The re-authentic identification of the real related things among other things; the authentic identification and the re-authentic identification are called mutual authentic identification.
  • the route formed by the extension of the relationship of possession or establishment, agreement, distribution, and existence between objects and events is called a road. A segment of the road is called Cheng.
  • the group of symbols and codes with the agreed characteristic information of the object is called a symbol, a number, a code, a symbol, a set, and a group, and is divided into: (secret) secret, public (open).
  • the secrets are divided into: the ones generated during the establishment period are called original secrets; the ones produced during the running period are called running secrets; the groups of symbols and codes with the agreed characteristic information of objects produced outside the running period are passed through the internal After hiding, the openness caused by its transparency is eliminated, which is called virtual encryption. Operation and virtual secrets are collectively called environmental secrets.
  • object index numbers which are used for object numbers, account numbers, data codes, etc.
  • center service numbers which are used for center numbers, name codes, etc.
  • the exterior can only guess the many possibilities of the interior, and the inner operation that cannot be elusive by the exterior can produce a narrowly uniquely related and changeable exterior end, which is called fuzziness, which is the inner opacity realized by the shielding of a specific process.
  • the masked process is called the modular process, which uniquely establishes a given, and is used for the objects and centers with their respective broad-sense unique definitions to be the only operable correlation in the narrow sense with each other, forming a real correlation.
  • the identification provided by the central retrieval object, which identifies the generalized unique relationship, is called identification.
  • the final index generated by the two related modules of the object and the center is called the end, which is used for the center to identify whether the object provided with the end has a narrow unique relationship, that is, whether the generalized unique relationship used for the center to identify the object that provides the index number is true, called ultimate awareness.
  • the implementation of inspection and final identification is used to ensure the safety of the identification method and form the authenticity of the identification of the identification: to confirm whether the identification provided by the object is correct, you can realize whether the audit object has unique correlation, and the conclusion is the authenticity of the object by the center identified.
  • Marked object identification The object applies for a service to the center of the agreed service number, 'obtains a response, and identifies a generalized unique relationship, which is called application identification.
  • application identification The object identifies whether the center that provides the terminal has a narrow unique relationship, and whether the generalized unique relationship used to identify the center that provides the service number is true is called terminal object identification.
  • Implement application and final object identification which is used to ensure the security of the applied service method, and form the authenticity of the marked object identification: confirm whether the terminal provided by the center is correct, and then realize whether the audit center has unique correlation. The conclusion is that the object is related to the center true identification.
  • Tag object identification implements anti-trap, such as intrusion using central emulation of branch exchange. Since the final object recognition is based on the real-related execution of the read-out target recognition task, the specific method is the interface mirroring of the execution of the read-out target recognition task based on the real-related final central knowledge. substituted, so implicit in other discourses go.
  • the existing cryptographic methods and modules related to the final central identification are: single cryptographic method (the aforementioned simple identification method), clear and residual modulus (the aforementioned further identification method based on algorithms and keys, developed by S.Weinstein published by Dr.
  • Shielding a single fixed element structure stores a single fixed original code and executes the public structure of the algorithm, forming an unsafe real relationship within a single fixed internal state.
  • the internal status and external correlation of the basis for reading the target are: a single register structure registers a unique random number that is dynamically inserted from the outside during the same use period, and the construction of the execution algorithm reads the encrypted token during the same use period, and operates with the random number to generate a single
  • the variable constructs the stored single-run key and provides the status of the single-mode run key.
  • the inner target formed by a single run key in the read variable is a single identification, providing final knowledge.
  • the internal original secret code and the dynamic embedded external information code of the model can produce the recognizable external end of the generalized unique correlation and change through the operation of the algorithm construction, and the incomplete original dense group and internal state group that cannot be grasped externally.
  • Externally transparent random numbers and a single internal condition determine a single benchmark condition for the operation of the model, referred to as the transparent model.
  • the identification of a single encrypted label method can be intercepted, recorded, and stolen, and can be directly decrypted.
  • the random number and identification mark of the clear model are intercepted and recorded during the transmission process, and the corresponding inverse operation is performed according to the same algorithm disclosed in the protocol, which can generate the original encrypted mark, remove the opaque shield, and intrude into the model; or through the information flow
  • An intrusion module that imitates or steals the original code. All of these can lead to the misappropriation of a certain and its single, original secret mark to establish the banditry relationship of the object, destroying the only authenticity of the mark under the guarantee of insecurity, and leading to the untrue identity of the mark center. true identification.
  • the present invention provides a series of methods for modeling the real correlation:
  • Hidden layer model It provides a perfect method for the real-related security degree of the existing identification system, in which all repairs and upgrades are based on the application of the model system method from the perspective of perfection.
  • the internal and external interfaces of the model are physically shielded, and the information in the process is based on the situation.
  • the internal environment After the data is run, the only relevant changes and identifiable internal targets are generated, which is called the internal environment.
  • the data filtering channel rejects non-target access, and the target is a kind of internal and external interface data specification.
  • the internal environment of the model of the present invention is composed of the original dense group, the internal state group and the group deduction. (Refer to the discussion in Figure 2 in the embodiment section to understand the meaning of the internal environment more thoroughly.)
  • the code group that generates the original code is called code group generation; the original code compression or deletion of non-characteristic information in each code group is called code group processing; dense. Arranging the order of the elements in each set is called sorting. The sets are sorted to produce clusters. The set and group of dense labels are referred to as dense and group respectively.
  • Functional units that carry, transmit, control, and process information are collectively referred to as structures, and are divided into internal and external structures.
  • the external structure is on the platform of the open information network, and the system realizes the support of the present invention by the existing identification (central) identification system technology.
  • each layer is buildable for the internal structure, that is, the corresponding functional unit parts of the internal structure are divided into corresponding layers.
  • Each layer can dynamically insert external information codes and be accessible to each other.
  • the internal structure part of the module that carries, directly wraps dense groups, and works in real time during use is called the dense layer, or the real-time layer.
  • the internal structural parts of the non-confidential label layer in the model are divided into: the use period also participates in the work in real time, also known as the real-time layer; the rest period participates, the work is carried out after being off-network, and it does not occupy information network transmission resources , does not increase the burden on users during the service period, and is called the background layer.
  • the background layer or according to the nature of the work, it can be divided into: closely related to the code layer, called the related layer; only the background provides data exchange inside and outside the model, called the hidden layer.
  • the context-related layer that performs filtering and internal target tasks is called the internal target layer; the background-related layer that performs the status update task of the governed layer is called the weight layer.
  • the right layer is divided into: authorization, level right layer.
  • the layer contains the data group and can generate the source of each setting relationship data unit after reading and running, which is called the source.
  • the part of the system hardware structure that makes up the source is called the source structure; the source structure that does not accommodate the data group is called the empty source.
  • the operating structure in the layer In the system structure formed by the functional units in the layer according to the form of hardware and software, the part in which the source structure and the operation of the related original secret data group can produce unique transition data is called the operating structure in the layer.
  • the source and the structure running in the layer are collectively called the structure in the layer.
  • the storage unit of the data unit in the source is called a unit; the setting order distinguishes each unique code of each unit in the unit set, called a title.
  • the stored data units are divided into: mark, instruction; the default sources are respectively called (some) source, instruction table .
  • the situation In the characteristic process of a stable event in the internal structure, the definite events that are condensed by removing the time factor are collectively referred to as the situation, and can be divided into: those formed by the existence of information are called information conditions; those formed by the sorting of symbols are called sorting Status; The information related to operation formed by structural hardware is called the hardware status;
  • the internal source structure of each layer stores its own data group, which is called the stored data status;
  • the internal source structure of each layer stores its own instruction table, which is called the structural status;
  • Each layer The internal static data driven by each structure is called the real-time processing status; the above-mentioned statuses are accessed, formed according to the basis and characteristic description, called the running status.
  • Each situation in each layer is distinguished according to its correlation with the identifiable internal target: the cognizable state is
  • each original encrypted data unit during the operation period is called attributes, which are reflected in the attribute status of the relevant codes or encrypted symbols and symbol codes.
  • the internal structure of the layer removes the specified status and forms the other directly based on the determined status, which is called the reference status, which is divided into: number group hardware status, dense group status.
  • the state of storing the original dense group in the source is called the full source, which is the first base state formed.
  • the finite source of the operating structure and dynamic insertion of external information coding generates the finite element of the specified number and related code attribute status when reading the source, forming the unique correlation of the reading element.
  • the implementation leads to the unique correlation of the inner target formed by reading the secret mark taken.
  • Designated number status is the necessary status of sources in each module, and the group consistency of each designated number status accompanied by designated related code attribute status, and designated number status with the change of designated related code attribute status is the default necessary rule in each module.
  • the baseline, the specified state, collectively called the source state, and the only relation of their respective transitions, are the recognizable states of the model.
  • the command state is a real-time processing state formed by the running structure, and the only correlation of its change is the unrecognizable state of the model.
  • the instruction state is formed by the imitation of the cryptogram layer reading in the relevant layer according to the source state.
  • the status of instructions in the inner target layer is called the background filtering status.
  • the status of the operating secret data unit attribute is determined by the background operation in the layer, and the direct effect in the inner target is determined by the status of the operating secret data unit attribute.
  • the encrypted token string causes the filtered transition to run encrypted target data stored in the data filtering channel.
  • the stored original dense group fixed source is called solid source; the stored dense group’s changing source is called variable source; the stored original dense group is used for emergency fixed and variable sources and is called backup source; Modules can also have backup sources.
  • the instruction status in the authorization layer is called the background direct status.
  • the environment dense group data is determined through inter-layer operation, and the input source is stored to generate the environmental dense group status.
  • the direct role in the recognizable status is reflected by the environmental dense group status.
  • the instruction status in the hierarchical level is called the background indirect status.
  • the instruction based on the source change of the encrypted label layer is determined by the inter-layer operation to change into the environmental encryption instruction data, which is stored in the instruction table to generate the environmental encryption structure status. Its status in the recognizable status
  • the indirect effect is reflected by the state of environmental dense structure resulting in the state of environmental dense group. Its direct effect is reflected by the dense structure of the environment.
  • the characteristic information of the unique trajectory related to the operation of the object network is called image.
  • information encoding group The finished mark is called the image mark.
  • the virtual secret information code needed to implement internal state changes has a standard format, which is called a virtual (secret) standard, which is taken from a group of pixels of different usage periods.
  • the buried layer manages the dynamically registered icons, stores and replaces the icons into the pixel by specifying the status of the number, and latently becomes the icons transmitted in different times of use, forming the status of the image group, which is the image group formed by each icon in each Simulation of the dense group state of the dense mark layer in the resting period.
  • the limited source of the operation structure and dynamic setting of the image target in the layer generates the limited elements of the specified customer number and related code attribute status when reading the source, forming the only correlation of each element read, which is specified by the encrypted label layer The situation is simulated each time.
  • the image group, designated customer number, and related code attribute status form a single hidden status, which is the imitation of the source status of the encrypted label layer for each use period; the sorting and stepping of the status of the designated customer number leads to the orderly generation of each single hidden status , forming multiple burial conditions; single and multiple burial conditions of the inner target layer function imitation, real-time filtering, resulting in a composite burial situation; each composite burial situation generates a group of burial conditions in an orderly manner.
  • Each hidden state is a kind of operating state, and its change is uniquely related, and it is a state that is unknown to the model, called the background virtual state.
  • the assigned status is managed and invoked by the secret label layer, and people are dynamically placed to participate in the modification of its operation.
  • the assigned number and the related code attribute status change referred to as number change.
  • the state of the command is managed and invoked by the inner target layer, and dynamically inserted to participate in the trimming of its operation.
  • the status of the code and symbol attribute (data unit attribute) changes, referred to as attribute change. '
  • the command status is managed and invoked by the authorization layer, and people are dynamically placed to participate in the modification of its operation, resulting in the change of the dense group status in the source of change to form the benchmark status change, referred to as the source change.
  • the instruction status is managed and invoked by the authority layer, and dynamically inserted to participate in the modification of its operation.
  • the resulting background direct status is directly changed by the underlying basic status to form a structural change in the authorization layer, referred to as a structural change.
  • the base state is the imitation of the base state in the relevant layers.
  • the buried status is managed and invoked by the hidden layer, and dynamically inserted to participate in the modification of its operation, resulting in the change of the image group status in the image source, which is the change of the imaging reference status, the status change of the designated customer number and the related code attribute, referred to as the buried change.
  • Each state in each layer undergoes state change to update its respective state, which is called state update, and the state before and after the state change is called the original state and the new state, respectively.
  • the conditions in each layer are continuously updated, and the conditions and changes are related to a cycle to form a dynamic set of conditions and sort them, called the internal condition group.
  • a model whose internal environment is composed of a dense layer is called a dense layer model; a model composed of a dense layer and an inner target layer is called a filter layer model; a model consisting of a dense layer and an authorization layer or a dense layer and an inner target
  • the model composed of layer and authorization layer is respectively called the model of the second layer or the third layer of authority, and they are all called the model of the authority layer; it consists of the secret label layer, the authorization layer and the hierarchical authority layer or the secret label layer, the inner target layer, and the authorization layer.
  • the model composed of layer and hierarchical layer is called the model of three-level layer or four-level layer respectively, and they are all called layer-level model; or cryptographic layer, authorization layer and hidden layer or cryptographic layer, inner target layer, authorization layer and buried layer or cryptographic layer, authorization layer, hierarchy layer and buried layer or cryptographic layer, inner target layer,
  • the model composed of authorization layer, hierarchical weight layer and hidden layer is called two hidden layer or three filter hidden layer or three weight hidden layer or four filter hidden layer or four weight hidden layer or five hidden layer.
  • the encryption layer is a necessary layer in the internal environment.
  • the fully compatible instruction system of the layer constitutes the authorization layer and the hierarchy layer.
  • the above-mentioned repair utilizes the existing sub-standards, the clear model structure of the central equipment, and the support platform to realize the improvement of the real-related safety degree of the existing clear model identification system under the utilization of existing resources, referred to as repair.
  • the model formed by repairing is called repairing model.
  • the internal environment of the model formed by repairing is that the source in each model code layer above the dense layer is simplified to elements, and the operation structure in the authorization layer is simplified to the execution algorithm structure, so as to improve the clear model structure, operation complexity, and repairability Improve the overall cost-effectiveness of the repaired model compared to the exposed residual model; lose the real-related safety of each process above the dense layer, reduce the complexity of the structure, and the internal environment does not reach the internal environment of each model. called partial repair.
  • the in-process environment formed by repairing reaches the in-process environment of each process, which is called full repair.
  • the modules formed by the above-mentioned repairs and upgraded can fully comply with the existing network working agreement of the single secret label method and the identification system of the clear and residual model, which is the standardization, generalization and serialization of the single secret label method and the clear and residual model really Repair and upgrade structures related to security.
  • the existing single secret label method and the use period network of the residual model identification system will not change in real time, and the rest period will be added to participate in the background work. Construction and application of fully compatible existing identification systems work in real time during the service period of the network, which is called fully compatible repair and upgrade.
  • Fig. 1 indicates the notes of the specific graphic symbols of each schematic diagram of the present invention
  • Figure 2 indicates all the relationships between the objects and the central two-side models that are uniquely related to each other;
  • Figure 3 indicates the identification system in the networking environment of the open information network. After the initial recognition is completed in a certain period of establishment or use, a two-way information transmission channel across the interface is established between an object and the two-way model supported by the external structure of the center;
  • Figure 4 indicates the structure of the mark, set, group and source that make up the original secret
  • Figure 6 indicates the source of the image group
  • Figure 7 indicates the network structure diagram of 'OIN-DXP'
  • Figure 8 indicates the "'OI card' with 'scratch'" manufactured using the dense layer process of the version 101 structure;
  • Figure 9 indicates the flow of user phone authentication;
  • Figure 10 indicates the network structure block diagram of 'OIN-DH'
  • Figure 11 indicates the flow of telephone mutual authentication
  • Figure 12 indicates the flow of telephone currency settlement between users
  • Figure 13 indicates the network structure diagram of 'OI (Sh)';
  • Figure 14 indicates the flow of Internet mutual authentication
  • Figure 15 indicates the Internet mutual authentication e-commerce structure
  • Figure 16 indicates the Internet user registration process
  • Figure 17 indicates the process of Internet goods exhibition and sale
  • Figure 18 indicates the Internet proxy sale transaction flow.
  • FIG. 1-FIG. 6 the basis of the general embodiment is given in detail.
  • Figure 1 indicates annotations of specific graphical symbols for each schematic diagram of the invention in this series.
  • the number 1 indicates space-time and interface;
  • the number 2 indicates the relationship between various systems and parts;
  • the number 3 indicates the uniquely related setting (completely consistent) between the two models;
  • the number 4 indicates saving;
  • the number 5 indicates fixed;
  • the number 6 Indicates confirmation;
  • label 7 indicates multi-channel;
  • label 8 indicates projection, projection;
  • label 9 indicates two-way code transmission channel, bus;
  • label 10 indicates two-way entrance of interface;
  • label 1 1 indicates open interface two-way code transmission channel, bus entrance set;
  • label 12 indicates that the two-way entrance of the two-way interface forms a two-way code transmission channel and bus;
  • label 13 indicates that the relevant pyramid and the lower layer are the foundation of the upper layer;
  • label 14 indicates the part and system coded as n;
  • label 15 indicates four-dimensional space coordinates objects in the system.
  • Figure 2 indicates the overall relationship between the object and the central two-side model that is mutually uniquely related to each other.
  • the label 16 indicates the original secret group;
  • the label 17 indicates the internal status group;
  • the label 18 indicates the internal operation of the implementation.
  • Figure 3 indicates the identification system in the networking environment of the open information network. After a certain period of establishment or use is completed, a two-way information transmission channel through the interface is established between an object and the two-way model supported by the external structure of the center.
  • the number 19 indicates the dense group; the number 20 indicates the internal structure; the number 21 indicates the module; the number 22 indicates the sub-standard equipment of the auditee; the number 23 indicates the object.
  • the number 24 represents the final identification of the auditing party; the number 25 represents the data generation of the dynamic input, also known as the composition image label; the number 26 represents the identification management system; the number 27 represents the artificial seat; the number 28 represents information processing; Reference numeral 30 denotes the center.
  • Figure 4 indicates the structure of the target, set, group, and source that make up the original cipher.
  • the label 31 represents the information set; the label 32 represents a plurality of original dense; the label 33 represents the element group; the label 35 represents the beginning number; the label 36 represents the end number;
  • the dense group; the structure composed of the meta group 33, the number group 34 and the original dense group 37 is collectively called the source; the hardware structure composed of the meta group 33 and the number group 34 is collectively called the source structure.
  • Figure 5 indicates the image. Wherein the label 38 represents the A object; the label 39 represents the B object.
  • a reference system which is composed of a three-dimensional space coordinate system and a time coordinate system.
  • the coordinates of the frame of reference XYZT are expressed as (X, y, z, t).
  • the coordinate set B i ⁇ X b , yb , zb , tb ⁇
  • the coordinate set A i or B i of the i running of the object is called the A or B coordinate image.
  • the elements of the A or B coordinate image are generated and processed as image code to form a non-uniform image.
  • a or B coordinate image corresponds to the only relevant open information network port identification data to replace the spatial coordinates, called the related image, and the code is generated and processed to form the related icon.
  • a and B-like or non-unlike corresponding uniquely correlated randomly selected values are called random related images, code generation, and composed of random related icons, which are reflected in the extraction.
  • Figure 6 indicates the sources constituting the image group.
  • the label 40 represents the first image
  • the label 41 represents the last image
  • the label 42 represents the n (6) image of the first image group
  • the structure composed of the first image 40 to the last image 41 is called the whole group 43 ;
  • the first image mark 40 to the n (6th) image mark 42 is the first image group structure formed dynamically, which is called the initial state 44 of each image group;
  • the label 45 represents the pixel group;
  • the label 46 represents the initial number, and the label 47 represents The last number, the first number 46 to the last number 47 form the own number group 48 and the customer number group 49.
  • the technical basis for realizing the functional unit is microelectronic circuit, computer hardware platform, system software, application software and networking technology, and mechanism of mechatronics.
  • the engineering composition of the identification system is the orderly operation of each functional unit in the networking environment of the open information network, and the realization of the joint network of each device of the corresponding system.
  • the realization of its module 21 is the electrical element of the technical basis, and tasks are performed according to the working principle of the module. In the realization of the model, the existing physical defense attack technology is adopted.
  • the system realizes the composition of the respective empty models between the object and the center, which is called the composition of both parties. Respectively realize the establishable or established model of both parties between each object and the center, and realize the networked three-dimensional distribution of the system, which is called the model system.
  • the whole relationship between the object and the central model is the only relative setting, called imitation, and can be divided into three kinds of relationships between the two sides: the original dense group 16 , the inner state group ⁇ , and the implementation inner operation 18 .
  • the three relationships of the two models are respectively It is completely consistent, called the same imitation, and the purpose is to make it easy to understand.
  • the logo management system 26 is a management system for establishing the model process, the establishment period, and the object 23 related affairs processing and composition icon 25 type setting of the entry interruption period and termination period.
  • the manual seat 27 is the interface between the identity management system 26 and the staff of the center 30.
  • the identification management system 26 , artificial seats 27 , and information processing 28 form an identification management system.
  • Run divided into: set image type, model run.
  • Model operation is divided into: establish model and use operation.
  • Status update is divided into: internal status change, internal and external correlation.
  • the center’s logo management system 26, artificial seat 27, and information processing 28 interfaces are managed and called for transmission and operation, which are divided into: pre-setting the software for group deduction in the operation structure of the layer, and the required internal status group ⁇ data, It is used to fill the vacancy of the operation structure in the layer, which is called preset; assigning the original dense group 16, the internal state group 17, and the group deduction 18 to the model 21, which is called the distribution model data; the pre-set models are respectively composed of icons 25
  • the type is called the pre-image type.
  • the center's identification management system 26, artificial seats 27, information processing 28 and both parties' secret groups 19, internal structure 20, and models 21 realize networked operation, and are divided into: 19 directions for entering secret groups, and model data that has been formed and distributed (Original dense group and pre-set data) are placed into the empty module, and the operation of the encrypted source and storage settings in the module respectively forms the full source and setting of the module; out of the dense group 19 directions, return the relevant code during operation Run out of instructions.
  • the dense group 19, internal structure 20, and model 21 of both parties and the final knowledge 24 of the central auditing party output the secret group 19 to realize the target recognition.
  • the operations implemented between the 19 and 20 interfaces of both parties are divided into: 19 directions of entering the secret group, which is to write the transferred original secret group and the environmental secret group data generated by the internal state change into the internal secret of the module according to the order of the secret code and number
  • the operation of the source structure of the target layer is called the dense source;
  • the direction of the dense group 19 is the operation of the dense group in the source to directly form the target in the model according to the specified situation of the dense target layer, which is called the direct source target.
  • the operation implemented between the internal structure 20 and the model 21 interface of both parties is divided into '. Entering the secret group 19 direction, inputting the original secret group and preset data, dynamically inserted icons and work instructions. Out of the dense group 19 directions, the dense tags obtained directly from the source target form the in-module target; after reading and filtering the data unit attribute status of the inner target layer, it changes into the running dense inner target and indirectly forms the operation of the target in the modal, called indirect Source target; Return related code consumption instructions to the identification management system and output work instructions.
  • the work order is necessary for the model to execute the task, and the nature of its network protocol is implicit to the working principle of the model, which is hidden in other discussions.
  • the operation of the internal structure 20 of the two parties is as follows: the preset data is placed in the network operation of the empty model, and the transferred preset data is carried out according to the agreement, and the operation of the layer storage is implemented, which is called the storage setting.
  • the operation of the layer storage is implemented, which is called the storage setting.
  • deposit In the use and operation of the Internet, it is the operation of depositing the transferred image data according to the agreement, which is called deposit.
  • deposit deposit
  • the two-way information transmission between the object model 21 and the sub-target device 22, and the central model 21 and the target device 29 interface is divided into: 19 directions for entering the secret group, inserting data into the model, and forming an external target entry filter channel , the opaque operation of entering and shielding is called transfer; the 19 directions of exiting dense group are the final return of the internal target and consumption, and the operation of entering and exiting the filter channel, opaque exiting the shielding, and forming a transparent external target. called transfer out. In, out, called conversion.
  • Inner and outer targets referred to as targets.
  • the operation division between the model 21 of the two parties and the final knowledge 24 of the reviewer is divided into: the model of the object passes through the source target, transfers out, the outer target is transmitted to the object, and the input network to the central final knowledge forms the final operation, which is called the object target end .
  • the movement of the central model through the source target, transfer out, and the outer target is transmitted to the final consciousness, which is called the central target terminal.
  • the final knowledge 24 of the auditing party operates as follows: the final center ⁇ of the central object forms a final knowledge, confirms whether the final object of the object is correct, and realizes whether the audit object is true.
  • the source target, transfer-out, target end, and end consciousness of both sides are each part of the inner and outer operation of the readout target, respectively collectively called the readout and the target, and collectively called the readout target.
  • the transmission between the final knowledge 24 of the reviewer in the center and the identification management system 26, the artificial seat 27, and the information processing 28 shows the direction of the final knowledge 24 of the reviewer, and the final knowledge of the object is a false signal notification.
  • the operation of forming the icon 25 is as follows: In the operation of setting the image type, it is the operation of storing the pre-image type data in the structure implemented according to the agreement, which is called the image storage type.
  • the external structure extracts the relevant tracks running in the network environment of the object, and the obtained
  • the unique characteristic information parameters are converted into information codes, the non-characteristic information codes are compressed, and digital machine codes are formed as a single whole determined by the standard specification, which is called a composition image standard.
  • the image between the modules 21 of both parties and the interface of the composition image 25 is transmitted to the models of both parties, which is called the distribution image.
  • the internal structures 20, modules 21, and the central composition image 25 enter the dense group 19 directions to realize the composition, distribution, transfer, and storage of the image, which is called dynamic placement.
  • Information set 3 1 is a symbol set and a machine code set.
  • the elements in the symbol set are randomly extracted multiple times, assembled into the original encrypted symbol subset, and sorted into symbol groups; the symbol groups are converted into code groups.
  • the elements ⁇ 0 , 1 ⁇ of the machine code set are randomly extracted multiple times, and sorted into code groups; the original encrypted symbol group corresponds to the code group or code group to form a certain digital machine code as a single whole, which is called the generation method.
  • Original code The original dense code set is synthesized into each original dense group 32 and sorted to generate the original dense group 16, which is called a comprehensive group.
  • the original dense group 16 is generated, which is called the analysis group.
  • the initial number in number group 34 is called the beginning number 35; the last number is called the last number 36.
  • the code of the data unit and number in the meta storage is formed by the correlation of the meta number, which is called the correlation code.
  • Each element number forms a unique setting, which is called element number set, resulting in a standard group, element group 33, number group 34, and code group, called group.
  • Element groups, number groups, form source structures 33-36.
  • Composition of the operation of the icon 25 the generated icon data is transmitted to the image group source of the internal structure 20 in the model 21 of both parties.
  • the establishment of the model process determines the law of full source and number change in the secret label layer and specifies the start number of delivery, whether attribute changes are generated according to the management and call of the inner target layer, and whether the order and symbols are generated according to the management and call of the authorization layer.
  • Code change whether to generate structural changes according to the management and call of the hierarchical level, whether to hide the image mark in the hidden layer and provide virtual mark to other layers, form the agreement of the internal environment and the first designated number data of the transfer structure (original secret number data), and determine the initial state.
  • the state in the model is called the initial state.
  • each layer implements the operation of state update according to the predetermined initial state, and the internal structure of each layer implements the operation of number, attribute, sorting, symbol, structure, and hidden state change according to the rules within and between layers. , form their own new situation, can produce the only relative change and recognizable external end.
  • the end return When the number of the number group reaches the end number, a signal of the end of the operation of the number group model is given, called the end return, which is used to reset the transfer structure to form the status of the specified start number, inter-layer application or related affairs of the identification system management model.
  • a signal for the end of the number is given, called the use return, which is used for redundant reading of target identification and fault tolerance and inter-layer application.
  • the data units affected by the source are divided according to the following specifications: shape, divided into: line, solid, hollow block; curvature, divided into: straight, folded, curved; length, divided into: continuous, intermittent ; Orientation, divided into: horizontal, vertical, oblique, center, symmetrical. See Figure 4.
  • the division specification determines the code length of a certain data unit and its position in the dense group.
  • the operation structure in the encrypted label layer provides the specified condition group according to the setting agreement, manages and calls the specified condition, forms the unique correlation of the read element, and implements the read target recognition.
  • the encryption layer adopts the group consistency of determining the status of each designated number with the status of the designated related code attribute, and the change of the number status is accompanied by the change of the designated related code’s attribute status. , use to stay. '
  • the information code is re-determined and the information code is re-determined as the preparation for the operation of the next use period, which is called pre-preparation; as the preparation for the operation of a subsequent use period according to the agreement, it is called prepare.
  • the information code provided by the operation of a certain period of use is obtained, and it is weighed as the purpose specified by the operation of the period of use.
  • the undetermined number data in the number group is generated, transferred, closed in the secret mark layer, and the relevant internal conditions in the cambium layer change; open outside the secret mark layer, the cambium layer inter-correlation internal state change, internal-external correlation:
  • extraction The operation data of the specified number generated by the random selection of the center is called extraction, which is divided into: the number randomly drawn by the center, regardless of the attributes of the number generated by the number group in the module, is transmitted to the module to form a dynamic input. Weighing pumping.
  • the center randomly selects the used and reserved numbers in the number group, plus the product of the drawn number multiplied by the number modulus n (l), and the resulting sum is used as the replacement of the centrally randomly drawn number, which is called sum pumping.
  • the center randomly extracts the numbers in the number group and sub-number group respectively, and transmits them to the model program to form a dynamic insertion, respectively title and sub-drawing.
  • counting, summing, and virtual standard module counting are performed with the number model n (l), and the undetermined number data in the number group are generated, and the number is counted.
  • the number, sub-plot and virtual target data are the undetermined number data, which can be called.
  • pending number data is new number data; for calculated and acquired consumption, construct access return structure, query related code attributes of pending numbers, and related code attribute status has higher priority than number status: all The extracted number is used, and the pending number data is the new number data; the extracted number has been consumed, which is called the pending number, and is handed over to the first available number by the two models sequentially, so as to realize the generation of new number data.
  • Pre-preparation, pick-and-delivery, pre-preparation (number, sum drawing and virtual bid) calculation, pre-preparation (number, sub-drawing and virtual bid) acquisition, taking (number, sum drawing and virtual bid) calculation, taking (number , sub-extraction and virtual standard) are obtained, each of which is a law of number data change based on number change, which is called change.
  • the new structure is based on the more regular operation to generate the designated new number data; the new number data drives the update structure to limit the readability of the only relevant element in the source, forming a new status of the specified number.
  • the relative code attributes of all numbers of the first number modulo n ( l) of the dense layer model process are left before, consumed, is the real related period, and is called the former real related period;
  • the stochastic true correlation period is called the pre-stochastic true correlation period. Thereafter, they are all related to unsafe realities.
  • the internal structure of the inner target layer provides command status groups, manages and invokes command status according to the setting agreement; informs the encrypted label layer to read the encrypted label string according to the instruction agreement, and determines the attribute status group of the operation encrypted data unit; according to the instruction agreement Form the target data within the operation density and implement the indirect source target.
  • the inner target layer management and call instruction state (it is the encryption layer management and call designation state, and the imitation of the implementation of the read), and the read instruction is used To form a real-time processing structure.
  • the properties of the data unit to be used are divided into: the original can be used, called, its status, called status. After the identification system ends the operation instruction, the use is still reserved and will continue to be used when it is designated. Consumption status; end the operation command and end the use, it will still be reserved and dormant, after being activated, it can continue to be used when it is assigned a number, it is called latent, and its status is called latent status.
  • Each instruction randomly agrees on the data unit division attribute to be acted upon.
  • the instruction encryption layer is subject to the control and work requirements of the selection structure: from the specified number to the new state, the encryption string of the code length equal to the amount of data to be manipulated is continuously delivered.
  • the data unit division of the command agreement from the initial data unit, select the data unit used by the command agreement and the reserved attribute, and arrange each symbol code in order to form the target data in the operation secret, drive the data filtering channel to register, and implement the indirect source target.
  • the law of the independent attributes of the data units in the amount of data being acted on is called pick.
  • the selection structure is based on the selection rule, and each new usage and retention attribute data unit is specified in the affected data volume generated by the selection operation; the new usage and retention attribute data unit drives the target registration, forming a new status of the symbol attribute in the specified data volume.
  • the authorization layer provides instruction status groups, manages and invokes command status according to the setting agreement; implements management and invokes the encryption label layer according to each instruction agreement to generate the environment encryption group and symbol status group; implements the environment encryption according to the instruction agreement Determine this baseline condition.
  • the authorization layer After determining the initial status and confirming that the modulus of the encrypted label layer is n (2) times, the end-of-life return of the designated number status is submitted, and the authorization layer obtains the user return after the end of the use period, and instructs the encrypted label layer to obey the control of the configuration and calculation structure Requirements for work: Stop providing read-out target operation, register the specified original status, and start source change operation to participate in the work of setting and calculation.
  • the authorization layer manages and invokes the encrypted label layer to generate encrypted group data changes, which are divided into: sorting (group) data changes and symbol code data changes.
  • sorting (group) data changes and symbol code data changes The laws of data change are: set and calculate.
  • the original secret group stored in the full source in the backup and variable source, the original data range in the group is agreed, the data unit corresponds to the data volume and other code lengths, each original data unit is replaced by the original data unit, and the replacement forms the environmental encryption sorting of each original
  • the data unit is replaced by the data unit in the agreed range to form the new data of the environment, which is called the classical position.
  • each original data unit corresponds to a new data unit with a code length equal to the data volume, the original and new data units are divided differently, and the new data unit is called the shadow of the original data unit.
  • the obtained function is agreed to be a new data unit, and each new data unit is replaced by the original data unit, forming an environment dense sorting of each new data unit, within the agreed
  • the range data unit is calculated and replaced to form the new data of the environment, which is called calculation.
  • the difference from shadow setting is that the new data unit used to replace the original data unit is not the existing division selection but generated by calculation.
  • the source correlation used for setting and calculation it is divided into: the dense group data transformation of the closed source data is called the internal source correlation; the dense group data transformation of the open source external data is called the external source correlation.
  • the data correlation used for setting the correlation outside the source and calculating the correlation between inside and outside the source it can be divided into: the data obtained in a certain storage area of a certain source is the result of setting the data in a certain storage area of other sources, which is called external; it is the original storage data and The calculation result of data in a certain storage area of the source is called internal dyeing; the result of calculation between the original stored data and data not of the source is called external dyeing; the result of calculation of data in other storage areas of the source is called internal cleaning; right or wrong The result of the data operation of the source is called external cleaning; the result of calculation between data in other storage areas of the source and data other than the source is called internal and external cleaning.
  • the dense correlation of setting and calculation it can be divided into: the dense group data change determined by the instruction status is called the formation environment dense group; the dense group data change determined by the instruction and the hidden status is called the formation virtual dense group.
  • the dense correlation generated by the source of the setting and calculation function it can be divided into: the original dense group in the backup and variable sources is changed by the dense group to form the environmental dense group, which is called the initial change; the environmental dense group is changed by the dense group, or the environmental dense group is formed , called continuous change.
  • the configuration and calculation structure implement the new dense group data generated by the configuration and calculation operation, manage and call the encryption level write-driven variable source structure, and the only relevant storage in the source forms a new dense group status, which are called sorting variables,
  • the code change is called the state change or the source change of the secret group.
  • Rank change also known as group change.
  • the environmental dense group status and the attribute status are mutually prioritized.
  • the environment dense group situation is generated, the authorization layer gives a lifetime return signal, and the encryption layer finishes the work of setting and calculation, withdraws from participating in the source change, and restores the original situation; Knowledge runs.
  • the hierarchical authority layer provides command status groups, management and call command status according to the setting agreement; implements management and call command tables in the authorization layer to generate the encryption group and symbol status of the encryption layer environment according to the command agreement, Generate the environment encryption structure status group of the authorization layer; implement the basic status of the environment encryption generation structure according to the instruction agreement.
  • the specific method of executing the task is the same as the formation of the authorization layer, the real-time processing structure and the setting and calculation rules. The difference is that the initial state, the final return of the linear instruction table in the authorization layer or the end return of the random number distribution instruction table is the application.
  • the authorization layer after the authorization layer gets the lifetime return signal of the secondary source variable, it instructs the authorization layer to obey the control and work requirements of the configuration and calculation structure: when the authorization layer starts to construct the variable and run it, stop providing management and calling the generation source of the encryption layer Change, register and specify the original situation, participate in the work of setting and calculating, and start to construct and run the change. (The cryptographic layer does not stop providing the read-out target operation.)
  • the authority layer produces structural changes in the management and call authorization layer.
  • the data object of setting and calculation is the specification based on the division data unit in the operand address of each instruction that generates the encryption layer environment encryption group and symbol status in the authorization layer.
  • the generated specification data may have deviations, which need to be related by both parties. The only fix.
  • the operation code of each instruction, the address of the operand, and the table of specifications based on which the data unit in the address is divided are collectively called the instruction table.
  • the environmental security structure When the structure change operation is completed, the environmental security structure is generated, the authority layer gives the secondary return signal, and the authorization layer ends the setting, Calculation work, withdrawal from participating in the construction change, and restoration of the original state; determined the basic state of the instruction list based on it, and can continue to provide management and call the source change of the encryption layer.
  • the operating structure in the buried layer provides the specified status group, manages and calls the status of the designated account and customer number; implements the agreed pixel acquisition according to the status of each designated account number, and generates the image group status group; under the constraints of sending element acquisition , Designate the status of this number and implement the environmental encryption to determine the image benchmark status; According to the status of each designated customer number, implement the agreed reading image source to take virtual markers and generate hidden status groups; Provide virtual markers and virtual marker groups according to the agreed status of designated customer numbers For the desired layer, replace the transparent icon, fixed the original dense group.
  • the specific method of executing the task is that the code of the specified number status is equivalent to the code layer code, the difference is:
  • the icon formed and distributed for the first time within a period of validity is called the first icon; the icon formed and distributed last is called the last icon.
  • the dynamic image set is like The sub-image set of the whole set; according to n (6) as the finite set basis, the sub-image set of icon elements is dynamically replaced, called the image set, which is sorted into image groups.
  • the only unit that stores image objects is called the image object storage unit, referred to as the registration unit; the unit group contains the source structure of the image group, which is called the image source structure. Let its modulus be n (6).
  • the role of Jiyuan is to dynamically register and transmit the image objects during the use period, and the rest period is agreed to be used to implement the prediction and acquisition, brushing, image dyeing, internal and external image cleaning or image source storage of the image objects, and provide internal and external related status changes and images.
  • the icon stored by the source was last used to transfer.
  • the role of the image source is to accept the operation structure management in the layer and call the limited pixels of the specified account and customer number status, store the dynamically registered images during the rest period, and provide backup for the images transmitted during the latent use period, and participate in the flow, Take the virtual mark for pumping, touching and re-changing.
  • the pixels are stored in the pixels; in the rest period, after the hidden layer takes the end of the use period, it stores and replaces the icons into the pixels. All are claimed.
  • the state of designated number in the buried layer can be divided into: one state of designated number is used for the acquisition of pixels, and the image source number group managed by it forms the own number group; the other state of designated number is used for reading image source Take the virtual standard, and the image source number group under its management forms a customer number group.
  • the status of the designated number of the buried layer is distinguished according to the time sequence of the same use period: the status of the designated number first, and then Specifying the status of the customer number is called the customer; specifying the status of the customer number first, and then specifying the status of the own number is called the customer.
  • n (6) > n (2) this guest, the established model has pre-stored the secret code in each number pixel of n (6) minus n (2) after the empty image source; guest book, after n (6 ) Minus n (2) Each number of pixels plus 1 has a secret code stored in advance.
  • the rule of account data change based on the change of book and customer numbers is divided into: book change and customer change. This is more convenient to use delivery, and the customer is the agreement set according to the virtual standards required by each layer.
  • the data transformation operation of this update structure will generate the designated new account data, and drive the update structure to limit the only relevant element in the image source to form a new status of the specified account.
  • the source structure of the image is specified by the meta-generation of this number, and the image is set to run for n (6) times. Only when the new status of the original number disappears, it becomes like a standard status.
  • the standard status of each image of the empty image source is superimposed on the full image source to form the initial status of the imaging group.
  • the image source assigned the status of this number will be generated, forming a new status of the image group.
  • image group state The image standard, image group initial and similar initial, image group new state are called image group state.
  • Customer change is divided into: flow, draw, touch, re-change.
  • the customer update is delivered simultaneously with the original update, and it is said to be fully stocked.
  • the difference between the guest shift and the original shift is different (not the previous) number, and the difference between the designated post number between the guest shift and the original shift is m, (the modulo is n (6) continuous counting, m ⁇ 0 and ⁇ n (6)- l), called m single flow.
  • the calculation and acquisition of the virtual target is obtained by reading the image source of the new status of the specified customer number in the customer flow, referred to as touch.
  • the customer update structure generates the designated new customer number data through the operation of the number data change according to the customer update rules, and drives the customer update structure to limit the only relevant elements in the image source to form a new status of the specified customer number.
  • a single buried condition of the virtual target is formed, which can be divided into:
  • the new customer number data of the full single stream forms the status of the full single stream image group: - the icon of each pixel has been latent for n (6) minus 1 operation, used for n (6) times, and is formed by the readout unit Virtual standard circulation.
  • the new customer number data of the standby m single stream forms the status of the standby m single stream image group: the icon of each pixel has been latent for m minus 1 operation, and is used for the m number, and the readout unit forms a virtual standard circulation.
  • the extracted new customer number data forms an abstract group status.
  • the data of the new customer numbers touched form the status of the touch image group.
  • the read pixel takes out the virtual mark and transmits it to other implementing jurisdiction layers, forming a background to provide the exchange of virtual marks inside and outside the model.
  • Generate the designated new customer number data according to flow, pumping and touch operation form the initial status of the designated customer number, and then change and run the data of each delivery customer number to generate the remaining designated new customer number data to form the remaining status of the designated customer number, direct delivery Weigh and update the status until the end status of the designated customer number is formed.
  • the data of each delivery number based on flow, pumping and touch is changed, and the weighing is changed.
  • the re-update state provides each virtual standard state, forming multiple hidden states of the virtual standard group.
  • the status of the specified customer number in the single hidden situation, and the situation from the beginning to the end of the specified customer number in the multi-buried situation implement the selection function imitation according to the agreement, take the data units for each icon and attribute, arrange the symbols in sequence, and provide In order to take the virtual standard state equivalently, it is called the compound buried state.
  • Each compound buried condition forms an equivalent operation condition of a virtual standard group, which is called the group (composite) buried condition.
  • buried conditions Single, multiple, compound, and group buried conditions are called buried conditions.
  • the structure in the buried layer is operated according to the law of burial, and new data are generated in an orderly manner; each new data drives the structure in the buried layer in an orderly manner, forming a new state of burial.
  • the partial repair module of non-secret level repair shall submit the corresponding application equivalent to each return to each jurisdiction layer and structure after the read variables of each service period are over and before the read target operation.
  • the respective background layers of the two parties can also be simplified to a real-time layer, and the uniquely relevant internal sequence data and symbol data changes in real-time during the use and rest periods respectively generate environmental secret internal target data and target status.
  • the engineering composition of the present invention can be used as an equivalent change of overlapping, crossing, simplification, and combination of some or all of functions, structures, layers, data, conditions, and changes.
  • the amount of data to be manipulated can involve all the sources of the governed layer, and each metadata unit is equivalent to a secret code.
  • authorization layer, setting, computing, and the scope of the affected source can involve the image source, replacing the implementation of the challenge function imitation; single and multiple hidden conditions, providing the same equivalent virtual standard, group equivalent composite, and group hidden conditions .
  • multiple sources in a model are controlled by a single structure.
  • the operating structure in the virtual layer when different layers have the same partial operating structure in the layer, the physical structure is built in a certain layer, and the functional structure is built in other layers; structure, forming a real-time processing structure.
  • the selection structure of the use period and the rest period are the real-time processing structures for the inner target layer and the buried layer respectively, and the setting structure is common to the right and buried layers, and the single update structure provides the assigned new numbers in each layer. data, specified status.
  • the weight layer can be built into multiple levels.
  • the right layer of a model controls more governed layers related to both parties through data transmission.
  • the instruction stipulates that the data unit is divided into secret codes, which are also used to change the solid source model, and can notify the secret code layer of the number of retransmission numbers required by the attributes, which is simplified to real-time direct source targets during the use period; agreed When submitting an application based on the attribute status, the selected instruction list can also be governed by authorization and hierarchy.
  • the classical setting can be simplified as a random linear sequence switching: the simplified convention of random setting, the secret code contained in the element specified by the nth (2) number is the initial number, the original secret group is set sequentially, and the secret code contained in each element is re- .
  • the original dense group formed by the random linear sequence switching is called the random linear sequence switching, and the environment dense group formed is called the linear sequence reset sequence group.
  • external or external dyeing or internal and external cleaning or external cleaning can be simplified as brushing or image dyeing or internal image cleaning or external image cleaning: the data obtained from a certain storage area of a certain source during each rest period is the dynamically inserted icon or image The result of replacing the function calculated with the original storage data, or the function calculated with the data in other storage areas of the source, or the function calculated with the data other than the source.
  • Identification method Dense layer model, specified related code attribute status: consumption, change: pick-up and delivery, specified number status, direct source-target, transfer-out, and final transmission drive are manually implemented by the user to replace the internal structure, and the user manually implements the internal structure To run, the technical structure is called version 201.
  • the network structure of 'OIN-DXP' has the characteristics of connecting telephone communication network, CRS airline ticketing network, and bank computer network into an open network environment.
  • Figure 8 indicates "'OIN card' with 'scratch'" manufactured using the dense layer process of version 201 structure.
  • the reference number 66 represents the solid source
  • the reference number 67 represents the yuan
  • the reference number 68 represents the original code
  • the reference number 69 represents the number
  • the reference number 70 represents the consumption and the model interface material
  • the reference number 71 represents the manual implementation of the user to replace the internal structure and the manual operation of the user.
  • the inner target area after implementing the inner run.
  • Manual operation by the user to implement internal operation means When the service lady answers 'please report the verification number', use the 'OIN card' to select from the scraped 'scratched surface' to the unscraped 'scraped surface' in order of number '('Scrape' can only be scraped off in order of numbers), gently scrape off 'Scrape' with fingernails, and correctly report the 'Verification Number' revealed under 'Scratch', and realize the 'specified related code attribute Status: Consumption, Change: Requirements for the technical structure of pick-up and delivery.
  • a user 50 when a user 50 needs to purchase an airplane ticket, he or she enters into a pan-communication network 53 composed of communication networks such as PSTN, A, B, G, CT-2, etc. through any fixed telephone route 51 or mobile telephone route 52, and passes In step 72 (see FIG. 9 ), dial the 'OIN-DXP' central service number, and switch to the converging terminal 54.
  • the call-in prompt on a certain artificial seat 55 the OIN-DXP center service lady 57A off-hook, and the off-hook signal makes the transaction process voice recorder 56 start working.
  • the OIN-DXP center service lady 57A and the user 50 first carry out telephone authentication, and the service lady 57A inputs the data reported by the user into the OIN-DXP center (collection terminal manual connection system) computer 58.
  • the OIN-DXP center (collection terminal manual connection system) computer 58 is a name for network integration, which includes functions equivalent to the center 30, and is a computer and electronic information system with identification system and ticket service functions.
  • FIG. 9 shows the flow of user phone authentication. details as follows:
  • step 73 a response is made.
  • the service lady replied 'OIN-DXP Center, please report the account number'.
  • step 74 report 'account number'.
  • step 75 a response is made. If the account number reported by mistake does not exist, the OIN-DXP center computer 58 will display 'account number does not exist', and the service lady replies 'I'm sorry, the account number you reported does not exist, please re-report', and re-reports 'account number'. It has to be right the second time. If an error is reported at the desk, the waitress will answer 'Sorry, the account number you reported still does not exist, please confirm and then dial', the 'OIN-DXP' center hangs up.
  • the waitress will reply 'please report the verification number'.
  • step 76 scrape off the 'scratch' and report the revealed 'verification number'.
  • step 77 a response is made. If the error is reported three times, the waitress replies 'Sorry, you are not authorized to use this Account', hang up.
  • the service lady 57A operates the CRS terminal 59, and deducts ⁇ the required air ticket for the user 50 through the CRS local host 60 and enters it into the OIN-DXP central computer 58.
  • the service lady 57A said ' hang up please', hang up, and the hang up signal makes the transaction process voice recorder 56 finish work. At this point, the foreground transaction of the agreement is completed.
  • authentication is a popular term, that is, to achieve authenticity through identification.
  • 'account number' is a popular term, that is, it can retrieve the necessary information recorded when the user registers in the 'OIN-DXP' center.
  • the so-called "scratch surface” is a popular name, that is, the interface material between the consumption and the mold process. It is named because it is a tight covering and can be gently scraped off with a fingernail when needed.
  • 'verification number' is a popular term, namely final.
  • the OIN-DXP central computer 58 prints out the 'first receipt'.
  • the service lady 57A operates the receipt fax machine 61 at the center, and transmits the 'first receipt' to the receipt fax machine 62 at the bank.
  • the staff member 57B inputs the relevant data into the OIN-DXP bank computer 63, and after completing the authentication of the OIN-DXP central computer 58, operates the bank terminal 64, and freezes the OIN-DXP required by the user through the bank host 65.
  • the fare of the purchased air ticket is input into the OIN-DXP bank computer 63 .
  • the OIN-DXP bank computer 63 prints out the 'second slip'.
  • the worker 57B operates the bill fax machine 62 at the bank, and returns the 'second slip' to the central bill fax machine 61.
  • the service lady 57A After receiving the receipt, the service lady 57A will input the relevant data into the OIN-DXP central computer 58, and after completing the authentication of the OIN-DXP bank computer 63, the OIN-DXP central computer 58 will print out the 'Ticket Collection Form' and the airline ticket, and store them With the terminal hall 'OIN-DXP Redemption Office'.
  • the user redeems the ticket at the 'OIN-DXP Redemption Office' with his ID card, and signs the 'Ticket Collection Form'.
  • the service lady 57A inputs the relevant data of the 'ticket ticket' into the OIN-DXP central computer 58, and the OIN-DXP central computer 58 prints out the 'fourth receipt'.
  • the service lady 57A operates the receipt fax machine 61 at the center, and transmits the 'fourth receipt' to the bank receipt fax machine 62.
  • the staff member 57B After the bank receives the order, the staff member 57B enters the relevant data into the OIN-DXP bank computer 63, and after completing the authentication of the OIN-DXP central computer 58, operates the bank terminal 64, and transfers the frozen user to purchase the air ticket through the bank host 65 The money is transferred to the OIN-DXP account.
  • Identification method two-hidden layer model, specify the relevant code attribute status: consumption, change: advance, model operation constraints automatically identify the network protocol running, this technical structure is called version 6.113.
  • the network structure of 'OLN-DH' has the characteristics of connecting telephone communication network and bank computer network into an open network environment.
  • the network structure of 'OIN-DH' has the ability to convert merchants who must have POS into merchants as users, and convert ATM cash withdrawals into cash and credit transactions between users.
  • the payment user completes the foreground operations as follows.
  • step 99 payment user data entry is performed.
  • the payment user 78 operates his own 'OIN electronic card', turns on the power, correctly enters the PIN, and inputs the payment amount and the account number of the receiving user according to the screen prompts.
  • step 100 off-hook execution. Insert the 'OIN electronic card' into the 'OIN-DH' port of the receiving user's phone or the 'OIN-DH' port of your own mobile phone, and press the 'OIN-DH, payment key.
  • step 101 the paying user waits for a reply
  • step 102 the receiving user waits for a notification.
  • Paying user 'OIN Electronic Card' shows 'Working'.
  • FIG. 11 it describes the process of automatically completing background operations for network joining.
  • step 88 dial the 'OIN-DH' center.
  • 'OI electronic card' controls the payee's phone to use DTMF signaling or his own mobile phone to use digital signaling (hereinafter referred to as signaling), and enters such as PSTN, A,
  • the pan-communication network 83 composed of B, G, CT-2 and other communication networks automatically dials the 'OIN-DH' service number and switches to the 'OIN-DH' host 84.
  • step 89 a response is made.
  • the 'OIN-DH' host 84 iM follows the instruction of the 'OIN electronic card' of the paying user 78 through the corresponding incoming fixed-line phone routing 80 or the paying user's incoming mobile phone routing 82 (hereinafter referred to as the communication routing), and starts the work of mutual authentication process.
  • step 90 the object is confirmed.
  • the 'OIN electronic card' control signaling passes through the routing, reports its own setting, and responds in step 91.
  • the 'OIN-DH' host 84 receives signaling via the route. If the object of the error report does not exist, the 'OIN-DH' host 84 control signaling responds with 'report error' through routing. It has to be right the second time. If an error is reported again, the 'OIN-DH' host 84 control signaling responds 'still error' through the route, and then hangs up. If a correct or error object exists, the 'OIN-DH' host 84 controls the signaling by routing the response 'terminated'.
  • step 92 report object end.
  • the 'OIN electronic card' controls the signaling through routing and reports its own terminal.
  • step 93 answer. If an error is reported N times, the 'OIN-DH' host 84 control signaling responds 'no right' through the route, and then hangs up. If correct, respond 'correct' and announce your end. Fault tolerance N times.
  • the receiving center is terminated.
  • the 'OIN electronic card' receives the final signaling of the 'OIN-DH' host 84 through the router.
  • step 95 reply. If an error is reported for N times, the control signaling responds 'no right' through the routing, and then hangs up. If it is correct, respond with 'correct', and transmit the packaged payment amount and receiving user account data control signaling to the 'OIN-DH' host 84 through routing.
  • step 96 icons are assigned. After the 'OIN-DH' host 84 receives it through the router, it reports the image. In step 97, the mutual identification is ended. After the 'OI electronic card' receives the image signaling from the 'OIN-DH' host 84 through the router, it will instruct to end the mutual identification.
  • step 98 work on the background layer.
  • 'OIN electronic card' and 'OIN-DH' host 84 carry out image labeling work.
  • 'OIN-DH' host 84 and bank computer 85 after completing mutual authentication, the bank computer unpacks the packaged payment user account number, payment amount, and recipient user account data, completes the transfer, and notifies 'OIN-DH' host.
  • Network automatic background operation and user foreground operation are as follows.
  • step 103 check is performed.
  • the 'OIN-DH' host 84 notifies the paying user 78 and the receiving user 87 of the packaged payment through the corresponding incoming fixed-line phone routing 80 or the paying user's incoming mobile phone routing 82 and the receiving user's incoming mobile phone routing 86.
  • the 'OIN electronic cards' of the paying user 78 and the receiving user 87 both display 'paying user account number, payment amount, receiving user account number, transfer completed', and both parties check.
  • step 104 the payment is completed. Both parties check that it is correct and complete the telephone currency settlement. If there is a discrepancy in one of the four items of "paying user account number, payment amount, receiving user account number, and transfer completion" displayed by the 'OI electronic card' of the paying user 78 and the receiving user 87, and restart step 99. The difference is that in step 100, change "press the 'OIN-DH' payment key" to "press the 'OIN-DH' repayment key".
  • the paying user 78 needs to obtain a sum of cash from the receiving user 87, and transfer the same amount from his account to Flow of telephone money settlement of the receiving user 87.
  • the paying user receives cash from the receiving user, not the goods.
  • Identification method two-hidden layer model, specify the relevant code attribute status: consumption, change: advance, model operation constraints automatically identify the network protocol running, the center is built on the Inrtemet platform and uses the information work cluster as a supporting environment, this technology The structure is called version 6.114.
  • 'OIN(Sh)' network structure The most notable feature of 'OIN(Sh)' network structure is the thoroughness of information processing. This is determined by the technical structure of the center built on the Inrtemet platform and using the information work cluster as the supporting environment.
  • a device that physically accesses Inrtemet under the direction of the 'OIN Electronic Card' becomes an authenticated device that accesses Inrtemet.
  • Inrtemet's accessible equipment cancels the authentication of the visitor, it has the ability to access Inrtemet's accessible equipment and be accessed, which is called physical access. Under the premise of physical access, the ability to access Inrtemet's equipment that is open to the public but requires authentication of visitors through authentication is called authenticated access.
  • control signaling is a feature of physical access on the Internet platform through routing, and this feature of the process of telephone mutual authentication is deleted, which is the process of Internet mutual authentication.
  • Figure 14 shows the flow of Internet mutual authentication.
  • the block 114 calls the center, the block 115 executes the response, the block 116 reports the target, the block 117 executes the response, the block 118 reports the object clock, the block 119 executes the response 119, and the block 120 receives
  • the block 121 replies, the block 122 allocates icons, the block 123 ends the mutual identification, and the block 124 performs background layer work.
  • the visits between the main units of the 'OIN(Sh)' network structure are mutual authentication visits.
  • the identity of the visitor is equivalent to the 'OIN-DH' user, and its sub-label device is equivalent to the 'OIN Electronic Card' of 'OIN-DH'; the identity of the interviewee is equivalent to the 'OIN-DH' center, and its identification device is Host equivalent to 'OIN-DH'.
  • Mutual authentication access realizes the access between main units under the security protection of preventing and resisting attacks, that is, realizes the security of each step of e-commerce, thereby realizing the security of e-commerce.
  • Figure 15 shows the Internet mutual authentication e-commerce structure. It includes: user registration 125 , merchandise exhibition 126 , and proxy transaction 127 .
  • the client makes an application.
  • the customer fills in the application documents (including the customer's nationality, residence, name, physical access ability, online account opening bank certificate, account number), and submits to the network business center 105 through Internet mutual authentication of the online account opening bank (application party bank) in the bank group 113.
  • step 129 a contract is signed.
  • the network business center 105 agrees that the customer joins, signs the 'OIN(Sh)' contract, and forwards the 'OI(Sh)' contract to the applicant party through Internet mutual authentication to the applicant party.
  • the applicant client signs the 'OIN(Sh)' contract, and submits to the network business center 105 through the Internet mutual authentication of the applicant party.
  • step 130 an 'OIN Electronic Card' is issued.
  • the network business center 105 receives the 'OI (Sh)' contract, and transfers the 'OIN electronic card' to the applicant client through Internet mutual authentication to the applicant party.
  • the customer receives the 'OIN electronic card', completes the registration, and becomes a user.
  • step 131 file materials are prepared.
  • the users who need to sell goods on the 'OIN(Sh)' fill out the 'OIN(Sh)' exhibition goods contract and prepare the information on the goods on display.
  • a commit is performed.
  • Documents are submitted to the network business center 105 through Internet mutual authentication.
  • the network business center 105 agrees with the seller user 'OIN(Sh)' to sell the goods contract, and submits the signed contract to the seller user through Internet mutual authentication.
  • step 133 an insurance letter of credit for goods on display is issued.
  • the seller user receives the contract that the network business center 105 agrees to sell, it notifies the account opening bank (the seller's party bank) in the bank group 113 through Internet mutual authentication to issue the insurance letter of credit for the goods on display.
  • the seller's party submits the insurance letter of credit issued by the exhibited goods to the network business center through Internet mutual authentication
  • step 134 the network business center and the seller reach a goods exhibition contract.
  • the network business center 105 receives the letter of credit issued by the seller's party, the 'OIN(Sh)' exhibition goods contract becomes effective.
  • the network business center 105 notifies the seller that the user contract becomes effective through Internet mutual authentication.
  • the 'OIN(Sh)' exhibition goods contract is submitted to the contract management center 109 for record.
  • the insurance letter of credit for exhibited goods shall be submitted to 108 of the Letter of Credit Management Center for recordation.
  • step 135 the goods are displayed.
  • the network business center 105 will provide the goods exhibition center 107 with information on the exhibition goods for sale in 'OIN(Sh)'.
  • step 136 the user browses the display center. It is open and does not require authentication.
  • step 137 the user confirms the purchase list.
  • the user (buyer user) in the user group 112 fills in the list of goods purchased by oneself (having the document attribute of the contract for purchasing goods at the same time).
  • step 138 the buyer user notifies the bank to issue the letter of credit.
  • the buyer's user notifies the account opening bank (buyer's party bank) in the bank group 113 to issue the letter of credit through Internet mutual authentication.
  • the network business center receives the buyer's goods list and the bank issues a letter of credit.
  • the buyer user submits the purchased goods list to the network business center 105 through Internet mutual authentication.
  • the buyer's party submits the letter of credit for the purchase of goods to the network business center 105 through Internet mutual authentication.
  • step 140 the network business center and the buyer reach a consignment contract.
  • the network business center 105 receives the list of purchased goods and the letter of credit for purchased goods, the 'OIN(Sh)' contract for purchased goods becomes effective.
  • the network business center 105 notifies both the buyer and the seller that the contract to purchase the goods is effective through Internet mutual authentication.
  • the goods purchase contract is submitted to the contract management center 109 for record.
  • the letter of credit for the purchase of goods is submitted to the letter of credit management center 108 for recordation. Notify the transaction execution center 110 .
  • step 141 a transaction check is performed.
  • the transaction execution center 110 checks the execution status through Internet mutual authentication according to the 'OIN(Sh)' purchase contract.
  • step 142 payment is made. After the execution of the goods purchase contract is correct, the letter of credit for the purchase of goods will be submitted to the seller's party through Internet mutual authentication.

Abstract

The invention adopts man-made fuzzy which includes the original secret-group, internal-state group and group-deduction to implement the mode to which various final flags actual relates when the mode suffered from sorts of attack. The external can only guess many possibilities that belong to the internal, and the run of the internal which cannot be guessed by the external may generate the only relative external final flag which can be transitional and be identified. It provides a series of methods for actual relative mode: secret-layer mode, filtering-layer mode, authorisation-layer mode, level-layer mode, implicit-layer mode, patch mode. It also provides the method for identifying the object. It has many advantages which include security of identification divisions, confident authentication, better aging, simple and convenient running, convenient usage, high performance-price ratio, simple operation, lower cost and wide and flexible application. The occupation of the information network transmission resource and the increment of the consumer burden during the period used reach the least limitation. It can easily implement some advantages for making existing identification system to be perfect.

Description

开放信息网络的模程系列的标识方法 技术领域 Identification method of model series of open information network Technical field
本发.明涉及到信息网络中标识体系软硬件的技术结构建造方法, 即信息网络运行 中使用标志设备识别对方的方法, 简称标识方法, 尤其涉及到开放信息网络向中心申 请服务的对象的标中心识的真实, 首创标对象识的真实、 受到各类各度攻击状况下的 各终识所真实相关的模程、 对现有标识体系的真实相关的安全度的完善的方法。 用户 与其子标设备, 统称对象。 中心工作人员与设备, 统称中心。 背景技术 The present invention relates to the construction method of the technical structure of the software and hardware of the identification system in the information network, that is, the method of using the identification device to identify the other party during the operation of the information network, referred to as the identification method, especially related to the identification of the object that the open information network applies to the center for services. The authenticity of the central identity, the first to mark the authenticity of the object identity, the model of the authenticity of each terminal under various attacks, and the perfect method for the security of the existing identity system. Users and their sub-devices are collectively referred to as objects. Center staff and equipment are collectively referred to as the Center. Background technique
现有的简单标识方法为: 被识别方的标志设备被授予代号与一个密码。 当运行中 需识别自称为某代号的被识别方的标志设备的真伪时, 由识别其密码的正确与否而 定。 常见的应用如银行端机 (ATM机、 POS机)识别所插人的磁条信用卡, 电话卡系 统的主机识别某电话卡用户, Windows NT服务器的安全系统识别来访的工作站。 The existing simple identification method is as follows: The identification equipment of the identified party is given a code and a password. When it is necessary to identify the authenticity of the identification equipment of the identified party claiming to be a certain code during operation, it depends on the correctness of its password. Common applications include bank terminals (ATMs, POS machines) identifying inserted magnetic stripe credit cards, phone card system hosts identifying phone card users, and Windows NT server security systems identifying visiting workstations.
随着网络的部分开放, 现有的更进一步的依据算法与密钥的标识方法, 由 S.Weinstein 博士 1984年 2月在 I E E E上发表, 为: 被识别方的标志设备被授予代 号与一个算法构造保护下的密钥, 可表达为 y=f(x,X()), 其中 ^为密钥。 当运行中需 识别自称为某代号的被识别方的标志设备的真伪时, 由识别方发出一个随机数 X , 双 方都用约定的算法 f, 将随机数 X与密钥 X。运算, 并由识别方收集双方得出的该代号 应具有的运算结果 y , 进行对比, 视被识别方 y的正确与否而定该被识别方标志设备 的真仇 常见的应用如银行端机识别所插入的智能信用卡 (IC卡), GSM移动电话系 统的主机识别某手机用户, 银行计算机网络中主机识别远程来访的附机。 With the partial opening of the network, the existing further identification method based on the algorithm and the key was published by Dr. S. Weinstein on IEEE in February 1984, as: The identification device of the identified party is awarded a code and an algorithm The key under construction protection can be expressed as y=f(x, X() ), where ^ is the key. When it is necessary to identify the authenticity of the identification device of the identified party claiming to be a certain code during operation, the identifying party sends out a random number X, and both parties use the agreed algorithm f to combine the random number X with the key X. operation, and the identifying party collects and compares the operating result y that the code should have obtained by both parties, depending on whether the identified party y is correct or not. Identify the inserted smart credit card (IC card), the host of the GSM mobile phone system identifies a mobile phone user, and the host in the bank's computer network identifies the remote visiting attached machine.
现有的方法适用的网络形态是封闭或部分开放的',在当今网络形态更为开放的状 况下, 上述二类标识方法的子标设备极易被仿冒, 使得仿冒者假借用户的授权侵入网 络, 如 Internet中的黑客( Hacker )与克客( Cracker )的侵入行为、 信用卡的伪卡、 移动通信网的伪机…… , 该信息技术故障产生的标识问题, 严重降低了网络的安全 性, 阻碍了人类社会信息网络的开放进程。 Existing methods are applicable to closed or partially open network forms. In today’s more open network form, the sub-standard equipment of the above-mentioned second type of identification method is very easy to be counterfeited, so that counterfeiters use the user’s authorization to invade the network , such as hacker (Hacker) and cracker (Cracker) intrusions in the Internet, counterfeit credit cards, counterfeit devices in mobile communication networks..., the identification problem caused by this information technology failure seriously reduces the security of the network, It hinders the opening process of the information network of human society.
现有的网络标识安全理论的出发点, 为寻找更严密的算法。 这种认识上的缺陷, 导致了建成的标识体系, 只要被掌握了该算法网络运行规则的要素信息, 即可进行仿 冒。 同时, 使标识方法所占有的网络资源越来越庞大。 The starting point of the existing network identification security theory is to find a more rigorous algorithm. This lack of understanding has led to the established identification system, which can be counterfeited as long as the element information of the algorithmic network operation rules is mastered. At the same time, the network resource occupied by the identification method becomes larger and larger.
1 1
确 认 本 发明内容 Confirm this Contents of the invention
深入进行研究, 可以发现: 开放信息网络中应防范和抵御的攻击, 可来自于用户、 使用环境、.传输过程, 尤其是中心内部人员。 实现仿冒所进行的技术活动, 称闯入式 攻击, 简称攻击。 攻击成功, 称侵 (害介)入。 由于不同的网络被攻击的种类与强度通 常受利耗比规则的约束, 且侵人的危害不同, 故网络中防范和抵御攻击的能力视网络 建造要求而定。 Through in-depth research, it can be found that: The attacks that should be prevented and resisted in the open information network can come from users, usage environment, transmission process, especially the internal personnel of the center. The technical activities carried out to achieve counterfeiting are called intrusive attacks, or attacks for short. If the attack is successful, it is called intrusion. Since the types and intensities of different networks being attacked are usually constrained by the ratio of profit to cost, and the harm of intrusion is different, the ability to prevent and resist attacks in the network depends on the requirements of network construction.
如果能够保护标识体系中各种用于识别自称为某代号的被识别方的标志设备真 伪的标志关系, 且标志关系不遵循算法的约束, 对于保护界面内部而言标志关系是确 定的, 对于保护界面外部而言标志关系是随机的, 并且能够最大限度地节省网络资 源, 则能够实现标识安全, 称模程标识安全理论的出发点, 简称模程构思。 If it is possible to protect the various sign relations in the sign system used to identify the authenticity of sign equipment of the identified party claiming to be a certain code, and the sign relations do not follow the constraints of the algorithm, the sign relations are definite for the inside of the protection interface, and for From the outside of the protection interface, the logo relationship is random, and the network resources can be saved to the maximum, then the logo security can be realized, which is called the starting point of the logo security theory of Mo-Cheng, referred to as Mo-Cai Conception.
本发明的目的之一是, 在网络完全开放的形态下, 提供实现模程构思的技术方 法, 即建立能够有效防御各类各度攻击的标识方法, 实现真实相关, 称模程方法。 One of the purposes of the present invention is to provide a technical method for realizing the modeling concept in a completely open network, that is, to establish an identification method that can effectively defend against various attacks of various degrees, and to realize real correlation, which is called a modeling method.
本发明的目的之二是, 提供不同安全等级、 不同建造难度的模程, 形成系列化方 法。 The second purpose of the present invention is to provide models with different safety levels and different construction difficulties to form a serialization method.
本发明的目的之三是, 各模程方法都能够在现有的各信令制式的网络中, 以除去 不安全相关构造后的现有标识体系的构造为平台, 建立模程为核心结构的新标识体 系, 形成标准化、 通用化特性。 The third purpose of the present invention is that each modular method can be used in the existing networks of various signaling standards, using the structure of the existing identification system after removing the unsafe related structure as a platform, and establishing a modular method as the core structure. The new identification system forms a standardized and generalized feature.
本发明的目的之四是, 低安全等级的标识运行中, 受到违背利耗比规则的恶性攻 击, 导致侵人后, 在真实相关运行中, 可以发出受侵报警。 The fourth purpose of the present invention is that after a vicious attack that violates the profit-to-consumption ratio rule during the operation of the low-security-level sign, and an intrusion is caused, an intrusion alarm can be issued during the real related operation.
本发明的目的之五是, 减少模程方法占有的资源, 提高信价比。 The fifth purpose of the present invention is to reduce the resources occupied by the modeling method and improve the credit-to-cost ratio.
本发明的目的之六是, 模程方法具备自动化应用, 尤其是数字化应用的特性, 减 小用户标识负担, 提高方便性。 The sixth purpose of the present invention is that the modeling method has the characteristics of automatic application, especially digital application, which reduces the burden of user identification and improves convenience.
实现上述目的的前提在于, 提供模程系列的技术结构建造方法, 提供对现有标识 体系的真实相关的安全度的完善方法。 基于模程用于真实相关, 提供标对象识方法。 The premise of realizing the above-mentioned purpose is to provide a technical structure construction method of the modular series, and to provide a perfect method for the real related safety degree of the existing identification system. Based on the model for real correlation, it provides a method for object identification.
为了实现上述目的,本发明提供了一种开放信息网络向中心申请服务的对象的标 中心识方法, 在该方法中, 各自具有广义唯一定的对象与中心相互间广义唯一相关, 实施检识约束下的终中心识, 实现真实认定对象, 该方法还包括以下步骤: 密层模程 唯一确立给定; 在终中心识的读出靶识运行过程中, 密标层实施直接源靶运行。 In order to achieve the above object, the present invention provides a method for identifying the center of the object that the open information network applies for service from the center. In this method, the objects that each have a generalized unique definition and the center have a generalized unique correlation with each other, and the identification constraints are implemented. The method further includes the following steps: the dense layer model uniquely establishes the given; in the process of reading out the target identification operation of the final central knowledge, the dense layer implements the direct source target operation.
在上述方法中, 密层模程可以由滤层模程取代, 在终中心识的读出靶识运行过程 中, 过滤层控制密标层实施间接源靶运行。 In the above method, the dense layer model can be replaced by the filter layer model, and the readout target recognition operation process of the final recognition Among them, the filter layer controls the code layer to implement the indirect source-target operation.
在上述方法中, 密层模程还可以由权层模程取代, 在休止期, 授权层控制密标层 源变。 In the above method, the dense layer model can also be replaced by the weight layer model, and during the rest period, the authorization layer controls the source change of the secret layer.
在上述方法中, 密层模程还可以由级层模程取代, 在休止期, 级权层控制授权层 构造变。 In the above method, the dense layer model can also be replaced by the hierarchical model, and in the rest period, the structure of the authority layer controls the authority layer changes.
在上述方法中, 密层模程还可以由隐层模程取代, 隐埋层陷埋像标并提供虚拟标 给所需层。 In the above method, the dense layer model can also be replaced by the hidden layer model, which embeds the icon and provides the virtual label to the required layer.
在上述方法中, 密层模程还可以由修补模程取代。 In the above method, the dense model can also be replaced by the repair model.
本发明还提供了一种开放信息网络向中心申请服务的对象的标对象识方法,在该 方法中, 各自具有广义唯一定的对象与中心相互间广义唯一相关, 并且该方法还包括 以下步骤: 模程用于对象与中心间互为狭义唯一可运行的相关, 形成真实相关; 在对 象子标设备中建有终识; 实施申识约束下的终对象识, 实现使用模程系列方法的真实 认定中心。 建立模程结构标识体系的理论基础与基本定义 The present invention also provides an object identification method for objects that apply for services from the center through an open information network. In the method, the objects that each have a generalized unique definition are related to each other in a generalized and unique manner with the center, and the method also includes the following steps: The model is used for the only operable correlation between the object and the center in a narrow sense to form a real correlation; there is a final knowledge in the object sub-label device; the final object recognition under the constraints of the recognition is implemented to realize the real using the model series method Identify the center. Theoretical Basis and Basic Definition of Establishing Modular Structural Identification System
由于本发明标识方法的理论体系是全新创立的,所以以下将详细描述建立该标识 体系所必须涉及的理论基础与基本定义, 并用新的标识体系审视现有的标识方法。 Since the theoretical system of the marking method of the present invention is newly created, the following will describe in detail the theoretical basis and basic definitions involved in establishing the marking system, and examine the existing marking methods with the new marking system.
物体或物体间产生事件, 事件或事件间衍生的事件, 统称事件。 事件, 物体, 统 称事物。 各事物相互间是可区分的, 称事物广义唯一; 各事物被约定具有各自的标志, 且各标志相互间是可区分的, 称标志广义唯一。 基于广义唯一, 若存在一事物, 则不 存在与其相同的其它事物, 称事物狭义唯一; 若存在一事物被约定的标志, 则不存在 其它事物被约定与其相同的标志, 称标志狭义唯一。 事物、 标志的广、 狭义唯一, 分 别合称事物、 标志唯一, 统称唯一。 两个以上事物相 S间具有某种关系, 称相关。 基 于唯一, 一事物存在被约定的标志, 另一事物具有与该一事物的约定关系, 因而具有 该被约定的标志, 称标志唯一相关; 基于标志唯一相关, 一事物存在对应事件, 另一 事物因而具有该对应事件, 且对应事件将引起被约定标志的变迁, 称对应唯一相关, 标志、 对应的广、 狭义唯一相关, 分别合称标志、 对应唯一相关, 统称唯一相关。 进 而基于唯一相关, 该两事物间若存在另一事物对一事物相关标志的运行识别, 则不存 在各与其它事物间相同的运行识别, 称标识真实。 相互间的互为唯一相关, 称真实相 关。 基于真实相关, 可相互间的标识真实, 称互标识真实。 一事物与其它事物间运行 识别广、 狭义的唯一标志的结论, 是一事物对其它事物的真实认定; 该一事物被其它 事物中的真实相关事物再运行识别狭义的唯一标志 (等效于识别真实关系)的结论, 是 其它事物中的真实相关事物对该一事物的再真实认定; 真实认定, 再真实认定, 称互 真实认定。 各物体、 事件间占有或建立、 约定、 分布、 存在的关系延伸形成的路由, 称路。 路的片段, 称程。 Events generated by objects or objects, and events derived from events or events are collectively referred to as events. Events, objects, collectively referred to as things. All things are distinguishable from each other, which is said to be broadly unique; all things are agreed to have their own marks, and each mark is distinguishable from each other, which is called broadly unique. Based on uniqueness in a broad sense, if there is a thing, there is no other thing that is the same as it, which is called uniqueness in a narrow sense; if there is a sign that a thing is agreed upon, then there is no sign that other things are agreed to be the same, it is called uniqueness in a narrow sense. The broad and narrow meanings of things and signs are unique, respectively collectively referred to as unique things and signs, collectively referred to as unique. There is a certain relationship between two or more things, which is called correlation. Based on the uniqueness, one thing has an agreed mark, and another thing has an agreed relationship with the one thing, so it has the agreed mark, which is called the unique correlation of the mark; based on the unique correlation of the mark, one thing has a corresponding event, and the other thing Therefore, there is the corresponding event, and the corresponding event will cause the change of the agreed sign, which is called the corresponding unique correlation. The sign, the corresponding broad and narrow sense unique correlation, are collectively called the symbol and the corresponding unique correlation, collectively called the unique correlation. Furthermore, based on the unique correlation, if there is another thing between the two things that recognizes the operation of a related symbol of one thing, then there is no identical operation recognition between the other things, which is called authenticity. The mutual unique correlation is called true correlation. Based on the real correlation, they can identify each other as real, which is called mutual identification of real. running between one thing and other things The conclusion of identifying the only sign in the broad and narrow sense is the true identification of one thing on other things; the conclusion of identifying the only sign in the narrow sense (equivalent to identifying the real relationship) by the real related things in other things is The re-authentic identification of the real related things among other things; the authentic identification and the re-authentic identification are called mutual authentic identification. The route formed by the extension of the relationship of possession or establishment, agreement, distribution, and existence between objects and events is called a road. A segment of the road is called Cheng.
具有对象的约定特征信息的符号及码的组, 作为可运行的数码标志, 称标, 符、 号、 码、 标、 集、 群, 区分为: (秘)密, 公(开)。 密, 区分为: 确立期产生的, 称原始 密; 运行期模程内产生的, 称运行密; 运行期模程外产生的具有对象的约定特征信息 的符号及码的组, 经模程内隐埋后, 消灭其透明所导致的公开性, 称虚拟密。 运行、 虚拟密, 合称环境密。 The group of symbols and codes with the agreed characteristic information of the object, as an operable digital symbol, is called a symbol, a number, a code, a symbol, a set, and a group, and is divided into: (secret) secret, public (open). The secrets are divided into: the ones generated during the establishment period are called original secrets; the ones produced during the running period are called running secrets; the groups of symbols and codes with the agreed characteristic information of objects produced outside the running period are passed through the internal After hiding, the openness caused by its transparency is eliminated, which is called virtual encryption. Operation and virtual secrets are collectively called environmental secrets.
固定的公标, 称定, 广义唯一相关分配给对象与中心, 形成对象索引号, 用于对 象的编号、 帐号、 资料代号等; 形成中心服务号, 用于中心的编号、 名称代号等。 Fixed public standards, defined, and generalized unique correlation are assigned to objects and centers to form object index numbers, which are used for object numbers, account numbers, data codes, etc.; form center service numbers, which are used for center numbers, name codes, etc.
外在只可猜测内在的多种可能, 内在的不可被外在捉摸的运行可产生狭义唯一相 关并变迁可识的外在终, 称人为模糊, 是对特定程的屏蔽所实现的内在不透明。 被屏 蔽的程, 称模程, 唯一确立给定, 用于各自具有广义唯一定的对象与中心间互为狭义 唯一可运行的相关, 形成真实相关。 The exterior can only guess the many possibilities of the interior, and the inner operation that cannot be elusive by the exterior can produce a narrowly uniquely related and changeable exterior end, which is called fuzziness, which is the inner opacity realized by the shielding of a specific process. The masked process is called the modular process, which uniquely establishes a given, and is used for the objects and centers with their respective broad-sense unique definitions to be the only operable correlation in the narrow sense with each other, forming a real correlation.
标中心识: 中心检索对象提供的定, 识别广义唯一关系, 称检识。 对象与中心两 个相关模程产生的最终的标, 称终, 用于中心识别提供终的对象是否具备狭义唯一关 系, 即用于中心识别提供索引号的对象的广义唯一关系的是否真实, 称终中心识。 实 施检、 终中心识, 用于所识方法的安全保障, 形成标中心识的真实: 确认对象提供的 终是否正确, 即可实现审核对象是否具备唯一相关, 其结论, 是中心对于对象的真实 认定。 Index central identification: The identification provided by the central retrieval object, which identifies the generalized unique relationship, is called identification. The final index generated by the two related modules of the object and the center is called the end, which is used for the center to identify whether the object provided with the end has a narrow unique relationship, that is, whether the generalized unique relationship used for the center to identify the object that provides the index number is true, called ultimate awareness. The implementation of inspection and final identification is used to ensure the safety of the identification method and form the authenticity of the identification of the identification: to confirm whether the identification provided by the object is correct, you can realize whether the audit object has unique correlation, and the conclusion is the authenticity of the object by the center identified.
标对象识: 对象向约定服务号的中心申请服务, '获得应答, 识别广义唯一关系, 称申识。 对象识别提供终的中心是否具备狭义唯一关系, 用于识别提供服务号的中心 的广义唯一关系的是否真实, 称终对象识。 实施申、 终对象识, 用于所申请服务方法 的安全保障, 形成标对象识的真实: 确认中心提供的终是否正确, 即可实现审核中心 是否具备唯一相关, 其结论, 是对象对于中心的真实认定。 Marked object identification: The object applies for a service to the center of the agreed service number, 'obtains a response, and identifies a generalized unique relationship, which is called application identification. The object identifies whether the center that provides the terminal has a narrow unique relationship, and whether the generalized unique relationship used to identify the center that provides the service number is true is called terminal object identification. Implement application and final object identification, which is used to ensure the security of the applied service method, and form the authenticity of the marked object identification: confirm whether the terminal provided by the center is correct, and then realize whether the audit center has unique correlation. The conclusion is that the object is related to the center true identification.
标对象识实现防陷井, 比如使用小交换机的中心仿真的侵人。 由于终对象识是基 于真实相关的执行读出靶识任务, 具体方法是基于真实相关的终中心识的执行读出靶 识任务的界面镜像, 不同之处: 中心的终识由对象的终识取代, 故在其它的论述中隐 去。 Tag object identification implements anti-trap, such as intrusion using central emulation of branch exchange. Since the final object recognition is based on the real-related execution of the read-out target recognition task, the specific method is the interface mirroring of the execution of the read-out target recognition task based on the real-related final central knowledge. substituted, so implicit in other discourses go.
检、 申识, 统称初识; 终中心、 对象识, 统称终识; 初、 终识, 统称标识。 现有的终中心识所相关的密标方法与模程为: 单一密标方法 (前述简单标识方 法), 明残模程 (前述更进一步的依据算法与密钥的标识方法, 由 S.Weinstein 博士发 表)。 Inspection and application are collectively referred to as primary consciousness; final center and object consciousness are collectively referred to as final consciousness; primary and final consciousness are collectively referred to as identification. The existing cryptographic methods and modules related to the final central identification are: single cryptographic method (the aforementioned simple identification method), clear and residual modulus (the aforementioned further identification method based on algorithms and keys, developed by S.Weinstein published by Dr.
屏蔽单一元构造存储单一密标, 形成单一密状况的不安全唯一相关, 也称单一相 关, 内运行是密写入元与读元成靶, 密标形成的内靶是单一鉴 (别初识的真实的)标, 称单一密标方法。 Shielding a single unit structure to store a single code, forming an unsafe unique correlation of a single code state, also known as a single correlation, the internal operation is the target of the encryption writing unit and the reading unit, and the inner target formed by the secret code is a single identification (identification The real) mark, called single secret mark method.
屏蔽单一固元构造存储单一固定的原始密标与执行算法的公构造,形成单一固定 内状况的不安全真实相关。 读出靶识依据的内状况外相关是: 单一寄元构造寄存同次 使用期由外部动态置入的唯一随机数, 执行算法的构造同次使用期读密标, 与随机数 运算, 产生单一变元构造寄存的单一运行密标, 提供单一模程运行密标状况。 读变元 内单一运行密标形成的内靶是单一鉴标, 提供终识。 该模程内在的原始密标与动态置 入外信息编码经算法构造的运行可产生广义唯一相关与变迁的可识别的外在终, 残缺 不可被外在捉摸的原始密群与内状况群, 外透明的随机数与单一内状况决定模程运行 密标单一基准状况, 简称明残模程。 Shielding a single fixed element structure stores a single fixed original code and executes the public structure of the algorithm, forming an unsafe real relationship within a single fixed internal state. The internal status and external correlation of the basis for reading the target are: a single register structure registers a unique random number that is dynamically inserted from the outside during the same use period, and the construction of the execution algorithm reads the encrypted token during the same use period, and operates with the random number to generate a single The variable constructs the stored single-run key and provides the status of the single-mode run key. The inner target formed by a single run key in the read variable is a single identification, providing final knowledge. The internal original secret code and the dynamic embedded external information code of the model can produce the recognizable external end of the generalized unique correlation and change through the operation of the algorithm construction, and the incomplete original dense group and internal state group that cannot be grasped externally. Externally transparent random numbers and a single internal condition determine a single benchmark condition for the operation of the model, referred to as the transparent model.
单一密标方法, 明残模程, 都不能防御攻击, 受到各种类各强度攻击, 将产生不 安全相关被侵人, 导致标中心识防御侵入失效。 是这样实现的: A single encryption method and a clear model cannot defend against attacks. Attacks of various types and intensities will cause unsafe related victims, resulting in the failure of the logo center defense intrusion. It is implemented like this:
单一密标方法的鉴标被侦截、 记录、 窃取, 可直接形成解密。 明残模程的随机数、 鉴标在传输过程被侦截、 记录, 依据协议公开的同一算法进行相应逆运算, 可产生原 始密标, 解除不透明的屏蔽, 侵人模程; 或通过信息流程模仿、 或原始密标被窃取的 侵入模程。 都可产生盗用某定及其单一、 原始密标建立对象的匪伪关系, 破坏不安全 相关保障下的标志广义唯一的真实, 导致标中心识的'不真实, 其结论是中心对于对象 的不真实认定。 The identification of a single encrypted label method can be intercepted, recorded, and stolen, and can be directly decrypted. The random number and identification mark of the clear model are intercepted and recorded during the transmission process, and the corresponding inverse operation is performed according to the same algorithm disclosed in the protocol, which can generate the original encrypted mark, remove the opaque shield, and intrude into the model; or through the information flow An intrusion module that imitates or steals the original code. All of these can lead to the misappropriation of a certain and its single, original secret mark to establish the banditry relationship of the object, destroying the only authenticity of the mark under the guarantee of insecurity, and leading to the untrue identity of the mark center. true identification.
本发明提供了模程用于真实相关的系列方法: The present invention provides a series of methods for modeling the real correlation:
1. 密层模程。 1. Dense layer model.
2. 滤层模程。 2. Filter layer model.
3. 权层模程。 3. Weight layer model.
4. 级层模程。 4. Hierarchical models.
5. 隐层模程。 提供了对现有标识体系的真实相关的安全度的完善的方法, 其中的全部修补、 升 级, 是从完善的角度应用了模程系统方法。 5. Hidden layer model. It provides a perfect method for the real-related security degree of the existing identification system, in which all repairs and upgrades are based on the application of the model system method from the perspective of perfection.
基于模程用于真实相关, 提供了标对象识方法。 Based on the model for real correlation, a method for labeling object identification is provided.
本系列模程是这样实现的: This series of models is implemented as follows:
模程的内外界面为物理屏蔽, 程中的信息, 依据的状况, 经数据运行产生唯一相 关变迁与可识的内靶, 称内环境。 确立后数据过滤通道拒绝非靶访问, 靶是一种内外 界面数据规格。 本发明的模程的内环境由原始密群、 内状况群及群演绎组成。 (参考实 施例部分图 2的论述, 可更透彻的理解内环境的涵义。 ) The internal and external interfaces of the model are physically shielded, and the information in the process is based on the situation. After the data is run, the only relevant changes and identifiable internal targets are generated, which is called the internal environment. After establishment, the data filtering channel rejects non-target access, and the target is a kind of internal and external interface data specification. The internal environment of the model of the present invention is composed of the original dense group, the internal state group and the group deduction. (Refer to the discussion in Figure 2 in the embodiment section to understand the meaning of the internal environment more thoroughly.)
产生原始密的符码组, 称符码组生成; 各符码组中非特征信息的原始密压缩或删 改, 称符码组处理; 符码组形成标规格, 称原始密标, 集合成原始密集。 排列各集中 元素的顺序, 称排序。 各集经排序, 产生群。 密标的集、 群, 分别简称密集、 群。 The code group that generates the original code is called code group generation; the original code compression or deletion of non-characteristic information in each code group is called code group processing; dense. Arranging the order of the elements in each set is called sorting. The sets are sorted to produce clusters. The set and group of dense labels are referred to as dense and group respectively.
承载、 传输、 控制、 处理信息的功能单元, 统称构造, 区分为模程内、 外的构造。 外构造是在开放信息网络的平台上, 系统实现现有的标 (中心)识体系技术对本发明的 支持。 Functional units that carry, transmit, control, and process information are collectively referred to as structures, and are divided into internal and external structures. The external structure is on the platform of the open information network, and the system realizes the support of the present invention by the existing identification (central) identification system technology.
内构造依据作用区分为层: 各层对于内构造是可建筑的, 即内构造的相应功能单 元部分被划分为相应层。 各层可动态置入外信息编码并相互间可访问。 The internal structure is divided into layers according to the functional area: each layer is buildable for the internal structure, that is, the corresponding functional unit parts of the internal structure are divided into corresponding layers. Each layer can dynamically insert external information codes and be accessible to each other.
模程内承载、 直接包裹密群及使用期实时工作的内构造部分, 称密标层, 或称实 时层。 模程内非密标层的各内构造部分, 依据工作时期, 区分为: 使用期也实时参与 工作, 也称实时层; 休止期参与, 工作在脱网后进行, 其不占用信息网络传输资源、 不增大使用期用户负担, 称背景层。 或依据工作性质, 区分为: 与密标层紧密相关, 称相关层; 仅背景提供模程内外数据交往, 称隐埋层。 执行过滤、 内靶任务的背景相 关层, 称内靶层; 执行被管辖层状况更新任务的背景相关层, 称权层。 权层区分为: 授权、 级权层。 The internal structure part of the module that carries, directly wraps dense groups, and works in real time during use is called the dense layer, or the real-time layer. According to the working period, the internal structural parts of the non-confidential label layer in the model are divided into: the use period also participates in the work in real time, also known as the real-time layer; the rest period participates, the work is carried out after being off-network, and it does not occupy information network transmission resources , does not increase the burden on users during the service period, and is called the background layer. Or according to the nature of the work, it can be divided into: closely related to the code layer, called the related layer; only the background provides data exchange inside and outside the model, called the hidden layer. The context-related layer that performs filtering and internal target tasks is called the internal target layer; the background-related layer that performs the status update task of the governed layer is called the weight layer. The right layer is divided into: authorization, level right layer.
层内容纳数据群并经读运行可产生各设定关系数据单位的源泉, 称源。 组成源的 系统硬件构造部分, 称源构造; 未容纳数据群的源构造, 称空源。 层内功能单元依据 硬软件形态, 形成的系统构造中除去源构造、 相关原始密数据群的运行可产生唯一变 迁数据的部分, 称层内运行构造。 源与层内运行的构造, 合称层内构造。 源中数据单 位的存储单元, 称元; 设置顺序区分元集中各元的各唯一代码, 称号。 (参考实施例部 分图 4 - 6的论述, 有助于区分存储器与源的差异。 )被存储的数据单位区分为: 标, 指令; 其源默认的分别称 ·. (某)源, 指令表。 内构造的某稳定事件时刻延续形成的特征过程中,抽去其中的时间因素浓缩成的 确定事件, 统称状况, 区分为: 信息存在形态形成的, 称信息状况; 符码排序形成的, 称排序状况; 构造硬件形成的与运行相关的, 称硬件状况; 各层内源构造存储各自数 据群形成的, 称存储数据状况; 各层内源构造存储各自指令表形成的, 称构造状况; 各层内静态的数据驱动各自构造形成的, 称实时处理状况; 上述各状况间访问、 被依 据与特征描述形成的, 称运行状况。 各层内各状况依据与可识的内靶的相关作用, 区 分为: 融化进内靶, 称可识状况; 独立于内靶而存在, 称不可识状况。 The layer contains the data group and can generate the source of each setting relationship data unit after reading and running, which is called the source. The part of the system hardware structure that makes up the source is called the source structure; the source structure that does not accommodate the data group is called the empty source. In the system structure formed by the functional units in the layer according to the form of hardware and software, the part in which the source structure and the operation of the related original secret data group can produce unique transition data is called the operating structure in the layer. The source and the structure running in the layer are collectively called the structure in the layer. The storage unit of the data unit in the source is called a unit; the setting order distinguishes each unique code of each unit in the unit set, called a title. (Refer to the discussion in Figures 4-6 in the embodiment section, which helps to distinguish the difference between the memory and the source.) The stored data units are divided into: mark, instruction; the default sources are respectively called (some) source, instruction table . In the characteristic process of a stable event in the internal structure, the definite events that are condensed by removing the time factor are collectively referred to as the situation, and can be divided into: those formed by the existence of information are called information conditions; those formed by the sorting of symbols are called sorting Status; The information related to operation formed by structural hardware is called the hardware status; The internal source structure of each layer stores its own data group, which is called the stored data status; The internal source structure of each layer stores its own instruction table, which is called the structural status; Each layer The internal static data driven by each structure is called the real-time processing status; the above-mentioned statuses are accessed, formed according to the basis and characteristic description, called the running status. Each situation in each layer is distinguished according to its correlation with the identifiable internal target: the cognizable state is melted into the internal target; the non-recognizable state exists independently of the internal target.
各原始密数据单位在运行期中的性质, 称属性, 体现在相关码或密标、 符码的属 性状况。 密标层指定 (号)状况读元时, 层内构造除去指定状况形成的其余直接被依据 的确定状况, 称基准状况, 区分为: 号群硬件状况、 密群状况。 源中存储原始密群的 状况, 称满源, 是形成的第一个基准状况。 The properties of each original encrypted data unit during the operation period are called attributes, which are reflected in the attribute status of the relevant codes or encrypted symbols and symbol codes. When reading the specified (number) status of the encrypted label layer, the internal structure of the layer removes the specified status and forms the other directly based on the determined status, which is called the reference status, which is divided into: number group hardware status, dense group status. The state of storing the original dense group in the source is called the full source, which is the first base state formed.
密标层中运行构造及动态置入外信息编码的限定源, 产生读源时指定号、 相关码 属性状况的限定元, 形成读元的唯一相关。 基准状况的条件下, 导致实施读出所取的 密标形成的内靶的唯一相关。 指定号状况是各模程中源的必要状况, 各指定号状况伴 随指定相关码属性状况、 指定号状况变伴随指定相关码属性状况的变换的群一致是各 模程中默认的必要规律。 基准、 指定状况, 合称源状况, 其各自变迁的唯一相关, 都 是模程的可识状况。 In the encrypted label layer, the finite source of the operating structure and dynamic insertion of external information coding generates the finite element of the specified number and related code attribute status when reading the source, forming the unique correlation of the reading element. Under the conditions of the reference condition, the implementation leads to the unique correlation of the inner target formed by reading the secret mark taken. Designated number status is the necessary status of sources in each module, and the group consistency of each designated number status accompanied by designated related code attribute status, and designated number status with the change of designated related code attribute status is the default necessary rule in each module. The baseline, the specified state, collectively called the source state, and the only relation of their respective transitions, are the recognizable states of the model.
指令状况是一种运行构造形成的实时处理状况, 其变迁的唯一相关, 是模程的不 可识状况。 指令状况是密标层依据源状况实施读在相关层中的模仿形成的。 The command state is a real-time processing state formed by the running structure, and the only correlation of its change is the unrecognizable state of the model. The instruction state is formed by the imitation of the cryptogram layer reading in the relevant layer according to the source state.
内靶层内指令状况, 称背景过滤状况, 经层内背景运行决定运行密数据单位属性 状况, 在内靶中的直接作用由运行密数据单位属性状况限定密标层唯一实施读出所取 的密标串, 导致被过滤变迁成运行密内靶数据寄存在数据过滤通道体现。 The status of instructions in the inner target layer is called the background filtering status. The status of the operating secret data unit attribute is determined by the background operation in the layer, and the direct effect in the inner target is determined by the status of the operating secret data unit attribute. The encrypted token string causes the filtered transition to run encrypted target data stored in the data filtering channel.
存储的原始密群固定的源, 称固源; 存储的密群'变迁的源, 称变源; 存储的原始 密群用于应急的固、 变源, 称备源; 具有固、 变源的模程可同样具有备源。 The stored original dense group fixed source is called solid source; the stored dense group’s changing source is called variable source; the stored original dense group is used for emergency fixed and variable sources and is called backup source; Modules can also have backup sources.
授权层内指令状况, 称背景直接状况, 经层间运行决定环境密群数据, 存储进变 源, 产生环境密群状况, 在可识状况中的直接作用由环境密群状况体现。 The instruction status in the authorization layer is called the background direct status. The environment dense group data is determined through inter-layer operation, and the input source is stored to generate the environmental dense group status. The direct role in the recognizable status is reflected by the environmental dense group status.
级权层内指令状况, 称背景间接状况, 经层间运行决定密标层源变依据的指令变 迁成环境密指令数据, 存储进指令表, 产生环境密构造状况, 其在可识状况中的间接 作用由环境密构造状况产生环境密群状况体现。 其直接作用由环境密构造状况体现。 The instruction status in the hierarchical level is called the background indirect status. The instruction based on the source change of the encrypted label layer is determined by the inter-layer operation to change into the environmental encryption instruction data, which is stored in the instruction table to generate the environmental encryption structure status. Its status in the recognizable status The indirect effect is reflected by the state of environmental dense structure resulting in the state of environmental dense group. Its direct effect is reflected by the dense structure of the environment.
各次使用期, 对象网络运行的相关唯一轨迹的特征信息, 称像。 像的信息编码组 成的标, 称像标。 实施内状况变所需使用的虚拟密信息编码, 具有标的格式, 称虚拟 (密)标, 取自于异次使用期的像标群。 Each use period, the characteristic information of the unique trajectory related to the operation of the object network is called image. information encoding group The finished mark is called the image mark. The virtual secret information code needed to implement internal state changes has a standard format, which is called a virtual (secret) standard, which is taken from a group of pixels of different usage periods.
隐埋层管理动态寄存的像标, 指定本号状况将像标存储、 代替进像元, 潜伏成异 次使用期传输的像标, 形成像群状况, 是各像标形成的像群在各休止期的密标层密群 状况模仿。 像基准状况的条件下, 层中运行构造及动态置人像标的限定源, 产生读源 时各指定客号、 相关码属性状况的限定各元, 形成读各元的唯一相关, 是密标层指定 状况各次模仿。 像群、 指定客号、 相关码属性状况, 形成单一隐埋状况, 是各次使用 期密标层源状况各次模仿; 指定客号状况的排序步进, 导致有序产生各单一隐埋状 况, 形成多重隐埋状况; 单一、 多重隐埋状况的内靶层功能模仿, 实时过滤, 产生复 合隐埋状况; 各复合隐埋状况有序产生群隐埋状况。 各隐埋状况是一种运行状况, 其 变迁唯一相关, 是模程不可识的状况, 称背景虚拟状况。 依据隐埋状况提供虚拟标给 所需层, 取代同次使用期直接动态置人的像标; 提供虚拟标群给所需层, 取代备源提 供的原始密群。 经层间运行决定被提供了虚拟标的数据形成的各状况, 其在可识状况 中的直接作用由虚拟密内靶、 群、 构造、 各层内指定状况体现。 The buried layer manages the dynamically registered icons, stores and replaces the icons into the pixel by specifying the status of the number, and latently becomes the icons transmitted in different times of use, forming the status of the image group, which is the image group formed by each icon in each Simulation of the dense group state of the dense mark layer in the resting period. Under the conditions of image reference conditions, the limited source of the operation structure and dynamic setting of the image target in the layer generates the limited elements of the specified customer number and related code attribute status when reading the source, forming the only correlation of each element read, which is specified by the encrypted label layer The situation is simulated each time. The image group, designated customer number, and related code attribute status form a single hidden status, which is the imitation of the source status of the encrypted label layer for each use period; the sorting and stepping of the status of the designated customer number leads to the orderly generation of each single hidden status , forming multiple burial conditions; single and multiple burial conditions of the inner target layer function imitation, real-time filtering, resulting in a composite burial situation; each composite burial situation generates a group of burial conditions in an orderly manner. Each hidden state is a kind of operating state, and its change is uniquely related, and it is a state that is unknown to the model, called the background virtual state. Provide virtual markers to the required layer according to the buried status, replacing the image markers directly and dynamically placed in the same period of use; provide virtual marker groups to the required layers, replacing the original secret group provided by the backup source. Each situation formed by the provided virtual target data is determined through inter-layer operation, and its direct role in the identifiable situation is reflected by the virtual dense inner target, group, structure, and specified situation in each layer.
读各元时, 各层内各状况的不同, 由双方脱网的各层内构造依据层内与层间规律 经层内与层间运行产生各原静态数据的变迁, 历经动态数据过程后, 再形成新静态数 据; 各新静态数据驱动各自构造, 导致形成各状况的变迁, 称内状况变。 动态置入的 像标参与内状况变, 称内外相关。 内状况变、 内外相关, 称状况变, 区分为: 号变, 属性变, 源变, 构造变, 隐埋变。 When reading each element, the situation in each layer is different, and the internal structure of each layer that is off-networked by both parties generates changes in the original static data through the operation of the layer and between layers according to the rules within and between layers. After going through the process of dynamic data, Then form new static data; each new static data drives their respective structures, leading to the formation of changes in each state, which is called internal state change. Dynamically placed icons participate in internal state changes, which is called internal and external correlation. Internal state change and internal and external correlation are called state change, which can be divided into: number change, attribute change, source change, structure change, and buried change.
指定状况经密标层管理与调用、 动态置人参与其运行的修整, 形成的号群中被指 定号、 相关码属性状况变迁, 简称号变。 The assigned status is managed and invoked by the secret label layer, and people are dynamically placed to participate in the modification of its operation. In the formed number group, the assigned number and the related code attribute status change, referred to as number change.
指令状况经内靶层管理与调用、 动态置入参与其运行的修整, 形成的密标串中密 标、 符码属性 (数据单位属性)状况变迁, 简称属性变。' The state of the command is managed and invoked by the inner target layer, and dynamically inserted to participate in the trimming of its operation. In the formed code string, the status of the code and symbol attribute (data unit attribute) changes, referred to as attribute change. '
指令状况经授权层管理与调用、 动态置人参与其运行的修整, 导致的变源中密群 状况变迁形成基准状况变迁, 简称源变。 The command status is managed and invoked by the authorization layer, and people are dynamically placed to participate in the modification of its operation, resulting in the change of the dense group status in the source of change to form the benchmark status change, referred to as the source change.
指令状况经级权层管理与调用、 动态置入参与其运行的修整, 导致的背景直接状 况直接被依据的基础状况变迁形成授权层内构造变迁, 简称构造变。 基础状况是基准 状况在相关层中的模仿。 The instruction status is managed and invoked by the authority layer, and dynamically inserted to participate in the modification of its operation. The resulting background direct status is directly changed by the underlying basic status to form a structural change in the authorization layer, referred to as a structural change. The base state is the imitation of the base state in the relevant layers.
隐埋状况经隐埋层管理与调用、 动态置入参与其运行的修整, 导致的像源中像群 状况变迁形成像基准状况变迁、 指定客号与相关码属性状况变迁, 简称隐埋变。 各层内各状况历经状况变形成更新的各自状况, 称状况更新, 历经状况变前、 后 的状况, 分别称原、 新状况。 有效期内各层内各状况的不断更新, 状况与变相关循环, 形成动态的状况集合并排序, 称内状况群。 The buried status is managed and invoked by the hidden layer, and dynamically inserted to participate in the modification of its operation, resulting in the change of the image group status in the image source, which is the change of the imaging reference status, the status change of the designated customer number and the related code attribute, referred to as the buried change. Each state in each layer undergoes state change to update its respective state, which is called state update, and the state before and after the state change is called the original state and the new state, respectively. During the validity period, the conditions in each layer are continuously updated, and the conditions and changes are related to a cycle to form a dynamic set of conditions and sort them, called the internal condition group.
标志广义唯一相关的约束下, 原始密群、 内状况群中约定的数据运行, 导致的状 况变迁、 确定, 产生变迁与可识的狭义唯一相关的内靶, 称群演绎。 Under the constraints of the generalized unique correlation, the agreed data operation in the original dense group and the internal state group leads to the change and determination of the state, and the change and the identifiable narrow uniquely relevant internal target are called group deduction.
内环境由密标层组成的模程, 称密层模程; 由密标层及内靶层组成的模程, 称滤 层模程; 由密标层及授权层或密标层、 内靶层及授权层组成的模程, 分别称二权层或 三权层的模程, 都称权层模程; 由密标层、 授权层及级权层或密标层、 内靶层、 授权 层及级权层组成的模程, 分别称三级层或四级层的模程, 都称级层模程; 由密标层及 隐埋层或密标层、 内靶层及隐埋层或密标层、 授权层及隐埋层或密标层、 内靶层、 授 权层及隐埋层或密标层、 授权层、 级权层及隐埋层或密标层、 内靶层、 授权层、 级权 层及隐埋层组成的模程, 分别称二隐层或三滤隐层或三权隐层或四滤隐层或四权隐层 或五隐层的模程, 都称隐层模程。 内环境中密标层是必要的层。 A model whose internal environment is composed of a dense layer is called a dense layer model; a model composed of a dense layer and an inner target layer is called a filter layer model; a model consisting of a dense layer and an authorization layer or a dense layer and an inner target The model composed of layer and authorization layer is respectively called the model of the second layer or the third layer of authority, and they are all called the model of the authority layer; it consists of the secret label layer, the authorization layer and the hierarchical authority layer or the secret label layer, the inner target layer, and the authorization layer. The model composed of layer and hierarchical layer is called the model of three-level layer or four-level layer respectively, and they are all called layer-level model; or cryptographic layer, authorization layer and hidden layer or cryptographic layer, inner target layer, authorization layer and buried layer or cryptographic layer, authorization layer, hierarchy layer and buried layer or cryptographic layer, inner target layer, The model composed of authorization layer, hierarchical weight layer and hidden layer is called two hidden layer or three filter hidden layer or three weight hidden layer or four filter hidden layer or four weight hidden layer or five hidden layer. Hidden layer model. The encryption layer is a necessary layer in the internal environment.
将隐埋层、 内靶层修补在现有明残模程的靶入、 出口处, 加以再屏蔽; 将密标层 修补在现有明残模程的总线上, 可将原有的元设置号并纳人源; 将授权层、 级权层提 供层内指令状况的构造修补在现有明残模程的执行算法的构造上, 并将原有的执行算 法构造的指令系统改建成授权层、 级权层的全兼容指令系统, 组成授权层、 级权层。 Repair the hidden layer and the inner target layer at the target entry and exit of the existing clear residual model, and then shield them; patch the dense label layer on the bus of the existing clear residual model, and the original element setting number can be merged Incorporate human resources; Repair the structure of the instruction status provided by the authorization layer and the authority layer on the structure of the execution algorithm of the existing clear model, and transform the instruction system constructed by the original execution algorithm into an authorization layer, authority level The fully compatible instruction system of the layer constitutes the authorization layer and the hierarchy layer.
上述修补利用现有子标、 中心设备的明残模程构造、 支撑平台, 实现已有资源利 用下对现有明残模程标识体系的真实相关的安全度的修补性提高, 简称修补。 修补形 成的模程, 称修补模程。 The above-mentioned repair utilizes the existing sub-standards, the clear model structure of the central equipment, and the support platform to realize the improvement of the real-related safety degree of the existing clear model identification system under the utilization of existing resources, referred to as repair. The model formed by repairing is called repairing model.
修补形成'的模程内环境是密层以上各模程密标层中的源简化为元、授权层内运行 构造简化为执行算法构造, 达到提高明残模程构造、 运行复杂度, 修补性提高修补模 程相对于明残模程的总体性价比; 损失了密层以上各 程的真实相关的安全度, 降低 构造复杂度, 内环境未达到各模程内环境。 称部分修补。 The internal environment of the model formed by repairing is that the source in each model code layer above the dense layer is simplified to elements, and the operation structure in the authorization layer is simplified to the execution algorithm structure, so as to improve the clear model structure, operation complexity, and repairability Improve the overall cost-effectiveness of the repaired model compared to the exposed residual model; lose the real-related safety of each process above the dense layer, reduce the complexity of the structure, and the internal environment does not reach the internal environment of each model. called partial repair.
修补形成的模程内环境达到各模程内环境, 称全部修补。 The in-process environment formed by repairing reaches the in-process environment of each process, which is called full repair.
利用现有标识体系的子标、 中心设备的构造、 支撑平台, 实施各模程分别取代单 一密标方法、 明残模程, 实现已有资源利用下对现有标识体系的真实相关的安全度的 升级性提高, 简称升级。 修补, 升级, 统称完善。 Utilize the sub-standards of the existing identification system, the structure of the central equipment, and the supporting platform, and implement each model to replace the single secret label method and the clear and residual model respectively, so as to realize the real-related security of the existing identification system under the utilization of existing resources The improvement of upgradeability is referred to as upgrade. Repair, upgrade, collectively perfect.
上述各修补形成的、 升级使用的模程可完全遵守现有单一密标方法、 明残模程标 识体系的网络工作协议, 是单一密标方法、 明残模程的标准化、 通用化、 系列化的真 实相关安全度的修补、 升级构造。 应用修补、 升级构造后, 现有单一密标方法、 明残 模程标识体系的使用期网络实时工作不变, 增加休止期参与背景工作。 构造、 应用全 兼容现有标识体系的使用期网络实时工作, 称全兼容修补、 升级。 The modules formed by the above-mentioned repairs and upgraded can fully comply with the existing network working agreement of the single secret label method and the identification system of the clear and residual model, which is the standardization, generalization and serialization of the single secret label method and the clear and residual model really Repair and upgrade structures related to security. After applying repair and upgrading the structure, the existing single secret label method and the use period network of the residual model identification system will not change in real time, and the rest period will be added to participate in the background work. Construction and application of fully compatible existing identification systems work in real time during the service period of the network, which is called fully compatible repair and upgrade.
本发明的优点, 在于: The advantages of the present invention are:
模程系列、 安全完善、 标对象识方法, 在模程的安全性保护下各标安全, 所以真 实认定使得鉴权可靠; 由于实时层号变的时间很短, 故时效性强, 在各种网络应用时, 相对于现有的标志花费相同的网络运行资源, 安全性大为提高, 所以说运行简捷; 即 使用户人工参予层内运作, 也很简单方便, 体现出使用方便, 性价比高; 由于现有技 术基础提供了实施模程的物质基础, 使得实施简单, 成本低廉; 在所有的网络中, 适 用于各种信令制式, 体现出适用面广, 应用灵活; 占用信息网络传输资源与增大使用 期用户负担均达到最小限度, 容易实现已有的标识体系完善。 附图概述 Modular series, safe and perfect, marking object identification method, under the security protection of the modulus, each mark is safe, so the authenticity makes the authentication reliable; because the time for real-time layer number change is very short, it is time-sensitive and can be used in various In network application, compared with the existing logo, it costs the same network operation resources, and the security is greatly improved, so the operation is simple; even if the user manually participates in the operation in the layer, it is also very simple and convenient, reflecting the convenience of use and high cost performance; Since the existing technical basis provides the material basis for implementing the model, the implementation is simple and the cost is low; in all networks, it is applicable to various signaling systems, reflecting a wide range of applications and flexible applications; Occupying information network transmission resources and Increase the user burden during the use period to a minimum, and it is easy to realize the improvement of the existing identification system. Figure overview
图 1指示本发明各示意图特定图形符号的注释; Fig. 1 indicates the notes of the specific graphic symbols of each schematic diagram of the present invention;
图 2指示对象与中心双方模程间互为唯一相关设定的全部关系; Figure 2 indicates all the relationships between the objects and the central two-side models that are uniquely related to each other;
图 3 指示开放信息网络的联网环境中的标识体系, 某确立期或使用期完成初识 后, 某对象与中心形成外构造支持下的双方模程间建立了穿越界面的双向信息传输通 道; Figure 3 indicates the identification system in the networking environment of the open information network. After the initial recognition is completed in a certain period of establishment or use, a two-way information transmission channel across the interface is established between an object and the two-way model supported by the external structure of the center;
图 4指示组成原始密的标、 集、 群、 源构造; Figure 4 indicates the structure of the mark, set, group and source that make up the original secret;
图 5指示像; Figure 5 indicates the image;
图 6指示构成像群源; Figure 6 indicates the source of the image group;
图 7指示 ' OIN-DXP ' 的网络结构框图; Figure 7 indicates the network structure diagram of 'OIN-DXP';
图 8指示使用版本 101结构的密层模程制造的 "具有 '刮面' 的 ' OI 卡' " ; 图 9指示用户电话认证的流程; Figure 8 indicates the "'OI card' with 'scratch'" manufactured using the dense layer process of the version 101 structure; Figure 9 indicates the flow of user phone authentication;
图 10指示 ' OIN-DH ' 的网络结构框图; Figure 10 indicates the network structure block diagram of 'OIN-DH';
图 11指示电话互认证的流程; Figure 11 indicates the flow of telephone mutual authentication;
图 12指示用户间电话货币结算的流程; Figure 12 indicates the flow of telephone currency settlement between users;
图 13指示 ' OI (Sh)' 的网络结构框图; Figure 13 indicates the network structure diagram of 'OI (Sh)';
图 14指示 Internet互认证的流程; Figure 14 indicates the flow of Internet mutual authentication;
图 15指示 Internet互认证电子商务结构; 图 16指示 Internet用户注册流程; Figure 15 indicates the Internet mutual authentication e-commerce structure; Figure 16 indicates the Internet user registration process;
图 17指示 Internet货物展卖流程; Figure 17 indicates the process of Internet goods exhibition and sale;
图 18指示 Internet代卖交易流程。 本发明的较佳实施例 Figure 18 indicates the Internet proxy sale transaction flow. Preferred Embodiments of the Invention
首先参照图 1 -图 6 , 详细地给出通用实施例的基础。 Firstly, referring to FIG. 1-FIG. 6, the basis of the general embodiment is given in detail.
图 1指示本系列发明各示意图特定图形符号的注释。其中标号 1表示时空、界面; 标号 2表示各系统、部分间关系; 标号 3表示双方模程间互为唯一相关的设定 (完全一 致); 标号 4表示存入; 标号 5表示固定; 标号 6表示确定; 标号 7表示多路; 标号 8 表示投影、 投射; 标号 9表示双向的码传输通道、 总线; 标号 10表示界面的双向入 口; 标号 1 1表示开放的界面的双向码传输通道、 总线入口集; 标号 12表示双方界面 的双向人口处形成双向的码传输通道、 总线; 标号 13 表明相关的金字塔、 下层是上 层的基础; 标号 14表示代号为 n的部分、 系统; 标号 15表示四维空间坐标系中的对 象。 Figure 1 indicates annotations of specific graphical symbols for each schematic diagram of the invention in this series. Among them, the number 1 indicates space-time and interface; the number 2 indicates the relationship between various systems and parts; the number 3 indicates the uniquely related setting (completely consistent) between the two models; the number 4 indicates saving; the number 5 indicates fixed; the number 6 Indicates confirmation; label 7 indicates multi-channel; label 8 indicates projection, projection; label 9 indicates two-way code transmission channel, bus; label 10 indicates two-way entrance of interface; label 1 1 indicates open interface two-way code transmission channel, bus entrance set; label 12 indicates that the two-way entrance of the two-way interface forms a two-way code transmission channel and bus; label 13 indicates that the relevant pyramid and the lower layer are the foundation of the upper layer; label 14 indicates the part and system coded as n; label 15 indicates four-dimensional space coordinates objects in the system.
图 2指示对象与中心双方模程间互为唯一相关设定的全部关系。 其中, 标号 16 表示原始密群; 标号 17表示内状况群; 标号 18表示实施内运行。 Figure 2 indicates the overall relationship between the object and the central two-side model that is mutually uniquely related to each other. Among them, the label 16 indicates the original secret group; the label 17 indicates the internal status group; the label 18 indicates the internal operation of the implementation.
图 3 指示开放信息网络的联网环境中的标识体系, 某确立期或使用期完成初识 后, 某对象与中心形成外构造支持下的双方模程间建立了穿越界面的双向信息传输通 道。 其中标号 19表示密群; 标号 20表示内构造; 标号 21表示模程; 标号 22表示被 审核方的子标设备; 标号 23表示对象。 标号 24表示审核方的终识; 标号 25表示动 态置人的数据产生, 也称组成像标; 标号 26表示标识管理系统; 标号 27表示人工座 席; 标号 28表示信息处理; 标号 29表示标设备; 标号 30表示中心。 Figure 3 indicates the identification system in the networking environment of the open information network. After a certain period of establishment or use is completed, a two-way information transmission channel through the interface is established between an object and the two-way model supported by the external structure of the center. Among them, the number 19 indicates the dense group; the number 20 indicates the internal structure; the number 21 indicates the module; the number 22 indicates the sub-standard equipment of the auditee; the number 23 indicates the object. The number 24 represents the final identification of the auditing party; the number 25 represents the data generation of the dynamic input, also known as the composition image label; the number 26 represents the identification management system; the number 27 represents the artificial seat; the number 28 represents information processing; Reference numeral 30 denotes the center.
图 4指示组成原始密的标、 集、 群、 源构造。 ^中标号 31表示信息集; 标号 32 表示多个原始密集; 标号 33表示元群; 标号 35表示始号; 标号 36表示末号; 始号 35至末号 36组成号群 34; 标号 37表示原始密群; 元群 33、 号群 34和原始密群 37 组成的结构统称源; 元群 33和号群 34组成的硬件结构统称源构造。 Figure 4 indicates the structure of the target, set, group, and source that make up the original cipher. ^The label 31 represents the information set; the label 32 represents a plurality of original dense; the label 33 represents the element group; the label 35 represents the beginning number; the label 36 represents the end number; The dense group; the structure composed of the meta group 33, the number group 34 and the original dense group 37 is collectively called the source; the hardware structure composed of the meta group 33 and the number group 34 is collectively called the source structure.
图 5指示像。 其中标号 38表示 A对象; 标号 39表示 B对象。 Figure 5 indicates the image. Wherein the label 38 represents the A object; the label 39 represents the B object.
设建立了参照系, 由三维空间坐标系、 时间坐标系组成。 It is assumed that a reference system is established, which is composed of a three-dimensional space coordinate system and a time coordinate system.
设三维空间坐标系选择直角坐标系。 参照系 X Y Z T的坐标表示为(X , y , z , t )。 A、 B对象通过开放信息网络建立起信息传输通道直至撤除的过程中的某时刻 t , A对象的该 i次运行的坐标集 A i = { x a , y a , ζ a , t a } , B对象的该 i次运行的坐标集 B i = { X b , y b , z b, t b } , A i U B i = { x a , x b , y a , y b , z a , z b , t a = t b }称 A并 B坐标像。 将 A并 B坐标像的元素转 换成像代码与处理, 组成 A并 B像标。 Set the three-dimensional space coordinate system to select the Cartesian coordinate system. The coordinates of the frame of reference XYZT are expressed as (X, y, z, t). Objects A and B establish an information transmission channel through the open information network until a certain time t in the process of removal, the coordinate set A i = { xa , ya , ζ a , ta } of object A for this i run, and object B's The coordinate set B i = { X b , yb , zb , tb } , A i UB i = { xa , xb , ya , yb , za , zb , ta = tb } of the i running is called the A and B coordinate image. Convert the elements of the A and B coordinate image into code and process to form the A and B icon.
同样的某时刻 t , 该对象的该 i次运行的坐标集 A i或 B i, 称 A或 B坐标像。 将 A或 B坐标像的元素进行像代码生成与处理, 组成非并像标。 At the same time t, the coordinate set A i or B i of the i running of the object is called the A or B coordinate image. The elements of the A or B coordinate image are generated and processed as image code to form a non-uniform image.
A并 B、 A或 B坐标像的对应唯一相关的开放信息网络端口识别数据取代空间坐 标, 称相关像, 代码生成与处理, 组成相关像标。 A and B, A or B coordinate image corresponds to the only relevant open information network port identification data to replace the spatial coordinates, called the related image, and the code is generated and processed to form the related icon.
A并 B像或非并像的对应唯一相关的随机抽取数值, 称随机相关像, 代码生成, 组成随机相关像标, 体现在抽。 A and B-like or non-unlike corresponding uniquely correlated randomly selected values are called random related images, code generation, and composed of random related icons, which are reflected in the extraction.
八并13、 非并、 相关、 随机相关像标, 称像标, 各为一种像标类型。 基于对应唯 一相关的外信息编码, 都是一种像标。 Eight parallel 13, non-union, correlation, and random correlation icons are called icons, each of which is a type of icon. Based on the corresponding only relevant external information coding, it is a kind of icon.
图 6指示构成像群源。 其中标号 40表示首像标; 标号 41表示末像标; 标号 42 表示第一个像群的第 n (6)像标; 首像标 40至末像标 41组成的结构称像标全群 43; 首像标 40至第 n(6)像标 42是动态组成的第一个像群结构, 称像群各初始状况 44; 标号 45表示像标元群; 标号 46表示始号, 标号 47表示末号, 始号 46至末号 47 组 成本号群 48和客号群 49。 Figure 6 indicates the sources constituting the image group. Wherein the label 40 represents the first image; the label 41 represents the last image; the label 42 represents the n (6) image of the first image group; the structure composed of the first image 40 to the last image 41 is called the whole group 43 ; The first image mark 40 to the n (6th) image mark 42 is the first image group structure formed dynamically, which is called the initial state 44 of each image group; the label 45 represents the pixel group; the label 46 represents the initial number, and the label 47 represents The last number, the first number 46 to the last number 47 form the own number group 48 and the customer number group 49.
1 . (模程系列)标识体系 1. (Model Series) Identification System
实现功能单元的技术基础, 是微电子线路, 计算机硬件平台、 系统软件、 应用软 件及连网技术, 和机电一体化机构等机构。 标识体系的工程组成, 是各功能单元在开 放信息网络的联网环境中的有序运行、 实现相应系^的各设备联合网络。 其模程 21 的实现, 是技术基础的电气要素, 分别依据所述模程工作原理执行任务。 模程的实现 中, 采用了现有的物理抵御攻击的技术。 The technical basis for realizing the functional unit is microelectronic circuit, computer hardware platform, system software, application software and networking technology, and mechanism of mechatronics. The engineering composition of the identification system is the orderly operation of each functional unit in the networking environment of the open information network, and the realization of the joint network of each device of the corresponding system. The realization of its module 21 is the electrical element of the technical basis, and tasks are performed according to the working principle of the module. In the realization of the model, the existing physical defense attack technology is adopted.
在开放信息网络的平台上, 系统实现对象与中心间各自空模程的组成, 称组成双 方模程。 分别实现各对象与中心间可确立的或已确立的组成双方模程, 且实现系统的 网络化立体分布, 称模程体系。 On the platform of the open information network, the system realizes the composition of the respective empty models between the object and the center, which is called the composition of both parties. Respectively realize the establishable or established model of both parties between each object and the center, and realize the networked three-dimensional distribution of the system, which is called the model system.
对象与中心双方模程间互为唯一相关设定的全部关系, 称仿, 区分为双方的三种 关系: 原始密群 16 , 内状况群 Π , 实施内运行 18。 双方模程的三种关系分别各自 完全一致, 称同仿, 目的是终识简便。 The whole relationship between the object and the central model is the only relative setting, called imitation, and can be divided into three kinds of relationships between the two sides: the original dense group 16 , the inner state group Π, and the implementation inner operation 18 . The three relationships of the two models are respectively It is completely consistent, called the same imitation, and the purpose is to make it easy to understand.
定检索体系, 模程 21体系, 实现与开放信息网络其余体系间并网的终识 24、 组 成像标 25系统, 标识管理体系, 组成应用了本发明的标识体系。 Define the search system, model 21 system, and realize the final recognition of the network connection with other systems of the open information network.
标识管理系统 26是确立模程、确立期及进人中断期与终止期的对象 23相关事务 处理、 组成像标 25类型设置的管理系统。 人工座席 27是标识管理系统 26与中心 30 工作人员间的界面。 The logo management system 26 is a management system for establishing the model process, the establishment period, and the object 23 related affairs processing and composition icon 25 type setting of the entry interruption period and termination period. The manual seat 27 is the interface between the identity management system 26 and the staff of the center 30.
组成原始密群, 预设置各模程及各自对应唯一相关像标类型, 存储事务信息, 形 成信息处理 28 。 Form the original dense group, pre-set each module and its corresponding unique related icon type, store transaction information, and form information processing 28.
标识管理系统 26 , 人工座席 27 , 信息处理 28 , 形成标识管理体系。 The identification management system 26 , artificial seats 27 , and information processing 28 form an identification management system.
2 . 标识体系的运行 2. Operation of the labeling system
运行, 区分为: 设置像型, 模程运行。 Run, divided into: set image type, model run.
模程运行, 区分为: 确立模程, 使用运行。 Model operation is divided into: establish model and use operation.
确立模程, 区分为: 满源, 设置。 内构造中存在空缺的部分软件、 数据, 称空模 程, 区分为: 空源, 空内状况群, 空群演绎的软件。 Establish model, divided into: full source, set. Part of the software and data that have vacancies in the internal structure are called empty models, which are divided into: empty source, empty state group, and empty group deduced software.
使用运行, 区分为: 状况更新, 读出靶识。 状况更新区分为: 内状况变, 内外相 关。 Use run, divided into: status update, read target. Status update is divided into: internal status change, internal and external correlation.
中心的标识管理系统 26、 人工座席 27、 信息处理 28界面间的传输与运行为管 理与调用, 区分为: 预先设置层内运行构造中群演绎的软件、 其所需的内状况群 Π 数据, 用于填补层内运行构造的空缺, 称预设置; 将原始密群 16、 内状况群 17、 群 演绎 18分配给模程 21 , 称分配模程数据; 预先设置各模程分别组成像标 25的类型, 称预像型。 ' The center’s logo management system 26, artificial seat 27, and information processing 28 interfaces are managed and called for transmission and operation, which are divided into: pre-setting the software for group deduction in the operation structure of the layer, and the required internal status group Π data, It is used to fill the vacancy of the operation structure in the layer, which is called preset; assigning the original dense group 16, the internal state group 17, and the group deduction 18 to the model 21, which is called the distribution model data; the pre-set models are respectively composed of icons 25 The type is called the pre-image type. '
中心的组成像标 25与标识管理系统 26、 人工座席 27、 信息处理 28界面间的传 输, 人组成像标 25向, 预像型的数据置入, 组成像 ^ 25的构造内存像型的运行, 形 '成设置像型。 The transmission between the center composition image 25 and the logo management system 26, the artificial seat 27, and the information processing 28 interface, the person composition image 25 direction, the data insertion of the pre-image type, and the operation of the composition image ^ 25's construction memory image type , forming a set like type.
中心的标识管理系统 26、 人工座席 27、 信息处理 28与双方的密群 19、 内构造 20、 模程 21实现联网运行, 区分为: 入密群 19向, 已组成并经分配的模程数据 (原 始密群与预设置的数据)置入空模程, 模程内分别密源与存设置的运行, 分别形成模程 的满源与设置; 出密群 19向, 使用运行中返回相关码耗完指令。 The center's identification management system 26, artificial seats 27, information processing 28 and both parties' secret groups 19, internal structure 20, and models 21 realize networked operation, and are divided into: 19 directions for entering secret groups, and model data that has been formed and distributed (Original dense group and pre-set data) are placed into the empty module, and the operation of the encrypted source and storage settings in the module respectively forms the full source and setting of the module; out of the dense group 19 directions, return the relevant code during operation Run out of instructions.
双方的密群 19、 内构造 20、 模程 21与中心的审核方的终识 24出密群 19向, 实现读出靶识。 双方的 19与 20界面间实施的运行, 区分为: 入密群 19向, 是将转人的原始密 群及内状况变产生的环境密群数据依据密标及号的排序写入模程内密标层的源构造 的运行, 称密源; 出密群 19 向, 是源中密群依据密标层指定状况、 经读直接形成模 程内的靶的运行, 称直接源靶。 The dense group 19, internal structure 20, and model 21 of both parties and the final knowledge 24 of the central auditing party output the secret group 19 to realize the target recognition. The operations implemented between the 19 and 20 interfaces of both parties are divided into: 19 directions of entering the secret group, which is to write the transferred original secret group and the environmental secret group data generated by the internal state change into the internal secret of the module according to the order of the secret code and number The operation of the source structure of the target layer is called the dense source; the direction of the dense group 19 is the operation of the dense group in the source to directly form the target in the model according to the specified situation of the dense target layer, which is called the direct source target.
双方的内构造 20与模程 21界面间实施的运行, 区分为'. 入密群 19向, 输入原 始密群与预设置的数据、 动态置入的像标及工作指令。 出密群 19 向, 直接源靶获取 的密标形成模程内靶; 经读并经内靶层数据单位属性状况过滤变迁成运行密内靶、 间 接形成模程内的靶的运行, 称间接源靶; 返回相关码耗完指令给标识管理系统及工作 指令输出。 工作指令对于模程执行任务是必要的, 其网络协议的性质对于模程工作原 理而言是隐性的, 在其它的论述中隐去。 The operation implemented between the internal structure 20 and the model 21 interface of both parties is divided into '. Entering the secret group 19 direction, inputting the original secret group and preset data, dynamically inserted icons and work instructions. Out of the dense group 19 directions, the dense tags obtained directly from the source target form the in-module target; after reading and filtering the data unit attribute status of the inner target layer, it changes into the running dense inner target and indirectly forms the operation of the target in the modal, called indirect Source target; Return related code consumption instructions to the identification management system and output work instructions. The work order is necessary for the model to execute the task, and the nature of its network protocol is implicit to the working principle of the model, which is hidden in other discussions.
双方的内构造 20的运行为: 预设置的数据置人空模程的联网运行中, 是将转入 的预设置数据依据约定, 实施的层内存储的运行, 称存设置。 联网的使用运行中, 是 将转入的像标的数据依据约定, 实施寄存的运行, 称寄存。 使用期每当读出靶识结束 后, 依据标识体系结束该次运行指令, 双方脱网的模程内状况更新。 The operation of the internal structure 20 of the two parties is as follows: the preset data is placed in the network operation of the empty model, and the transferred preset data is carried out according to the agreement, and the operation of the layer storage is implemented, which is called the storage setting. In the use and operation of the Internet, it is the operation of depositing the transferred image data according to the agreement, which is called deposit. During the use period, after reading the target identification, the operation instruction is completed according to the identification system, and the in-process status of both parties offline is updated.
对象的模程 21与子标设备 22、中心的模程 21与标设备 29界面间的双向信息传 输区分为: 入密群 19 向, 置入的数据至模程, 形成外靶进入向过滤通道、 入屏蔽的 不透明的运行, 称转人; 出密群 19 向, 是内靶及用耗的递的末返、 完返进出向过滤 通道、 出屏蔽的不透明、 形成透明的外靶的运行, 称转出。 转入、 出, 称转换。 内、 外靶, 简称靶。 The two-way information transmission between the object model 21 and the sub-target device 22, and the central model 21 and the target device 29 interface is divided into: 19 directions for entering the secret group, inserting data into the model, and forming an external target entry filter channel , the opaque operation of entering and shielding is called transfer; the 19 directions of exiting dense group are the final return of the internal target and consumption, and the operation of entering and exiting the filter channel, opaque exiting the shielding, and forming a transparent external target. called transfer out. In, out, called conversion. Inner and outer targets, referred to as targets.
双方的模程 21与审核方的终识 24界面间的运行区分为: 对象的模程经源靶、 转 出, 外靶传输至对象, 输入网络至中心的终识形成终的运行, 称对象靶终。 中心的模 程经源靶、 转出, 外靶传输至终识形成终的运行, 称中心靶终。 The operation division between the model 21 of the two parties and the final knowledge 24 of the reviewer is divided into: the model of the object passes through the source target, transfers out, the outer target is transmitted to the object, and the input network to the central final knowledge forms the final operation, which is called the object target end . The movement of the central model through the source target, transfer out, and the outer target is transmitted to the final consciousness, which is called the central target terminal.
审核方的终识 24的运行为: 中心对象的终中心 Η, 形成终识, 确认对象的终是 否正确, 实现审核对象是否真实。 The final knowledge 24 of the auditing party operates as follows: the final center Η of the central object forms a final knowledge, confirms whether the final object of the object is correct, and realizes whether the audit object is true.
双方的源靶、 转出与靶终、 终识, 各是读出靶识的内与外运行的一部分, 分别合 称读出与靶识, 合称读出靶识。 The source target, transfer-out, target end, and end consciousness of both sides are each part of the inner and outer operation of the readout target, respectively collectively called the readout and the target, and collectively called the readout target.
中心的审核方的终识 24与标识管理系统 26、 人工座席 27、 信息处理 28间的传 输, 出审核方的终识 24向, 对象的终识为不真实的信号告知。 The transmission between the final knowledge 24 of the reviewer in the center and the identification management system 26, the artificial seat 27, and the information processing 28 shows the direction of the final knowledge 24 of the reviewer, and the final knowledge of the object is a false signal notification.
组成像标 25的运行为: 设置像型运行中, 是将预像型数据依据约定, 实施的构 造内存储的运行, 称存像型。 外构造抽取对象网络环境中运行的相关轨迹, 所得到的 唯一特征信息参数转换成信息编码, 压缩非特征信息码, 形成数位机器码作为标规格 确定的单一整体, 称组成像标。 The operation of forming the icon 25 is as follows: In the operation of setting the image type, it is the operation of storing the pre-image type data in the structure implemented according to the agreement, which is called the image storage type. The external structure extracts the relevant tracks running in the network environment of the object, and the obtained The unique characteristic information parameters are converted into information codes, the non-characteristic information codes are compressed, and digital machine codes are formed as a single whole determined by the standard specification, which is called a composition image standard.
双方的模程 21与组成像标 25界面间的像标传输至双方模程, 称分配像标。 双方的内构造 20、 模程 21与中心的组成像标 25入密群 19向, 实现组成像标, 分配, 转入, 寄存, 称动态置人。 The image between the modules 21 of both parties and the interface of the composition image 25 is transmitted to the models of both parties, which is called the distribution image. The internal structures 20, modules 21, and the central composition image 25 enter the dense group 19 directions to realize the composition, distribution, transfer, and storage of the image, which is called dynamic placement.
3 . 原始密的标、 集、 群、 源构造详解 3. Detailed explanation of the structure of the original cipher, set, group, and source
信息集 3 1为符号集并机器码集。 Information set 3 1 is a symbol set and a machine code set.
多次随机抽取符号集中的元素, 集合成原始密符号子集, 排序成符号组; 符号组 转换成代码组。 多次随机抽取机器码集的元素 { 0 , 1 } , 并排序成编码组; 原始密 的符号组对应代码组或编码组形成确定数位机器码作为单一整体, 称生成法, 组成的 标, 形成原始密标。 原始密标集合成各原始密集 32并经排序, 产生原始密群 16 , 称 综合群。 The elements in the symbol set are randomly extracted multiple times, assembled into the original encrypted symbol subset, and sorted into symbol groups; the symbol groups are converted into code groups. The elements { 0 , 1 } of the machine code set are randomly extracted multiple times, and sorted into code groups; the original encrypted symbol group corresponds to the code group or code group to form a certain digital machine code as a single whole, which is called the generation method. Original code. The original dense code set is synthesized into each original dense group 32 and sorted to generate the original dense group 16, which is called a comprehensive group.
随机抽取信息群中的子群,依据标规格划分单一整体的各组中换入随机抽取的信 息; 或依据随机缩标规格划分单一整体的各组中随机加以信息组成标规格的各组; 或 依据超标规格划分单一整体的各组中随机删除信息组成标规格的各组; 或依据标规格 划分单一整体的各组经随机删除部分组后加以随机排序; 称处理法。 产生原始密群 16 , 称分析群。 Randomly extract subgroups in the information group, and replace them with randomly selected information in each group divided into a single whole according to the standard specification; or randomly add information to form each group of the standard specification in each group of a single whole divided according to the random contraction specification; or Randomly delete information from each group that divides a single whole according to the standard specification to form each group of the standard specification; or divide each group of a single whole according to the standard specification and then randomly delete some groups and then sort them randomly; it is called the processing method. The original dense group 16 is generated, which is called the analysis group.
号群 34中起始的号, 称始号 35 ; 末尾的号, 称末号 36。 元号相关形成元存储 的数据单位与号的编码, 称相关码。 各元号形成唯一设置的固定, 称元号定, 导致标 群, 元群 33 , 号群 34, 码群, 称群。 元群, 号群, 形成源构造 33-36 。 The initial number in number group 34 is called the beginning number 35; the last number is called the last number 36. The code of the data unit and number in the meta storage is formed by the correlation of the meta number, which is called the correlation code. Each element number forms a unique setting, which is called element number set, resulting in a standard group, element group 33, number group 34, and code group, called group. Element groups, number groups, form source structures 33-36.
4 . 图 3、' 图 5、 图 6结合, 框解像标数据的动态置入。 4. The combination of Fig. 3, Fig. 5 and Fig. 6 illustrates the dynamic placement of icon data.
组成像标 25的运行, 产生的像标数据, 传输至双方的模程 21中内构造 20的像 群源。 ― Composition of the operation of the icon 25, the generated icon data is transmitted to the image group source of the internal structure 20 in the model 21 of both parties. -
5 - 确立模程详解 5 - Establish model details
确立模程所分别确定密标层中满源、 号变的规律并指定递的起始号、 是否依据内 靶层的管理与调用产生属性变、 是否依据授权层的管理与调用产生排序与符码变、 是 否依据级权层的管理与调用产生构造变、 隐埋层中是否潜伏像标并提供虚拟标给其它 层中, 形成内环境的约定及递构造的第一个指定号数据 (原始密指定号数据), 称定初 始状况。 该模程内状况, 称初始状况。 The establishment of the model process determines the law of full source and number change in the secret label layer and specifies the start number of delivery, whether attribute changes are generated according to the management and call of the inner target layer, and whether the order and symbols are generated according to the management and call of the authorization layer. Code change, whether to generate structural changes according to the management and call of the hierarchical level, whether to hide the image mark in the hidden layer and provide virtual mark to other layers, form the agreement of the internal environment and the first designated number data of the transfer structure (original secret number data), and determine the initial state. The state in the model is called the initial state.
6 . 使用运行基础 运行期, 各层依据已定初始状况实施状况更新的各运行, 其中各层内构造依据层 内与层间规律, 分别实施号、 属性、 排序、 符码、 构造、 隐埋的状况变的运行, 形成 各自新状况, 可产生唯一相关变迁与可识的外在终。 6. Use the running base During the operation period, each layer implements the operation of state update according to the predetermined initial state, and the internal structure of each layer implements the operation of number, attribute, sorting, symbol, structure, and hidden state change according to the rules within and between layers. , form their own new situation, can produce the only relative change and recognizable external end.
当号群的号递至末号, 给出号群模运行结束信号, 称末返, 用于递构造的复位而 形成指定起始号状况、 层间申请或标识体系管理模程的相关事务。 当被授权确认结束 各次用, 给出号结束用信号, 称用返, 用于读出靶识的冗余读识而容错、 层间申请。 当抽并结束该次用, 扣除号群中的该号的用, 在更构造查询该待定号的属性时, 指示 该号的耗; 否则指示该号的用, 称耗返, 用于确定相关码属性与变换的群一致。 耗返 方法下, 直至号群的用被扣为零, 给出号群耗运行结束信号, 称完返, 用于耗返构造 的复位而形成初始属性状况 (用)、 层间申请或标识体系管理模程的相关事务。 权层模 程中, 给出源变运行结束信号, 称一生返; 级层模程中, 给出构造变运行结束信号, 称二生返。 上述各返, 称返。 When the number of the number group reaches the end number, a signal of the end of the operation of the number group model is given, called the end return, which is used to reset the transfer structure to form the status of the specified start number, inter-layer application or related affairs of the identification system management model. When the user is authorized to confirm the end of each use, a signal for the end of the number is given, called the use return, which is used for redundant reading of target identification and fault tolerance and inter-layer application. When the user is extracted and finished, the use of the number in the number group is deducted, and when the attribute of the undetermined number is constructed and inquired, the consumption of the number is indicated; otherwise, the use of the number is indicated, called consumption return, used to determine the correlation The code property is consistent with the transformed group. Under the consumption return method, until the use of the number group is deducted to zero, a signal of the end of the operation of the number group consumption is given, and the return is completed, which is used to reset the consumption return structure to form the initial attribute status (use), inter-layer application or identification system Manage related affairs of the model. In the weight layer model, the source variable operation end signal is given, which is called life return; in the hierarchical model process, the structural variable operation end signal is given, which is called second life return. The above-mentioned returns are called returns.
属性变及源变, 源内被作用的数据单位划分依据的规格是, 形状, 区分为: 线, 实、 空心块; 弯度, 区分为: 直, 折, 曲; 长度, 区分为: 连、 断续; 取向, 区分为: 横、 纵、 斜向, 中心, 对称。 参见图 4。 划分规格决定了某数据单位的码长量、 在密 群中的位置。 Attribute change and source change, the data units affected by the source are divided according to the following specifications: shape, divided into: line, solid, hollow block; curvature, divided into: straight, folded, curved; length, divided into: continuous, intermittent ; Orientation, divided into: horizontal, vertical, oblique, center, symmetrical. See Figure 4. The division specification determines the code length of a certain data unit and its position in the dense group.
其次参照图 1 -图 6 , 详细地给出通用实施例。 Next, referring to Fig. 1-Fig. 6, a general embodiment is given in detail.
1 - 密标层 1 - Cryptography layer
基准状况约束下, 密标层内运行构造依据设置约定, 提供指定状况群, 管理与调 用指定状况, 形成读元的唯一相关, 实施读出靶识。 执行任务的具体方法: Under the constraint of the reference condition, the operation structure in the encrypted label layer provides the specified condition group according to the setting agreement, manages and calls the specified condition, forms the unique correlation of the read element, and implements the read target recognition. The specific method of performing the task:
密标层默认采用的确定各指定号状况伴随指定相关码属性状况、号状况变伴随指 定相关码属性状况变的群一致, 称为换, 形成换规律, 属性状况的原新区分为: 用耗, 用留。 ' By default, the encryption layer adopts the group consistency of determining the status of each designated number with the status of the designated related code attribute, and the change of the number status is accompanied by the change of the designated related code’s attribute status. , use to stay. '
设固源号模为 n ( l)。 Let the solid source model be n (l).
使用期依据标识体系结束该次读出靶识运行指令而产生的用返,重新确定信息编 码, 作为下一使用期运行的预备, 称预; 依据约定作为其后某使用期运行的预备, 称 备。 某使用期运行取得提供的信息编码, 作为该使用期运行指定的用途, 称取。 According to the marking system, the information code is re-determined and the information code is re-determined as the preparation for the operation of the next use period, which is called pre-preparation; as the preparation for the operation of a subsequent use period according to the agreement, it is called prepare. The information code provided by the operation of a certain period of use is obtained, and it is weighed as the purpose specified by the operation of the period of use.
从起始号起, 依据号群的排序步进, 产生号群中的待定号数据, 称递, 封闭在密 标层内, 形成层内相关内状况变; 开放在密标层外, 形成层间相关内状况变、 内外相 关: 中心随机抽取而产生的指定号的运行数据, 称抽, 区分为: 中心随机抽取数, 而 不管模程内依据号群的模计数产生的号的属性, 传输至模程, 形成动态置人, 称数抽。 中心随机抽取号群中的用、 留的号, 加上抽取数乘以号模 n ( l)的积, 所得和作为中心 随机抽取数的替换, 称和抽。 中心分别随机抽取号群、 子号群中的号, 传输至模程, 形成的动态置入, 分别称号、 子抽。 Starting from the initial number, according to the ordering of the number group, the undetermined number data in the number group is generated, transferred, closed in the secret mark layer, and the relevant internal conditions in the cambium layer change; open outside the secret mark layer, the cambium layer inter-correlation internal state change, internal-external correlation: The operation data of the specified number generated by the random selection of the center is called extraction, which is divided into: the number randomly drawn by the center, regardless of the attributes of the number generated by the number group in the module, is transmitted to the module to form a dynamic input. Weighing pumping. The center randomly selects the used and reserved numbers in the number group, plus the product of the drawn number multiplied by the number modulus n (l), and the resulting sum is used as the replacement of the centrally randomly drawn number, which is called sum pumping. The center randomly extracts the numbers in the number group and sub-number group respectively, and transmits them to the model program to form a dynamic insertion, respectively title and sub-drawing.
模程内以号模 n ( l)进行数、 和抽及虚拟标的模计数, 产生号群中的待定号数据, 称计。 模程内以号、 子抽及虚拟标的数据为待定号数据, 称得。 In the module process, counting, summing, and virtual standard module counting are performed with the number model n (l), and the undetermined number data in the number group are generated, and the number is counted. In the module, the number, sub-plot and virtual target data are the undetermined number data, which can be called.
用留、 递的用耗, 待定号数据为新号数据; 计、 得的用耗, 更构造访问返构造, 查询待定号的相关码属性, 相关码属性状况的优先等级高于号状况: 所抽取的号用, 待定号数据为新号数据; 所抽取的号已耗, 称待定号, 由双方模程顺序递至第一个可 用号, 实现产生新号数据。 For reserved and delivered consumption, pending number data is new number data; for calculated and acquired consumption, construct access return structure, query related code attributes of pending numbers, and related code attribute status has higher priority than number status: all The extracted number is used, and the pending number data is the new number data; the extracted number has been consumed, which is called the pending number, and is handed over to the first available number by the two models sequentially, so as to realize the generation of new number data.
预、 备、 取递, 预、 备 (数、 和抽及虚拟标)计, 预、 备 (号、 子抽及虚拟标)得, 取 (数、 和抽及虚拟标)计, 取 (号、 子抽及虚拟标)得, 各为一种号变依据的号数据变迁 的规律, 称更。 更构造依据更规律经更运行产生被指定的新号数据; 新号数据驱动更 构造限定源中唯一相关元的可被读, 形成指定号新状况。 Pre-preparation, pick-and-delivery, pre-preparation (number, sum drawing and virtual bid) calculation, pre-preparation (number, sub-drawing and virtual bid) acquisition, taking (number, sum drawing and virtual bid) calculation, taking (number , sub-extraction and virtual standard) are obtained, each of which is a law of number data change based on number change, which is called change. The new structure is based on the more regular operation to generate the designated new number data; the new number data drives the update structure to limit the readability of the only relevant element in the source, forming a new status of the specified number.
密层模程的第一次号模 n ( l)的所有号的相关码属性状况为留前, 用耗, 为真实 相关时期, 称前真实相关时期; 抽的计、 得的用留, 为随机真实相关时期, 称前随机 真实相关时期。 其后都为不安全真实相关。 The relative code attributes of all numbers of the first number modulo n ( l) of the dense layer model process are left before, consumed, is the real related period, and is called the former real related period; The stochastic true correlation period is called the pre-stochastic true correlation period. Thereafter, they are all related to unsafe realities.
2 . 内靶层 2. Inner target layer
基础状况约束下, 内靶层内构造依据设置约定, 提供指令状况群, 管理与调用指 令状况; 依据指令约定通知密标层读出密标串, 决定运行密数据单位属性状况群; 依 据指令约定形成运行密内靶数据, 实施间接源靶。 执行任务的具体方法: Under the constraints of basic conditions, the internal structure of the inner target layer provides command status groups, manages and invokes command status according to the setting agreement; informs the encrypted label layer to read the encrypted label string according to the instruction agreement, and determines the attribute status group of the operation encrypted data unit; according to the instruction agreement Form the target data within the operation density and implement the indirect source target. The specific method of performing the task:
定初始状况确定用返 (可用返延续至开始源靶前 时刻)提出申请, 内靶层管理与 调用指令状况 (是密标层管理与调用指定状况、 实施读的模仿), 读取的指令用于形成 实时处理构造。 Set the initial state to determine the application (the available return can be extended to the time before the start of the source target) to file an application, the inner target layer management and call instruction state (it is the encryption layer management and call designation state, and the imitation of the implementation of the read), and the read instruction is used To form a real-time processing structure.
被作用的数据单位属性, 区分为: 原始的可被使用, 称用, 其状况, 称用状况。 经标识体系结束该次运行指令而结束该次使用, 仍然保留并将继续在被指定时使用, 称留, 其状况, 称留状况; 结束该次运行指令而消耗, 称耗, 其状况, 称耗状况; 结 束该次运行指令而结束该次使用, 仍然保留并将潜伏, 被激活后可继续在被指定号时 使用, 称潜, 其状况, 称潜状况。 各指令随机约定被作用的数据单位划分属性。 依据指令约定固源内被作用的数据量,指示密标层服从于挑构造的控制与工作需 求: 从指定号新状况连续递提供被作用的数据量等码长的密标串。 The properties of the data unit to be used are divided into: the original can be used, called, its status, called status. After the identification system ends the operation instruction, the use is still reserved and will continue to be used when it is designated. Consumption status; end the operation command and end the use, it will still be reserved and dormant, after being activated, it can continue to be used when it is assigned a number, it is called latent, and its status is called latent status. Each instruction randomly agrees on the data unit division attribute to be acted upon. According to the amount of data to be manipulated in the fixed source as stipulated in the instruction, the instruction encryption layer is subject to the control and work requirements of the selection structure: from the specified number to the new state, the encryption string of the code length equal to the amount of data to be manipulated is continuously delivered.
依据指令约定数据单位划分, 从起始数据单位起, 挑选指令约定用、 留属性数据 单位, 顺序排列各符码, 形成运行密内靶数据, 驱动数据过滤通道寄存, 实施间接源 靶。 该被作用的数据量中数据单位各自独立属性变的规律, 称挑。 挑构造依据挑规律 经挑运行产生被作用的数据量中指定各新用、 留属性数据单位; 新用、 留属性数据单 位驱动靶寄存, 形成指定数据量中符码属性新状况。 According to the data unit division of the command agreement, from the initial data unit, select the data unit used by the command agreement and the reserved attribute, and arrange each symbol code in order to form the target data in the operation secret, drive the data filtering channel to register, and implement the indirect source target. The law of the independent attributes of the data units in the amount of data being acted on is called pick. The selection structure is based on the selection rule, and each new usage and retention attribute data unit is specified in the affected data volume generated by the selection operation; the new usage and retention attribute data unit drives the target registration, forming a new status of the symbol attribute in the specified data volume.
3 . 授权层 3. Authorization layer
基础状况约束下, 授权层依据设置约定, 提供指令状况群, 管理与调用指令状况; 依据各指令约定实施管理与调用密标层产生环境密组群与符码状况群; 依据指令约定 实施环境密确定该基准状况。 执行任务的具体方法: Under the constraints of basic conditions, the authorization layer provides instruction status groups, manages and invokes command status according to the setting agreement; implements management and invokes the encryption label layer according to each instruction agreement to generate the environment encryption group and symbol status group; implements the environment encryption according to the instruction agreement Determine this baseline condition. The specific method of performing the task:
设变源号模为 n (2)。 Let the modulus of variable source number be n (2).
定初始状况确定密标层模为 n (2)次指定号状况的末完返提出申请, 授权层取该 使用期终识结束的用返后, 指示密标层服从于置、 算构造的控制与工作需求: 停止提 供读出靶识运行, 寄存指定原状况, 参与置、 算的工作开始源变运行。 After determining the initial status and confirming that the modulus of the encrypted label layer is n (2) times, the end-of-life return of the designated number status is submitted, and the authorization layer obtains the user return after the end of the use period, and instructs the encrypted label layer to obey the control of the configuration and calculation structure Requirements for work: Stop providing read-out target operation, register the specified original status, and start source change operation to participate in the work of setting and calculation.
授权层依据指令约定, 管理与调用密标层产生密群数据变, 区分为: 排序 (组群) 数据变、 符码数据变。 其数据变迁的规律分别为: 置、 算。 According to the instruction agreement, the authorization layer manages and invokes the encrypted label layer to generate encrypted group data changes, which are divided into: sorting (group) data changes and symbol code data changes. The laws of data change are: set and calculate.
备、 变源中经满源所存储的原始密群, 约定在群内的原数据范围, 数据单位对应 数据量等码长, 各原数据单位经代替原数据单位, 置换形成环境密排序各原数据单 位, 在约定的范围数据单位置换形成环境密新数据, 称为古典置。 The original secret group stored in the full source in the backup and variable source, the original data range in the group is agreed, the data unit corresponds to the data volume and other code lengths, each original data unit is replaced by the original data unit, and the replacement forms the environmental encryption sorting of each original The data unit is replaced by the data unit in the agreed range to form the new data of the environment, which is called the classical position.
约定在群'内的原数据范围, 各原数据单位对应数据量等码长的新数据单位, 原、 新数据单位划分不同, 新数据单位称原数据单位的影子。 实施古典置形成环境密新数 据, 用影子代替原数据单位, 形成环境密排序各新数 ¾单位, 在约定的范围数据单位 影子置换形成环境密新数据, 称为影子置。 The range of the original data within the agreed group', each original data unit corresponds to a new data unit with a code length equal to the data volume, the original and new data units are divided differently, and the new data unit is called the shadow of the original data unit. Implement the classical configuration to form new environmental data, replace the original data units with shadows, and form new data units of environmental classification, and replace the data units within the agreed range to form new environmental data, which is called shadow data.
约定范围在群内的原数据, 一个以上的各原数据单位经运算, 所得函数约定作为 某新数据单位, 各新数据单位经代替原数据单位, 形成环境密排序各新数据单位, 在 约定的范围数据单位运算并代替形成环境密新数据, 称算, 与影子置的区别在用于代 替原数据单位的所得新数据单位并非已存在的被划分选择而是经运算产生的。 For the original data within the agreed range, more than one original data unit is operated, and the obtained function is agreed to be a new data unit, and each new data unit is replaced by the original data unit, forming an environment dense sorting of each new data unit, within the agreed The range data unit is calculated and replaced to form the new data of the environment, which is called calculation. The difference from shadow setting is that the new data unit used to replace the original data unit is not the existing division selection but generated by calculation.
依据被置、 算作用的源相关, 区分为: 经封闭源内数据的密群数据变, 称源内相 关; 经开放源外数据的密群数据变, 称源外相关。 依据源外相关被置、 源内外相关被算作用的数据相关, 区分为: 某源的某存储区 域所得数据, 是其它源的某存储区域数据置的结果, 称外置; 是原存储数据与该源的 某存储区域数据算的结果, 称内染; 是原存储数据与非该源的数据算的结果, 称外染; 是该源其它存储区域数据算的结果, 称内清洗; 是非该源的数据运算的结果, 称外清 洗; 是该源其它存储区域数据与非该源的数据算的结果, 称内外清洗。 According to the source correlation used for setting and calculation, it is divided into: the dense group data transformation of the closed source data is called the internal source correlation; the dense group data transformation of the open source external data is called the external source correlation. According to the data correlation used for setting the correlation outside the source and calculating the correlation between inside and outside the source, it can be divided into: the data obtained in a certain storage area of a certain source is the result of setting the data in a certain storage area of other sources, which is called external; it is the original storage data and The calculation result of data in a certain storage area of the source is called internal dyeing; the result of calculation between the original stored data and data not of the source is called external dyeing; the result of calculation of data in other storage areas of the source is called internal cleaning; right or wrong The result of the data operation of the source is called external cleaning; the result of calculation between data in other storage areas of the source and data other than the source is called internal and external cleaning.
依据被置、 算作用的密相关, 区分为: 指令状况决定的密群数据变, 称形成环境 密群; 指令、 隐埋状况共同决定的密群数据变, 称形成虛拟密群。 According to the dense correlation of setting and calculation, it can be divided into: the dense group data change determined by the instruction status is called the formation environment dense group; the dense group data change determined by the instruction and the hidden status is called the formation virtual dense group.
依据被置、 算作用的源产生密相关, 区分为: 备、 变源中原始密群被密群变, 形 成环境密群, 称初变; 环境密群被密群变, 还是形成环境密群, 称为连变。 According to the dense correlation generated by the source of the setting and calculation function, it can be divided into: the original dense group in the backup and variable sources is changed by the dense group to form the environmental dense group, which is called the initial change; the environmental dense group is changed by the dense group, or the environmental dense group is formed , called continuous change.
置、 算构造依据置、 算规律实施置、 算运行产生的新密群数据, 管理与调用密标 层写驱动变源构造, 源中唯一相关的存储形成新密群状况, 分别称排序变、 符码变, 都称密群状况变或源变。 排序变, 也称组群变。 环境密群状况与属性状况互为优先等 级。 According to the configuration and calculation rules, the configuration and calculation structure implement the new dense group data generated by the configuration and calculation operation, manage and call the encryption level write-driven variable source structure, and the only relevant storage in the source forms a new dense group status, which are called sorting variables, The code change is called the state change or the source change of the secret group. Rank change, also known as group change. The environmental dense group status and the attribute status are mutually prioritized.
源变运行结束, 产生环境密群状况, 授权层给出一生返信号, 密标层结束置、 算 的工作, 退出参与源变, 恢复原状况; 确定了其基准状况, 可继续提供读出靶识运行。 After the operation of the source change is completed, the environment dense group situation is generated, the authorization layer gives a lifetime return signal, and the encryption layer finishes the work of setting and calculation, withdraws from participating in the source change, and restores the original situation; Knowledge runs.
4 . 级权层 4. Hierarchy
基础状况约束下, 级权层依据设置约定,提供指令状况群,管理与调用指令状况; 依据各指令约定实施管理与调用授权层中产生密标层环境密组群与符码状况的指令 表, 产生授权层环境密构造状况群; 依据指令约定实施环境密产生构造的该基础状 况。 执行任务的具体方法等同于授权层的形成实时处理构造与置、 算规律, 不同之处: 定初始状况瑜定授权层中线性指令表的末返或随机号分布指令表的完返为提出申 请, 级权层取该次源变的一生返信号后, 指示授权层服从于置、 算构造的控制与工作 需求: 授权层开始构造变运行的过程中, 停止提供管 与调用密标层产生源变, 寄存 指定原状况, 参与置、算的工作开始构造变运行。 (密标层并不停止提供读出靶识运行。 ) 级权层依据约定, 管理与调用授权层产生构造变。 置、 算的数据对象为授权层中 产生密标层环境密组群与符码状况的各条指令的操作数地址中的划分数据单位依据 的规格, 产生的规格数据可能存在偏差, 需要双方相关唯一的修正。 Under the constraints of the basic conditions, the hierarchical authority layer provides command status groups, management and call command status according to the setting agreement; implements management and call command tables in the authorization layer to generate the encryption group and symbol status of the encryption layer environment according to the command agreement, Generate the environment encryption structure status group of the authorization layer; implement the basic status of the environment encryption generation structure according to the instruction agreement. The specific method of executing the task is the same as the formation of the authorization layer, the real-time processing structure and the setting and calculation rules. The difference is that the initial state, the final return of the linear instruction table in the authorization layer or the end return of the random number distribution instruction table is the application. , after the authorization layer gets the lifetime return signal of the secondary source variable, it instructs the authorization layer to obey the control and work requirements of the configuration and calculation structure: when the authorization layer starts to construct the variable and run it, stop providing management and calling the generation source of the encryption layer Change, register and specify the original situation, participate in the work of setting and calculating, and start to construct and run the change. (The cryptographic layer does not stop providing the read-out target operation.) According to the agreement, the authority layer produces structural changes in the management and call authorization layer. The data object of setting and calculation is the specification based on the division data unit in the operand address of each instruction that generates the encryption layer environment encryption group and symbol status in the authorization layer. The generated specification data may have deviations, which need to be related by both parties. The only fix.
各条指令的操作码、 操作数地址、 地址中的划分数据单位依据的规格的表格, 合 称指令表。 The operation code of each instruction, the address of the operand, and the table of specifications based on which the data unit in the address is divided are collectively called the instruction table.
构造变运行结束, 产生环境密构造状况,级权层给出二生返信号,授权层结束置、 算的工作, 退出参与构造变, 恢复原状况; 确定了其依据的指令表的基础状况, 可继 续提供管理与调用密标层产生源变。 When the structure change operation is completed, the environmental security structure is generated, the authority layer gives the secondary return signal, and the authorization layer ends the setting, Calculation work, withdrawal from participating in the construction change, and restoration of the original state; determined the basic state of the instruction list based on it, and can continue to provide management and call the source change of the encryption layer.
5 . 隐埋层 5. Buried layer
隐埋层内运行构造依据设置约定, 提供指定状况群, 管理与调用指定本、 客号状 况; 依据各指定本号状况实施约定的像元获, 产生像群状况群; 寄元获的约束下, 指 定本号状况实施环境密确定该像基准状况; 依据各指定客号状况实施约定的读像源取 虛拟标, 产生隐埋状况群; 依据指定客号状况约定实施提供虚拟标、 虚拟标群给所需 层, 取代透明的像标、 固定的原始密群。 执行任务的具体方法是指定号状况的本更等 同于密标层的更, 不同之处: According to the setting agreement, the operating structure in the buried layer provides the specified status group, manages and calls the status of the designated account and customer number; implements the agreed pixel acquisition according to the status of each designated account number, and generates the image group status group; under the constraints of sending element acquisition , Designate the status of this number and implement the environmental encryption to determine the image benchmark status; According to the status of each designated customer number, implement the agreed reading image source to take virtual markers and generate hidden status groups; Provide virtual markers and virtual marker groups according to the agreed status of designated customer numbers For the desired layer, replace the transparent icon, fixed the original dense group. The specific method of executing the task is that the code of the specified number status is equivalent to the code layer code, the difference is:
定初始状况确定像群状况自治, 隐埋状况受其它层内状况变所需动态置人像标替 换为隐埋层提供的虚拟标、 原始密群替换为隐埋层提供的虚拟标群的管辖, 接受客 更、 读像源取虚拟标方法指示。 Determine the initial status to determine the autonomy of the image group status, and the buried status is under the jurisdiction of the replacement of the dynamic image markers provided by the buried layer with the virtual markers provided by the buried layer, and the replacement of the original dense group with the virtual markers provided by the buried layer. Accept customer update, read image source and take virtual label method instructions.
一个有效期内, 首次组成并分配的像标, 称首像标; 最后一次组成并分配的像标, 称末像标。 The icon formed and distributed for the first time within a period of validity is called the first icon; the icon formed and distributed last is called the last icon.
首像标起, 各使用期添加像标元素, 动态多像标集合成动态像集; 首像标起, 各 使用期添加像标元素至末像标, 动态集合成像全集; 动态像集是像全集的子像集; 依 据 n (6)为有限集合基础, 动态换入像标元素的子像集, 称像集, 经排序为像群。 When the first image is marked, icon elements are added in each period of use, and multiple icons are dynamically assembled to form a dynamic image set; when the first image is marked, icon elements are added to the last icon in each period of use, and the dynamic collection forms a complete set; the dynamic image set is like The sub-image set of the whole set; according to n (6) as the finite set basis, the sub-image set of icon elements is dynamically replaced, called the image set, which is sorted into image groups.
模程内, 唯一寄存像标的单元, 称寄存像标元, 简称寄元; 元群容纳像群的源构 造, 称像源构造。 设其号模为 n (6)。 In the module, the only unit that stores image objects is called the image object storage unit, referred to as the registration unit; the unit group contains the source structure of the image group, which is called the image source structure. Let its modulus be n (6).
寄元的作用, 在于使用期动态寄存传输至的像标, 休止期约定作为实施预计与 得、 刷、 像染、' 内外像清洗或像源存储的像标, 提供内外相关的状况变及像源存储的 像标前次使用期传输。 像源的作用在于接受层内运行构造管理与调用指定本、 客号状 况的限定像元, 休止期存储动态寄存的像标, 潜伏成 次使用期传输的像标, 提供备, 并参与流、 抽、 摸、 重更的取虚拟标。 The role of Jiyuan is to dynamically register and transmit the image objects during the use period, and the rest period is agreed to be used to implement the prediction and acquisition, brushing, image dyeing, internal and external image cleaning or image source storage of the image objects, and provide internal and external related status changes and images. The icon stored by the source was last used to transfer. The role of the image source is to accept the operation structure management in the layer and call the limited pixels of the specified account and customer number status, store the dynamically registered images during the rest period, and provide backup for the images transmitted during the latent use period, and participate in the flow, Take the virtual mark for pumping, touching and re-changing.
使用期将像标寄存进寄元; 休止期隐埋层取该使用期终识结束的用返后, 将像标 存储、 代替进像元。 都称获。 During the use period, the pixels are stored in the pixels; in the rest period, after the hidden layer takes the end of the use period, it stores and replaces the icons into the pixels. All are claimed.
隐埋层指定号状况依据号的作用, 区分为: 一种指定号状况使用于像元的获, 受 其管理的像源号群, 形成本号群; 一种指定号状况使用于读像源取虚拟标, 受其管理 的像源号群, 形成客号群。 According to the function of the number, the state of designated number in the buried layer can be divided into: one state of designated number is used for the acquisition of pixels, and the image source number group managed by it forms the own number group; the other state of designated number is used for reading image source Take the virtual standard, and the image source number group under its management forms a customer number group.
隐埋层指定号状况依据同次使用期起作用的时序, 区分为: 先指定本号状况, 后 指定客号状况, 称本客; 先指定客号状况, 后指定本号状况, 称客本。 当 n (6) > n (2), 本客, 确立模程已在空像源后 n (6)减 n (2)的各号像元预先存储了密标; 客本, 后 n (6) 减 n (2)加 1的各号像元预先存储了密标。 The status of the designated number of the buried layer is distinguished according to the time sequence of the same use period: the status of the designated number first, and then Specifying the status of the customer number is called the customer; specifying the status of the customer number first, and then specifying the status of the own number is called the customer. When n (6) > n (2), this guest, the established model has pre-stored the secret code in each number pixel of n (6) minus n (2) after the empty image source; guest book, after n (6 ) Minus n (2) Each number of pixels plus 1 has a secret code stored in advance.
本、 客号变依据的号数据变迁的规律, 区分为: 本更, 客更。 本更采用递较简便, 客更是应各层所需虚拟标而设置的各约定。 The rule of account data change based on the change of book and customer numbers is divided into: book change and customer change. This is more convenient to use delivery, and the customer is the agreement set according to the virtual standards required by each layer.
本更构造依据递规律经号数据变运行产生被指定的新本号数据,驱动本更构造限 定像源中唯一相关元, 形成指定本号新状况。 像源构造被指定本号状况的元产生获, 像标备 n (6)次运行 '· 该像标经指定 n (6)次本号新状况, 在指定( n (6) + 1)次的本号新 状况才消失, 形成像标备状况。 According to the recursive law, the data transformation operation of this update structure will generate the designated new account data, and drive the update structure to limit the only relevant element in the image source to form a new status of the specified account. The source structure of the image is specified by the meta-generation of this number, and the image is set to run for n (6) times. Only when the new status of the original number disappears, it becomes like a standard status.
空像源各像标备状况叠加满像源形成像群备初始状况。 The standard status of each image of the empty image source is superimposed on the full image source to form the initial status of the imaging group.
当 n (6) > n (2), 各像标备状况叠加密标满像源形成像群备类似初始状况。 When n (6) > n (2), the state of each image is superimposed on the encrypted image source to form an image group that is similar to the initial state.
满像源后, 被指定本号状况的元产生获, 形成像群备新状况。 After the image source is full, the image source assigned the status of this number will be generated, forming a new status of the image group.
像标备、 像群备初始与类似初始、 像群备新状况, 都称像群状况。 The image standard, image group initial and similar initial, image group new state are called image group state.
客更, 依据约定的实施, 区分为: 流, 抽, 摸, 重更。 Customer change, according to the agreed implementation, is divided into: flow, draw, touch, re-change.
客更与本更同步前号递, 称备满单流。 The customer update is delivered simultaneously with the original update, and it is said to be fully stocked.
客更与本更同步异 (非前)号递, 客更与本更间被指定的后号差为 m, (模为 n (6) 的连续计数, m≠ 0且< n (6)-l), 称备 m单流。 The difference between the guest shift and the original shift is different (not the previous) number, and the difference between the designated post number between the guest shift and the original shift is m, (the modulo is n (6) continuous counting, m≠0 and < n (6)- l), called m single flow.
客更为抽的计、 得, 简称抽。 Customers are more calculated and obtained, referred to as pumping.
客更为流指定客号新状况的读像源所取虚拟标的计、 得, 简称摸。 The calculation and acquisition of the virtual target is obtained by reading the image source of the new status of the specified customer number in the customer flow, referred to as touch.
客更构造依据客更规律经号数据变运行产生被指定的新客号数据,驱动客更构造 限定像源中唯」相关元, 形成指定客号新状况。 像群状况约束下, 形成了取虚拟标的 单一隐埋状况, 区分为: The customer update structure generates the designated new customer number data through the operation of the number data change according to the customer update rules, and drives the customer update structure to limit the only relevant elements in the image source to form a new status of the specified customer number. Under the constraints of the image group condition, a single buried condition of the virtual target is formed, which can be divided into:
备满单流的新客号数据形成备满单流像群状况: —各像元的像标已潜伏了 n (6)减 1 次运行, 在 n (6)次号用, 被读出元形成虚拟标流通。 The new customer number data of the full single stream forms the status of the full single stream image group: - the icon of each pixel has been latent for n (6) minus 1 operation, used for n (6) times, and is formed by the readout unit Virtual standard circulation.
备 m单流的新客号数据形成备 m单流像群状况:各像元的像标已潜伏了 m减 1次 运行, 在 m次号用, 被读出元形成虚拟标流通。 The new customer number data of the standby m single stream forms the status of the standby m single stream image group: the icon of each pixel has been latent for m minus 1 operation, and is used for the m number, and the readout unit forms a virtual standard circulation.
抽的新客号数据形成抽像群状况。 The extracted new customer number data forms an abstract group status.
摸的新客号数据形成摸像群状况。 The data of the new customer numbers touched form the status of the touch image group.
依据单一隐埋状况, 读像元取出虚拟标并传输至其它各实施管辖权利层, 形成背 景提供模程内外虚拟标交往。 依据流、 抽、 摸运行产生被指定的新客号数据, 形成指定客号起始状况, 再各递 客号数据变运行产生被指定的其余新客号数据形成指定客号其余状况, 直递至形成指 定客号结束状况, 称重更状况。 基于流、 抽、 摸的各递客号数据变, 称重更。 像群状 况约束下, .重更状况提供了各取虚拟标状况, 形成取虚拟标群的多重隐埋状况。 According to the single buried status, the read pixel takes out the virtual mark and transmits it to other implementing jurisdiction layers, forming a background to provide the exchange of virtual marks inside and outside the model. Generate the designated new customer number data according to flow, pumping and touch operation, form the initial status of the designated customer number, and then change and run the data of each delivery customer number to generate the remaining designated new customer number data to form the remaining status of the designated customer number, direct delivery Weigh and update the status until the end status of the designated customer number is formed. The data of each delivery number based on flow, pumping and touch is changed, and the weighing is changed. Under the constraints of the image group state, the re-update state provides each virtual standard state, forming multiple hidden states of the virtual standard group.
单一隐埋状况中指定客号状况、多重隐埋状况中指定客号起始至结束的各状况依 据约定实施挑功能模仿, 取各像标用、 留属性数据单位, 顺序排列各符码, 提供了等 效取虚拟标状况, 称复合隐埋状况。 The status of the specified customer number in the single hidden situation, and the situation from the beginning to the end of the specified customer number in the multi-buried situation implement the selection function imitation according to the agreement, take the data units for each icon and attribute, arrange the symbols in sequence, and provide In order to take the virtual standard state equivalently, it is called the compound buried state.
各复合隐埋状况, 形成等效取虚拟标群的运行状况, 称群 (复合)隐埋状况。 Each compound buried condition forms an equivalent operation condition of a virtual standard group, which is called the group (composite) buried condition.
单一、 多重、 复合、 群隐埋状况, 称隐埋状况。 Single, multiple, compound, and group buried conditions are called buried conditions.
隐埋层内构造依据隐埋规律实施的运行, 有序产生各新数据; 各新数据有序驱动 隐埋层内构造, 形成隐埋新状况。 The structure in the buried layer is operated according to the law of burial, and new data are generated in an orderly manner; each new data drives the structure in the buried layer in an orderly manner, forming a new state of burial.
隐埋层的相关码属性变完全同于密标层, 上边的论述隐去。 The related code properties of the buried layer are completely the same as those of the cryptographic layer, and the above discussion is hidden.
6 . 实施修补 6. Implement the patch
依据上述各层执行任务的具体方法及现有明残模程执行任务的具体方法的差 异, 实施修补。 According to the difference between the specific methods of performing tasks of the above-mentioned layers and the specific methods of performing tasks of existing Ming residual models, implement repairing.
非密标层修补的部分修补模程在各使用期读变元结束后、 读出靶识运行前, 向各 管辖层、 构造提出等效于各返的相应申请。 双方各自背景层也可简化为实时层, 分别 在使用、休止期实时唯一相关的标内排序数据变、 符码数据变, 产生环境密内靶数据、 标状况。 The partial repair module of non-secret level repair shall submit the corresponding application equivalent to each return to each jurisdiction layer and structure after the read variables of each service period are over and before the read target operation. The respective background layers of the two parties can also be simplified to a real-time layer, and the uniquely relevant internal sequence data and symbol data changes in real-time during the use and rest periods respectively generate environmental secret internal target data and target status.
本发明的工程组成可作各功能、 构造、 层、 数据、 状况及变的部分或全部的重叠、 交叉、 简化、 组合的等同变化。 The engineering composition of the present invention can be used as an equivalent change of overlapping, crossing, simplification, and combination of some or all of functions, structures, layers, data, conditions, and changes.
如内靶层, 挑被作用的数据量可涉及所有的被管辖层的源内, 每一元内数据单位 等效为密标。 ' For example, in the inner target layer, the amount of data to be manipulated can involve all the sources of the governed layer, and each metadata unit is equivalent to a secret code. '
如授权层, 置、 算被作用的源范围可涉及像源, 取代实施挑功能模仿; 单一、 多 重隐埋状况, 提供了同样的等效取虚拟标、 群的等效复合、 群隐埋状况。 For example, authorization layer, setting, computing, and the scope of the affected source can involve the image source, replacing the implementation of the challenge function imitation; single and multiple hidden conditions, providing the same equivalent virtual standard, group equivalent composite, and group hidden conditions .
如模程中多源受单一更构造控制。 For example, multiple sources in a model are controlled by a single structure.
如虚拟层内运行构造: 不同的层具有相同的层内部分运行构造时, 物理的构造建 造在某一层内, 作用的构造建造在其余各层内; 执行任务时作用的构造申请使用物理 的构造, 形成实时处理构造。 比如, 使用期与休止期挑构造分别为内靶层与隐埋层形 成实时处理构造, 置构造为权、 隐埋层公用, 单一更构造提供各层内各被指定的新号 数据、 指定状况。 For example, the operating structure in the virtual layer: when different layers have the same partial operating structure in the layer, the physical structure is built in a certain layer, and the functional structure is built in other layers; structure, forming a real-time processing structure. For example, the selection structure of the use period and the rest period are the real-time processing structures for the inner target layer and the buried layer respectively, and the setting structure is common to the right and buried layers, and the single update structure provides the assigned new numbers in each layer. data, specified status.
如级权层可建筑多级。 For example, the weight layer can be built into multiple levels.
如一模程的权层通过数据传输唯一控制双方各自相关的更多的被管辖层。 For example, the right layer of a model controls more governed layers related to both parties through data transmission.
如内靶层, 指令约定数据单位划分为密标, 同样用于变迁固源的模, 可将用属性 的需再递号个数通知密标层, 简化为使用期实时直接源靶; 约定的属性状况提出申 请, 挑的指令表同样可受授权、 级权层管辖。 For example, in the inner target layer, the instruction stipulates that the data unit is divided into secret codes, which are also used to change the solid source model, and can notify the secret code layer of the number of retransmission numbers required by the attributes, which is simplified to real-time direct source targets during the use period; agreed When submitting an application based on the attribute status, the selected instruction list can also be governed by authorization and hierarchy.
如古典置可简化为随机线性顺序切换: 随机标置的简化约定, 第 n (2)用号指定 的元容纳的密标为始号, 顺序设置原始密群, 各元容纳的各密标重新确定, 形成随机 线性顺序切换原始密群, 称随机线性顺序切换, 形成的环境密组群, 称线性顺序重设 号序群。 For example, the classical setting can be simplified as a random linear sequence switching: the simplified convention of random setting, the secret code contained in the element specified by the nth (2) number is the initial number, the original secret group is set sequentially, and the secret code contained in each element is re- Definitely, the original dense group formed by the random linear sequence switching is called the random linear sequence switching, and the environment dense group formed is called the linear sequence reset sequence group.
如外置或外染或内外清洗或外清洗可简化为刷或像染或内像清洗或外像清洗:各 休止期, 某源的某存储区域所得数据, 是动态置入的像标或像标与原存储数据算的函 数或像标与该源其它存储区域数据算的函数或像标与非该源的数据算的函数代替的 结果。 For example, external or external dyeing or internal and external cleaning or external cleaning can be simplified as brushing or image dyeing or internal image cleaning or external image cleaning: the data obtained from a certain storage area of a certain source during each rest period is the dynamically inserted icon or image The result of replacing the function calculated with the original storage data, or the function calculated with the data in other storage areas of the source, or the function calculated with the data other than the source.
并可采用一些公知的技术,如数据保护技术的模程体系双方用户端联网的确立模 程、 动态置人、 读出靶识、 传输工作指令; 利用信息、 时间冗余对付信息的操作、 运 行及传输中的错误; 利用其余冗余对付设备故障。 And some well-known technologies can be used, such as the modeling system of data protection technology, the establishment of networking between the two parties, dynamic placement, target reading, and transmission of work instructions; use of information and time redundancy to deal with information operations and operations and errors in transmission; use the remaining redundancy to deal with equipment failures.
这些同样是有效的。 These are equally valid.
以上论述的模程实施是在标识体系中的通用实施例。为了更方便理解该首创软硬 件技术结构建造方法, 以下参照图 7 - 18 , 论述几个应用通用实施例的特定工程实 施例。 ' The modular implementations discussed above are general examples in the signage system. In order to more easily understand the construction method of this pioneering software and hardware technology structure, the following discusses several specific engineering embodiments of applying general embodiments with reference to FIGS. 7-18. '
1 . ' OIN-DXP ' , 版本 201 。 1. 'OIN-DXP', version 201.
'任意帐户的用户注册、 电话认证转移至电子信用与票务' 的网络, 简称 ' OIN-DXP ' 。 标识方法: 密层模程, 指定相关码属性状况: 用耗, 更: 取递, 指 定号状况、 直接源靶、 转出、 终的传输驱动由用户人工实现替代内构造、 用户人工操 作实施内运行, 该技术结构称版本 201 。 Network of 'User Registration for Any Account, Phone Authentication Transfer to Electronic Credit and Ticketing', abbreviated as 'OIN-DXP'. Identification method: Dense layer model, specified related code attribute status: consumption, change: pick-up and delivery, specified number status, direct source-target, transfer-out, and final transmission drive are manually implemented by the user to replace the internal structure, and the user manually implements the internal structure To run, the technical structure is called version 201.
' OIN-DXP ' 的网络结构具有将电话通信网、 CRS航空票务网、 银行计算机 网集合联结成一个开放网络环境的特点。 The network structure of 'OIN-DXP' has the characteristics of connecting telephone communication network, CRS airline ticketing network, and bank computer network into an open network environment.
任意帐户的客户注册后, 成为 ' OIN-DXP ' 用户, 获得 " ' OIN-DXP ' 版本 101卡" , 本例简称 ' OIN卡' 。 图 8指示使用版本 201结构的密层模程制造的 "具有 '刮面' 的 ' OIN卡' " 。 其中, 标号 66表示固源, 标号 67表示元, 标号 68表示原始密标, 标号 69表示号, 标号 70表示用耗与模程界面材料, 以及标号 71表示用户人工实现替代内构造、 用户 人工操作实施内运行后的内靶区域。 用户人工操作实施内运行是指: 当服务小姐应 答 '请报校验号码' 时, 使用 ' OIN卡' , 从已刮去的 '刮面' 依号顺序选择至未 被刮去的 '刮面' ( '刮面' 只允许依号顺序被刮去), 用指甲轻轻的刮去 '刮面' , 正确报 '刮面' 下显露的 '校验号码' , 实现了 '指定相关码属性状况: 用耗, 更: 取递' 的技术结构要求。 After the customer of any account registers, he becomes an 'OIN-DXP' user and obtains a "'OIN-DXP' version 101 card", referred to as 'OIN card' in this example. Figure 8 indicates "'OIN card' with 'scratch'" manufactured using the dense layer process of version 201 structure. Among them, the reference number 66 represents the solid source, the reference number 67 represents the yuan, the reference number 68 represents the original code, the reference number 69 represents the number, the reference number 70 represents the consumption and the model interface material, and the reference number 71 represents the manual implementation of the user to replace the internal structure and the manual operation of the user. The inner target area after implementing the inner run. Manual operation by the user to implement internal operation means: When the service lady answers 'please report the verification number', use the 'OIN card' to select from the scraped 'scratched surface' to the unscraped 'scraped surface' in order of number '('Scrape' can only be scraped off in order of numbers), gently scrape off 'Scrape' with fingernails, and correctly report the 'Verification Number' revealed under 'Scratch', and realize the 'specified related code attribute Status: Consumption, Change: Requirements for the technical structure of pick-up and delivery.
参见图 7 , 用户 50需购买飞机票时, 通过任意的固定电话路由 51或移动电话路 由 52 , 进人诸如 PSTN、 A、 B、 G、 CT-2等通信网组成的泛通信网 53 , 通过在 步骤 72 (见图 9 )拨打 ' OIN-DXP ' 中心服务号, 交换至汇集端 54。 当某人工座 席 55上呼入提示时, OIN-DXP中心服务小姐 57A摘机, 摘机信号使交易过程语音 记录机 56开始工作。 Referring to Figure 7, when a user 50 needs to purchase an airplane ticket, he or she enters into a pan-communication network 53 composed of communication networks such as PSTN, A, B, G, CT-2, etc. through any fixed telephone route 51 or mobile telephone route 52, and passes In step 72 (see FIG. 9 ), dial the 'OIN-DXP' central service number, and switch to the converging terminal 54. When the call-in prompt on a certain artificial seat 55, the OIN-DXP center service lady 57A off-hook, and the off-hook signal makes the transaction process voice recorder 56 start working.
OIN-DXP中心服务小姐 57A与用户 50首先进行电话认证, 服务小姐 57A将用 户所报数据输入 OIN-DXP中心 (汇集终端人工联接系统)计算机 58。 这里 OIN-DXP 中心 (汇集终端人工联接系统)计算机 58是网络集结的称法, 其包含等同于中心 30的 功能, 是标识体系与票务服务功能的计算机与电子信息系统。 The OIN-DXP center service lady 57A and the user 50 first carry out telephone authentication, and the service lady 57A inputs the data reported by the user into the OIN-DXP center (collection terminal manual connection system) computer 58. Here, the OIN-DXP center (collection terminal manual connection system) computer 58 is a name for network integration, which includes functions equivalent to the center 30, and is a computer and electronic information system with identification system and ticket service functions.
图 9示出了用户电话认证的流程。 具体如下: Figure 9 shows the flow of user phone authentication. details as follows:
在步骤 73 , 进行应答。 服务小姐应答 ' OIN-DXP中心, 请报帐号' 。 In step 73, a response is made. The service lady replied 'OIN-DXP Center, please report the account number'.
在步骤 74, 报 '帐号' 。 用户报 '帐号 ' 。 In step 74, report 'account number'. User reports 'Account'.
在步骤 75 , 进行应答。 如果报错的帐号不存在, OIN-DXP 中心计算机 58将显 示 '帐号不存在' , 服务小姐应答 '对不起, 您报的帐号 不存在, 请重报' 后, 重报 '帐号 ' 。 第二次必须正确。 如桌报错, 服务小姐应答 '对不起, 您报的帐号 仍然不存在, 请确认后再拨' 后, ' OIN-DXP ' 中心挂机。 In step 75, a response is made. If the account number reported by mistake does not exist, the OIN-DXP center computer 58 will display 'account number does not exist', and the service lady replies 'I'm sorry, the account number you reported does not exist, please re-report', and re-reports 'account number'. It has to be right the second time. If an error is reported at the desk, the waitress will answer 'Sorry, the account number you reported still does not exist, please confirm and then dial', the 'OIN-DXP' center hangs up.
如果正确或报错的帐号存在, 服务小姐应答 '请报校验号码' 。 If the correct or incorrect account number exists, the waitress will reply 'please report the verification number'.
在步骤 76 , 刮去 '刮面' , 报显露的 '校验号码' 。 使用 ' OIN卡' , 从已 刮去的 '刮面' 依号顺序选择至未被刮去的 '刮面' ( '刮面' 只允许依号顺序被刮去), 用指甲轻轻的刮去 '刮面' , 必须正确报 '刮面' 下显露的 '校验号码 ' 。 可容错二次。 In step 76, scrape off the 'scratch' and report the revealed 'verification number'. Use the 'OIN card' to select from the scratched 'scratch' to the unscratched 'scratch' ('scratch' can only be scraped in the order of number), gently scrape with your fingernails Go to 'Scrape', you must correctly report the 'Verification Number' displayed under 'Scrape'. Can be fault-tolerant twice.
在步骤 77 , 进行应答。 如果三次报错, 服务小姐应答 '对不起, 您无权使用该 帐号' 后, 挂机。 In step 77, a response is made. If the error is reported three times, the waitress replies 'Sorry, you are not authorized to use this Account', hang up.
如果正确, 服务小姐应答 '您需什么服务' , 表明用户完成电话认证。 If it is correct, the service lady will answer 'what service do you need', indicating that the user has completed the phone authentication.
其后, 服务小姐 57A操作 CRS终端 59, 通过 CRS局域主机 60为用户 50扣除 Γ所需购买的飞机票并输入 OIN-DXP中心计算机 58。 服务小姐 57A说 '请挂机' 后, 挂机, 挂机信号使交易过程语音记录机 56结束工作。 至此, 完成协议前台交易。 Thereafter, the service lady 57A operates the CRS terminal 59, and deducts Γ the required air ticket for the user 50 through the CRS local host 60 and enters it into the OIN-DXP central computer 58. After the service lady 57A said ' hang up please', hang up, and the hang up signal makes the transaction process voice recorder 56 finish work. At this point, the foreground transaction of the agreement is completed.
需要说明的是: 所谓 '认证' , 是通俗的称法, 即通过识别达到真实认定。 所谓 '帐号' , 是通俗的称法, 即定, 由其可检索到用户在 ' OIN-DXP ' 中心 注册时记载的必备信息。 What needs to be explained is: the so-called "authentication" is a popular term, that is, to achieve authenticity through identification. The so-called 'account number' is a popular term, that is, it can retrieve the necessary information recorded when the user registers in the 'OIN-DXP' center.
所谓 '刮面' , 是通俗的称法, 即用耗与模程界面材料, 因其是一层严密的遮盖 物、 又可在需要时用指甲轻轻的刮去而得名。 The so-called "scratch surface" is a popular name, that is, the interface material between the consumption and the mold process. It is named because it is a tight covering and can be gently scraped off with a fingernail when needed.
所谓 '校验号码' , 是通俗的称法, 即终。 The so-called 'verification number' is a popular term, namely final.
再参见图 7 , OIN-DXP中心需完成协议后台交易如下。 Referring to Figure 7 again, the OIN-DXP center needs to complete the protocol background transactions as follows.
OIN-DXP中心计算机 58打印出 '第一单据' 。 服务小姐 57A操作中心端票据 传真机 61 , 将 '第一单据' 传至银行端票据传真机 62。 The OIN-DXP central computer 58 prints out the 'first receipt'. The service lady 57A operates the receipt fax machine 61 at the center, and transmits the 'first receipt' to the receipt fax machine 62 at the bank.
银行接单后, 工作人员 57B将有关数据输人 OIN-DXP银行计算机 63, 完成对 OIN-DXP中心计算机 58的认证后, 操作银行终端 64 , 通过银行主机 65为 OIN-DXP 冻结了用户所需购买的飞机票的票款, 并输人 OIN-DXP银行计算机 63 。 OIN-DXP 银行计算机 63打印出 '第二单据' 。 工作人员 57B操作银行端票据传真机 62, 将 '第 二单据' 回传至中心端票据传真机 61 。 After the bank receives the order, the staff member 57B inputs the relevant data into the OIN-DXP bank computer 63, and after completing the authentication of the OIN-DXP central computer 58, operates the bank terminal 64, and freezes the OIN-DXP required by the user through the bank host 65. The fare of the purchased air ticket is input into the OIN-DXP bank computer 63 . The OIN-DXP bank computer 63 prints out the 'second slip'. The worker 57B operates the bill fax machine 62 at the bank, and returns the 'second slip' to the central bill fax machine 61.
接回单后, 服务小姐 57A将有关数据输人 OIN-DXP 中心计算机 58 , 完成对 OIN-DXP银行计算机 63的认证后, OIN-DXP中心计算机 58打印出 '取票单' 及飞 机票, 存放与候机厅 ' OIN-DXP兑票处' 。 After receiving the receipt, the service lady 57A will input the relevant data into the OIN-DXP central computer 58, and after completing the authentication of the OIN-DXP bank computer 63, the OIN-DXP central computer 58 will print out the 'Ticket Collection Form' and the airline ticket, and store them With the terminal hall 'OIN-DXP Redemption Office'.
用户登机前, 凭身份证在 ' OIN-DXP兑票处' 兑票, 并在 '取票单' 签名。 服务小姐 57A将 '取票单' 有关数据输入 OIN-DXP中心计算机 58, OIN-DXP 中心计算机 58打印出 '第四单据' 。服务小姐 57A操作中心端票据传真机 61 , 将 '第 四单据' 传至银行端票据传真机 62 。 Before boarding the plane, the user redeems the ticket at the 'OIN-DXP Redemption Office' with his ID card, and signs the 'Ticket Collection Form'. The service lady 57A inputs the relevant data of the 'ticket ticket' into the OIN-DXP central computer 58, and the OIN-DXP central computer 58 prints out the 'fourth receipt'. The service lady 57A operates the receipt fax machine 61 at the center, and transmits the 'fourth receipt' to the bank receipt fax machine 62.
银行接单后, 工作人员 57B将有关数据输入 OIN-DXP银行计算机 63 , 完成对 OIN-DXP中心计算机 58的认证后, 操作银行终端 64 , 通过银行主机 65将已冻结的 用户购买飞机票的票款划入 OIN-DXP帐号。 After the bank receives the order, the staff member 57B enters the relevant data into the OIN-DXP bank computer 63, and after completing the authentication of the OIN-DXP central computer 58, operates the bank terminal 64, and transfers the frozen user to purchase the air ticket through the bank host 65 The money is transferred to the OIN-DXP account.
2 · ' OIN-DH ' , 版本 6 . 113 。 '任意帐户的用户注册、 电话认证转移至电子货币 (信用与结算)' 的网络, 简称2 · 'OIN-DH', version 6.113. 'User registration of any account, phone authentication transfer to electronic money (credit and settlement)' network, abbreviated
' OIN-DH ' 。 标识方法: 二隐层模程, 指定相关码属性状况: 用耗, 更: 预递, 模 程运行约束自动识别运行的网络协议, 该技术结构称版本 6. 113。 'OIN-DH'. Identification method: two-hidden layer model, specify the relevant code attribute status: consumption, change: advance, model operation constraints automatically identify the network protocol running, this technical structure is called version 6.113.
' OLN-DH ' 的网络结构具有将电话通信网、 银行计算机网集合联结成一个开 放网络环境的特点。 ' OIN-DH ' 的网络结构并具有将商家必须具备 POS转化为商 家作为用户对待、 将 ATM机取现转化为用户间现金与信用交易。 The network structure of 'OLN-DH' has the characteristics of connecting telephone communication network and bank computer network into an open network environment. The network structure of 'OIN-DH' has the ability to convert merchants who must have POS into merchants as users, and convert ATM cash withdrawals into cash and credit transactions between users.
任意帐户的客户注册后,成为 ' OIN-DH'用户,获得" ' OIN-DH'版本 6. 113 卡" (本例简称 ' OIN电子卡' )。 After registration, customers of any account become 'OIN-DH' users and get "'OIN-DH' version 6.113 card" (referred to as 'OIN electronic card' in this example).
(1) 以下参照图 10 - 12, 描述付款用户 78需支付一笔款子给收款用户 87的电 话货币结算的流程。 (1) Referring to Figures 10-12, the flow of telephone currency settlement in which the paying user 78 needs to pay a sum of money to the receiving user 87 will be described below.
付款用户完成前台操作如下。 The payment user completes the foreground operations as follows.
在步骤 99, 进行付款用户数据输入。 付款用户 78操作自己的 ' OIN电子卡' , 开启电源, 正确输入 PIN, 依据屏幕提示, 输人支付款额、 收款用户帐号。 In step 99, payment user data entry is performed. The payment user 78 operates his own 'OIN electronic card', turns on the power, correctly enters the PIN, and inputs the payment amount and the account number of the receiving user according to the screen prompts.
在步骤 100, 摘机执行。 将 ' OIN电子卡' 插人收款用户电话的 ' OIN-DH ' 端口或自己手机的 'OIN-DH' 端口, 按 ' OIN-DH , 付款键。 In step 100, off-hook execution. Insert the 'OIN electronic card' into the 'OIN-DH' port of the receiving user's phone or the 'OIN-DH' port of your own mobile phone, and press the 'OIN-DH, payment key.
在步骤 101 ,付款用户等待回复,在步骤 102 ,收款用户等待通知。付款用户 ' OIN 电子卡' 显示 '正在工作' 。 In step 101, the paying user waits for a reply, and in step 102, the receiving user waits for a notification. Paying user 'OIN Electronic Card' shows 'Working'.
现参见图 11 , 描述网络加入自动完成后台操作的流程。 Referring now to FIG. 11 , it describes the process of automatically completing background operations for network joining.
在步骤 88, 拨打 ' OIN-DH' 中心定。 ' OI 电子卡' 控制收款用户电话使用 DTMF信令或自己手机使用数字信令 (以下简称信令), 由去话固定电话路由 79或去话 移动电话路由 '81, 进入诸如 PSTN、 A、 B、 G、 CT-2等通信网组成的泛通信网 83, 自动拨打 ' OIN-DH' 服务号, 交换至 'OIN-DH' 主机 84。 At step 88, dial the 'OIN-DH' center. 'OI electronic card' controls the payee's phone to use DTMF signaling or his own mobile phone to use digital signaling (hereinafter referred to as signaling), and enters such as PSTN, A, The pan-communication network 83 composed of B, G, CT-2 and other communication networks automatically dials the 'OIN-DH' service number and switches to the 'OIN-DH' host 84.
在步骤 89 , 进行应答。 ' OIN-DH ' 主机 84 iM过相应的来话固定电话路由 80 或付款用户来话移动电话路由 82(以下简称通信路由), 服从付款用户 78的 ' OIN电 子卡' 指示, 开始互认证的工作流程。 In step 89, a response is made. The 'OIN-DH' host 84 iM follows the instruction of the 'OIN electronic card' of the paying user 78 through the corresponding incoming fixed-line phone routing 80 or the paying user's incoming mobile phone routing 82 (hereinafter referred to as the communication routing), and starts the work of mutual authentication process.
在步骤 90, 报对象定。 ' OIN电子卡' 控制信令通过路由, 报出自己的定, 在步骤 91 , 进行应答。 ' OIN-DH ' 主机 84通过路由接收信令。 如果报错的对 象定不存在, ' OIN-DH' 主机 84控制信令通过路由回应 '定错重报' 。 第二次必 须正确。 如果再报错, ' OIN-DH' 主机 84控制信令通过路由回应 '仍错' 后, 挂 机。 如果正确或报错的对象定存在, ' OIN-DH '主机 84控制信令通过路由回应 '报 终' 。 In step 90, the object is confirmed. The 'OIN electronic card' control signaling passes through the routing, reports its own setting, and responds in step 91. The 'OIN-DH' host 84 receives signaling via the route. If the object of the error report does not exist, the 'OIN-DH' host 84 control signaling responds with 'report error' through routing. It has to be right the second time. If an error is reported again, the 'OIN-DH' host 84 control signaling responds 'still error' through the route, and then hangs up. If a correct or error object exists, the 'OIN-DH' host 84 controls the signaling by routing the response 'terminated'.
在步骤 92 , 报对象终。 ' OIN电子卡' 控制信令通过路由, 报出自己的终。 容 错 N次。 - 在步骤 93 , 进行应答。 如果 N次报错, ' OIN-DH ' 主机 84控制信令通过路 由回应 '无权' 后, 挂机。 如果正确, 回应 '正确' , 报出自己的终。 容错 N次。 In step 92, report object end. The 'OIN electronic card' controls the signaling through routing and reports its own terminal. Fault tolerance N times. - In step 93, answer. If an error is reported N times, the 'OIN-DH' host 84 control signaling responds 'no right' through the route, and then hangs up. If correct, respond 'correct' and announce your end. Fault tolerance N times.
在步骤 94, 收中心终。 ' OIN电子卡' 通过路由接收 ' OIN-DH ' 主机 84的 终信令。 At step 94, the receiving center is terminated. The 'OIN electronic card' receives the final signaling of the 'OIN-DH' host 84 through the router.
在步骤 95 , 进行回复。 如果 N次报错, 控制信令通过路由回应 '无权' 后, 挂 机。 如果正确, 回应 '正确' , 将打包的支付款额、 收款用户帐号数据控制信令通 过路由传输至 ' OIN-DH ' 主机 84 。 In step 95, reply. If an error is reported for N times, the control signaling responds 'no right' through the routing, and then hangs up. If it is correct, respond with 'correct', and transmit the packaged payment amount and receiving user account data control signaling to the 'OIN-DH' host 84 through routing.
在步骤 96 , 分配像标。 ' OIN-DH ' 主机 84通过路由接收妥当后, 报出像标。 在步骤 97 , 结束互认定。 ' OI 电子卡' 通过路由接收 ' OIN-DH ' 主机 84 的像标信令妥当后, 指示结束互认定。 In step 96, icons are assigned. After the 'OIN-DH' host 84 receives it through the router, it reports the image. In step 97, the mutual identification is ended. After the 'OI electronic card' receives the image signaling from the 'OIN-DH' host 84 through the router, it will instruct to end the mutual identification.
在步骤 98 , 进行背景层工作。 ' OIN电子卡' 与 ' OIN-DH ' 主机 84进行像 标层工作。 In step 98, work on the background layer. 'OIN electronic card' and 'OIN-DH' host 84 carry out image labeling work.
' OIN-DH ' 主机 84与银行计算机 85 , 完成互真实认定后, 银行计算机将接 收的打包的付款用户帐号、 支付款额、 收款用户帐号数据解包, 完成划转, 通知 ' OIN-DH ' 主机。 'OIN-DH' host 84 and bank computer 85, after completing mutual authentication, the bank computer unpacks the packaged payment user account number, payment amount, and recipient user account data, completes the transfer, and notifies 'OIN-DH' host.
网络自动后台操作与用户前台操作如下。 Network automatic background operation and user foreground operation are as follows.
在步骤 103 , 进行核对。 ' OIN-DH ' 主机 84通过相应的来话固定电话路由 80 或付款用户来话移动电话路由 82、 收款用户来话移动电话路由 86, 同时通知付款用 户 78、 收款用户 87 , 打包的付款用户帐号、 支付款 '额、 收款用户帐号、 完成划转数 据。 付款用户 78、 收款用户 87的 ' OIN电子卡' 都显示 '付款用户帐号、 支付款额、 收款用户帐号、 完成划转' , 双方核对。 In step 103, check is performed. The 'OIN-DH' host 84 notifies the paying user 78 and the receiving user 87 of the packaged payment through the corresponding incoming fixed-line phone routing 80 or the paying user's incoming mobile phone routing 82 and the receiving user's incoming mobile phone routing 86. User account number, payment amount, receiving user account number, transfer completion data. The 'OIN electronic cards' of the paying user 78 and the receiving user 87 both display 'paying user account number, payment amount, receiving user account number, transfer completed', and both parties check.
在步骤 104, 结束收付。 双方核对正确无误, 完成该此电话货币结算。 如果付款 用户 78、 收款用户 87的 ' OI 电子卡' 各自显示的 "付款用户帐号、 支付款额、 收 款用户帐号、 完成划转" 四项内容有一项有出入, 且重新开始步骤 99。 区别在于步 骤 100, 将 "按 ' OIN - DH ' 付款键" 改为 "按 ' OIN - DH ' 重付键" 。 In step 104, the payment is completed. Both parties check that it is correct and complete the telephone currency settlement. If there is a discrepancy in one of the four items of "paying user account number, payment amount, receiving user account number, and transfer completion" displayed by the 'OI electronic card' of the paying user 78 and the receiving user 87, and restart step 99. The difference is that in step 100, change "press the 'OIN-DH' payment key" to "press the 'OIN-DH' repayment key".
(2) 付款用户 78需从收款用户 87处获取一笔现金, 并从自己帐号划转等额给 收款用户 87的电话货币结算的流程。 (2) The paying user 78 needs to obtain a sum of cash from the receiving user 87, and transfer the same amount from his account to Flow of telephone money settlement of the receiving user 87.
基本相同与 ( 1), 不同处在于: Basically the same as (1), the difference lies in:
付款用户收取收款用户的现金, 而非货物。 The paying user receives cash from the receiving user, not the goods.
3 - ' OIN(Sh)' , 版本 6 . 1 14 。 3 - 'OIN(Sh)' , version 6.114.
' Internet平台上为物理访问、 网上开户的注册用户提供认证与电子商务' 的网 络, 简称 ' OIN(Sh)' 。 标识方法: 二隐层模程, 指定相关码属性状况: 用耗, 更: 预递, 模程运行约束自动识别运行的网络协议, 中心建造在 Inrtemet平台并以信息工 作机群作为支撑环境, 该技术结构称版本 6 . 1 14 。 'Provide authentication and e-commerce for registered users with physical access and online account opening on the Internet platform', referred to as 'OIN(Sh)'. Identification method: two-hidden layer model, specify the relevant code attribute status: consumption, change: advance, model operation constraints automatically identify the network protocol running, the center is built on the Inrtemet platform and uses the information work cluster as a supporting environment, this technology The structure is called version 6.114.
' OIN(Sh)' 网络结构最显著的特点, 是信息加工的周全性。 这是由于中心建造 在 Inrtemet平台并以信息工作机群作为支撑环境的技术结构所决定的。 The most notable feature of 'OIN(Sh)' network structure is the thoroughness of information processing. This is determined by the technical structure of the center built on the Inrtemet platform and using the information work cluster as the supporting environment.
具有物理访问 Inrtemet的设备、在 Inrtemet网上银行开户的客户, 经' OIN(Sh)' 中心 (网络商务中心 105)注册后, 成为 ' OIN(Sh) ' 用户, 获得 " ' OIN(Sh)' 版本 6 . 1 14卡" (本例简称 ' OIN电子卡' )。 Customers who have a device with physical access to Inrtemet and open an account in Inrtemet Internet Banking, become 'OIN(Sh)' users after registering through the 'OIN(Sh)' center (Online Business Center 105), and get "'OIN(Sh)' version 6.1 14 cards" (abbreviated as 'OIN electronic card' in this example).
在 ' OIN电子卡' 指示下的物理访问 Inrtemet的设备, 成为认证访问 Inrtemet 的设备。 A device that physically accesses Inrtemet under the direction of the 'OIN Electronic Card' becomes an authenticated device that accesses Inrtemet.
假如 Inrtemet的可访问设备都取消对访问者的认证,则有能力访问 Inrtemet的可 访问设备,并被访问,称物理访问。物理访问的前提下,有能力通过认证而访问 Inrtemet 的向公众开放但须对访问者认证的设备, 称认证访问。 If Inrtemet's accessible equipment cancels the authentication of the visitor, it has the ability to access Inrtemet's accessible equipment and be accessed, which is called physical access. Under the premise of physical access, the ability to access Inrtemet's equipment that is open to the public but requires authentication of visitors through authentication is called authenticated access.
Internet互认证的流程, 完全等同于 '不考虑控制信令通过路由的电话互认证的 流程' 。 换言之, 控制信令通过路由在 Internet平台上为物理访问的特征, 删除电话 互认证的流程的该特征, 即为 Internet互认证的流程。 The flow of Internet mutual authentication is completely equivalent to the flow of "telephone mutual authentication without considering the routing of control signaling". In other words, the control signaling is a feature of physical access on the Internet platform through routing, and this feature of the process of telephone mutual authentication is deleted, which is the process of Internet mutual authentication.
图 14示出了 Internet互认证的流程。其中方框 114呼叫中心定,方框 115执行应 答, 方框 1 16报对象定, 方框 1 17执行应答, 方框 1 Ϊ8报对象钟, 方框 1 19执行应答 1 19 , 方框 120收中心终, 方框 121回复, 方框 122分配像标, 方框 123结束互认定, 方框 124进行背景层工作。 Figure 14 shows the flow of Internet mutual authentication. The block 114 calls the center, the block 115 executes the response, the block 116 reports the target, the block 117 executes the response, the block 118 reports the object clock, the block 119 executes the response 119, and the block 120 receives At the end of the center, the block 121 replies, the block 122 allocates icons, the block 123 ends the mutual identification, and the block 124 performs background layer work.
本例中 ' OIN(Sh)' 网络结构的各主体单元间的访问, 都为互认证访问。 访问 者身份相当于 ' OIN-DH '用户,其子标设备的作用相当于 ' OIN-DH '的 ' OIN电 子卡' ; 被访问者身分相当于 ' OIN-DH ' 中心, 其标识设备的作用相当于 ' OIN- DH ' 的主机。 互认证访问, 实现防范和抵御攻击的安全保护下的各主体单元间的访 问, 即实现电子商务每一步骤的安全, 从而实现电子商务的安全。 图 15示出了 Internet互认证电子商务结构。 它包括: 用户注册 125, 货物展卖 126 , 和代卖交易 127 。 In this example, the visits between the main units of the 'OIN(Sh)' network structure are mutual authentication visits. The identity of the visitor is equivalent to the 'OIN-DH' user, and its sub-label device is equivalent to the 'OIN Electronic Card' of 'OIN-DH'; the identity of the interviewee is equivalent to the 'OIN-DH' center, and its identification device is Host equivalent to 'OIN-DH'. Mutual authentication access realizes the access between main units under the security protection of preventing and resisting attacks, that is, realizes the security of each step of e-commerce, thereby realizing the security of e-commerce. Figure 15 shows the Internet mutual authentication e-commerce structure. It includes: user registration 125 , merchandise exhibition 126 , and proxy transaction 127 .
(1) 参照图 13和 16 , 描述 Internet用户注册流程。 (1) Referring to Figures 13 and 16, describe the Internet user registration process.
在步骤 128, 客户进行申请。 客户填妥申请文件 (包括客户国籍、 住所、 名称、 物理访问能力、 网上开户行证明、 帐号), 通过银行群 113中网上开户行 (申请当事 行) Internet互认证呈交网络商务中心 105 。 At step 128, the client makes an application. The customer fills in the application documents (including the customer's nationality, residence, name, physical access ability, online account opening bank certificate, account number), and submits to the network business center 105 through Internet mutual authentication of the online account opening bank (application party bank) in the bank group 113.
在步骤 129 , 签订合同。 网络商务中心 105同意客户加人, 签订 ' OIN(Sh) ' 合同, 通过 Internet互认证至申请当事行将 ' OI (Sh)' 合同转呈申请客户。 申请客 户签订 ' OIN(Sh)' 合同, 通过申请当事行 Internet互认证呈交网络商务中心 105 。 In step 129, a contract is signed. The network business center 105 agrees that the customer joins, signs the 'OIN(Sh)' contract, and forwards the 'OI(Sh)' contract to the applicant party through Internet mutual authentication to the applicant party. The applicant client signs the 'OIN(Sh)' contract, and submits to the network business center 105 through the Internet mutual authentication of the applicant party.
在步骤 130 , 发放 ' OIN 电子卡' 。 网络商务中心 105接收 ' OI ( Sh)' 合同, 通过 Internet互认证至申请当事行将 ' OIN电子卡' 转呈申请客户。 In step 130, an 'OIN Electronic Card' is issued. The network business center 105 receives the 'OI (Sh)' contract, and transfers the 'OIN electronic card' to the applicant client through Internet mutual authentication to the applicant party.
客户接收 ' OIN电子卡' , 完成注册, 成为用户。 The customer receives the 'OIN electronic card', completes the registration, and becomes a user.
(2) 参照图 13和 17 , 描述 Internet货物展卖流程。 (2) Referring to Figures 13 and 17, describe the process of Internet goods exhibition and sale.
在步骤 131 , 准备文件资料。 用户群 112中需在 ' OIN(Sh)' 展卖货物的用户 (卖 方用户)填妥 ' OIN(Sh)' 展卖货物合同, 备齐展卖货物资料。 In step 131, file materials are prepared. In the user group 112, the users (seller users) who need to sell goods on the 'OIN(Sh)' fill out the 'OIN(Sh)' exhibition goods contract and prepare the information on the goods on display.
在步骤 132, 执行呈交。 文件资料通过 Internet互认证呈交网络商务中心 105 。 网络商务中心 105 同意卖方用户 ' OIN(Sh)' 展卖货物合同, 将签订的合同通 过 Internet互认证呈交卖方用户。 At step 132, a commit is performed. Documents are submitted to the network business center 105 through Internet mutual authentication. The network business center 105 agrees with the seller user 'OIN(Sh)' to sell the goods contract, and submits the signed contract to the seller user through Internet mutual authentication.
在步骤 133 , 开具展卖货物保险信用证。 卖方用户接收网络商务中心 105同意展 卖的合同后,通过 Internet互认证通知银行群 113中的开户银行 (卖方当事行)开具展卖 货物保险信用证。 In step 133, an insurance letter of credit for goods on display is issued. After the seller user receives the contract that the network business center 105 agrees to sell, it notifies the account opening bank (the seller's party bank) in the bank group 113 through Internet mutual authentication to issue the insurance letter of credit for the goods on display.
卖方当事行通过 Internet互认证将开具的展卖货物保险信用证呈交网络商务中心 The seller's party submits the insurance letter of credit issued by the exhibited goods to the network business center through Internet mutual authentication
105 。 105.
在步骤 134 , 网络商务中心与卖方达成货物展卖合同。 网络商务中心 105接收卖 方当事行开具的信用证后, 该 ' OIN(Sh)' 展卖货物合同生效。 网络商务中心 105通 过 Internet互认证通知卖方用户合同生效。 In step 134, the network business center and the seller reach a goods exhibition contract. After the network business center 105 receives the letter of credit issued by the seller's party, the 'OIN(Sh)' exhibition goods contract becomes effective. The network business center 105 notifies the seller that the user contract becomes effective through Internet mutual authentication.
' OIN(Sh)' 展卖货物合同交合同管理中心 109备案。 展卖货物保险信用证交信 用证管理中心 108备案。 The 'OIN(Sh)' exhibition goods contract is submitted to the contract management center 109 for record. The insurance letter of credit for exhibited goods shall be submitted to 108 of the Letter of Credit Management Center for recordation.
在步骤 135 , 货物展出。 ' OIN(Sh)' 展卖货物合同生效后, 网络商务中心 105 将展卖货物资料提供货物展示中心 107, 在 ' OIN(Sh)' 展卖。 (3) 参照图 13和 18 , 描述代卖交易流程。 In step 135, the goods are displayed. After the 'OIN(Sh)' exhibition goods contract becomes effective, the network business center 105 will provide the goods exhibition center 107 with information on the exhibition goods for sale in 'OIN(Sh)'. (3) Referring to Figures 13 and 18, describe the proxy sale transaction process.
在步骤 136 , 用户浏览货物展示中心。 是开放的, 无须认证。 In step 136, the user browses the display center. It is open and does not require authentication.
在步骤 137 , 用户确定购买货物清单。 用户群 112中的用户 (买方用户)填妥自己 购买货物的清单 (同时具有购买货物合同的文件属性)。 In step 137, the user confirms the purchase list. The user (buyer user) in the user group 112 fills in the list of goods purchased by oneself (having the document attribute of the contract for purchasing goods at the same time).
在步骤 138 , 买方用户通知银行开具信用证。 买方用户通过 Internet互认证通知 银行群 113中的开户银行 (买方当事行)开具信用证。 In step 138, the buyer user notifies the bank to issue the letter of credit. The buyer's user notifies the account opening bank (buyer's party bank) in the bank group 113 to issue the letter of credit through Internet mutual authentication.
在步骤 139 , 网络商务中心接收买方货物清单、 银行开具信用证。 买方用户通过 Internet互认证将购买货物清单呈交网络商务中心 105。 买方当事行通过 Internet互认 证将购买货物信用证呈交网络商务中心 105 。 In step 139, the network business center receives the buyer's goods list and the bank issues a letter of credit. The buyer user submits the purchased goods list to the network business center 105 through Internet mutual authentication. The buyer's party submits the letter of credit for the purchase of goods to the network business center 105 through Internet mutual authentication.
在步骤 140 , 网络商务中心与买方达成代卖合同。 网络商务中心 105接收购买货 物清单、 购买货物信用证后, 该 ' OIN(Sh)' 购买货物合同生效。 网络商务中心 105 通过 Internet 互认证通知买卖双方用户购买货物合同生效。 In step 140, the network business center and the buyer reach a consignment contract. After the network business center 105 receives the list of purchased goods and the letter of credit for purchased goods, the 'OIN(Sh)' contract for purchased goods becomes effective. The network business center 105 notifies both the buyer and the seller that the contract to purchase the goods is effective through Internet mutual authentication.
' OIN(Sh)' 购买货物合同交合同管理中心 109备案。 购买货物信用证交信用 证管理中心 108备案。 通知交易执行中心 110 。 'OIN(Sh)' The goods purchase contract is submitted to the contract management center 109 for record. The letter of credit for the purchase of goods is submitted to the letter of credit management center 108 for recordation. Notify the transaction execution center 110 .
在步骤 141 , 进行交易检査。 交易执行中心 110按照 ' OIN(Sh)' 购买货物合同 通过 Internet互认证检查执行情况。 In step 141, a transaction check is performed. The transaction execution center 110 checks the execution status through Internet mutual authentication according to the 'OIN(Sh)' purchase contract.
在步骤 142 ,进行支付。购买货物合同执行无误后,将购买货物信用证通过 Internet 互认证呈交卖方当事行。 In step 142, payment is made. After the execution of the goods purchase contract is correct, the letter of credit for the purchase of goods will be submitted to the seller's party through Internet mutual authentication.

Claims

权利要求书 claims
1 . 一种开放信息网络向中心申请服务的对象的标中心识方法, 各自具有广义唯 一定的对象与中心相互间广义唯一相关, 实施检识约束下的终中心识, 认定对象, 其 特征在于, 还包括以下步骤: 1. A method for identifying the center of an object that an open information network applies for services to the center, each of which has a broadly unique definition of the object and the center has a generalized unique correlation with each other, and implements the final center recognition under the constraints of inspection and identification to identify the object, which is characterized in that , also includes the following steps:
密层模程唯一确立给定; The dense layer model uniquely establishes the given;
在终中心识的读出靶识运行过程中, 密标层实施直接源靶运行。 During the read-target run of the final core, the cryptogram layer implements a direct source-target run.
2. 根据权利要求 1 所述的方法, 其特征在于, 密层模程由滤层模程取代, 在终 中心识的读出靶识运行过程中, 过滤层控制密标层实施间接源靶运行。 2. The method according to claim 1, characterized in that, the dense layer model is replaced by the filter layer model, and during the target reading process of the final center recognition, the filter layer controls the dense layer to implement indirect source target operation .
3. 根据权利要求 1 所述的方法, 其特征在于, 密层模程由权层模程取代, 在休 止期, 授权层控制密标层源变。 3. The method according to claim 1, wherein the dense layer model is replaced by the weight layer model, and during the rest period, the authorization layer controls the source change of the dense layer.
4. 根据权利要求 1 所述的方法, 其特征在于, 密层模程由级层模程取代, 在休 止期, 级权层控制授权层构造变。 4. The method according to claim 1, characterized in that, the dense layer model is replaced by the hierarchical model, and during the rest period, the structure of the hierarchical control authorization layer changes.
5. 根据权利要求 1 所述的方法, 其特征在于, 密层模程由隐层模程取代, 隐埋 层隐埋像标并提供虚拟标给所需层。 5. The method according to claim 1, wherein the dense layer model is replaced by a hidden layer model, and the hidden layer hides the icon and provides the virtual mark to the required layer.
6. 根据权利要求 1所述方法, 其特征在于, 密层模程由修补模程取代。 6. The method according to claim 1, wherein the dense layer mold is replaced by a repair mold.
7. 一种开放信息网络向中心申请服务的对象的标对象识方法, 各自具有广义唯 一定的对象与中心相互间广义唯一相关, 其特征在于, 还包括以下步骤: 7. A method for identifying objects on an open information network that applies for services from a center, each having a broad-sense unique relationship between the objects and the center, which is characterized in that it also includes the following steps:
模程用于对象与中心间互为狭义唯一可运行的相关; The modular model is used for the only operable relationship between the object and the center in a narrow sense;
在对象子标设备中建有终识; There is a final knowledge built in the object sub-label device;
实施申识约束下的终对象识, 实现使用模程系列方法的真实认定中心。 Implement the final object identification under the constraints of identification, and realize the real identification center using the model series method.
8. 根据权利要求 1 、 2 、 3 、 4 、 5所述的方法, 其特征在于, 还包括以下步 骤: ' 8. The method according to claim 1, 2, 3, 4, 5, further comprising the following steps: '
密标层提供原始密群、 指定状况群; The encryption label layer provides the original encryption group and the specified status group;
用返的约束下, 更构造管理与调用指定状况; Under the constraint of returning, construct management and call the specified situation;
在基准状况的约束下, 依据指定状况读元。 Under the constraints of the base state, the element is read according to the specified state.
9. 根据权利要求 2 、 3 、 4 、 5所述的方法, 其特征在于, 还包括以下步骤: 内靶层在基础状况的约束下, 提供指令状况群; 9. The method according to claims 2, 3, 4, and 5, further comprising the following steps: the inner target layer provides an instruction status group under the constraint of the basic status;
用返的约束下, 挑构造管理与调用指令状况; Under the constraint of return, select structure management and call instruction status;
依据各指令约定通知被管辖层读出密标串, 决定环境密数据单位属性状况群; 依据指令约定形成环境密内靶数据。 Notify the governed layer to read the encrypted string according to the agreement of each instruction, and determine the attribute status group of the environmental encrypted data unit; According to the command agreement, the environment confidential target data is formed.
10. 根据权利要求 3 、 4 、 5所述的方法, 其特征在于, 还包括以下步骤 '· 授权层在基础状况的约束下, 提供指令状况群; 10. The method according to claims 3, 4, and 5, further comprising the following steps: the authorization layer provides an instruction status group under the constraints of the basic status;
在密标层模 n (2)次指定状况各末完返的约束下, 置、 算构造管理与调用指令状 况; Under the constraint of the code layer modulo n (2) times of specifying the situation and returning to the end, set and calculate the structure management and call instruction state;
该使用期终识结束的用返的约束下,依据各指令约定实施管理与调用密标层产生 环境密群状况群; Under the constraints of the use return at the end of the use period, implement management and call the encryption label layer according to the agreement of each instruction to generate an environment encryption group status group;
依据指令约定实施环境密确定该基准状况。 The baseline situation is determined according to the implementation environment of the instruction agreement.
1 1. 根据权利要求 4 、 5所述的方法, 其特征在于, 还包括以下步骤: 11. The method according to claims 4 and 5, further comprising the following steps:
级权层在基础状况的约束下, 提供指令状况群; Under the constraints of the basic conditions, the hierarchy layer provides instruction status groups;
在授权层各末条指令的约束下, 置、 算构造管理与调用指令状况; Under the constraints of the last instructions of the authorization layer, set and calculate the structure management and call instruction status;
该次源变的一生返约束下,依据各指令约定实施管理与调用授权层中产生密标层 环境密群状况群的指令表, 产生授权层环境密构造状况群; Under the lifetime return constraints of this sub-source change, implement management and call the instruction table in the authorization layer to generate the environment encryption group status group in the authorization layer according to the agreement of each instruction, and generate the environment encryption configuration status group in the authorization layer;
依据指令约定实施环境密确定该基础状况。 According to the instruction agreement, the implementation environment is encrypted to determine the basic situation.
12. 根据权利要求 5所述的方法, 其特征在于, 还包括以下步骤: 12. The method according to claim 5, further comprising the following steps:
隐埋层提供指定状况群; The buried layer provides a specified group of conditions;
分别在该使用期终识结束的用返、 客更方法指示的约束下, 层内运行构造管理与 调用指定本、 客号状况; Respectively under the constraints of the user return and customer update method instructions at the end of the use period, the operation structure management and call status of the specified account and customer number in the layer;
依据各指定本号状况实施约定的像元获, 产生像群状况群; According to the status of each designated local number, the agreed pixel acquisition is carried out, and the status group of the group of images is generated;
寄元获的约束下, 指定本号状况实施环境密确定该像基准状况; Under the constraints of Jiyuanhuo, specify the status of this number to implement the environmental code to determine the benchmark status of the image;
依据各指'定客号状况实施约定的读像源取虚拟标, 产生隐埋状况群; According to the status of each designated customer number, the agreed reading image source is used to take the virtual mark, and a hidden status group is generated;
依据指定客号状况约定实施提供虚拟标、 虚拟标群给所需层, 取代透明的像标、 固定的原始密群。 - Provide virtual labels and virtual label groups to the required layers according to the agreement on the status of the designated customer number, replacing the transparent image labels and fixed original secret groups. -
13. 根据权利要求 8所述的方法, 其特征在于, 更构造运行的指定号状况变依据 的号数据变迁的规律为更。 13. The method according to claim 8, characterized in that, the change of the assigned number status of the configuration operation is based on the rule of the number data change.
14. 根据权利要求 8所述的方法, 其特征在于, 更构造运行的默认采用的指定相 关码属性状况变依据的属性数据变迁的规律为换。 14. The method according to claim 8, characterized in that, the rule of attribute data transition based on the attribute status change of the specified correlation code used by default in the construction operation is changed.
15. 根据权利要求 9所述的方法, 其特征在于, 挑构造运行的环境密数据单位属 性状况变依据的属性数据变迁的规律为挑。 15. The method according to claim 9, characterized in that, the rule of attribute data transition based on which the attribute status of the environmental confidential data unit of the construction and operation is changed is selected.
16. 根据权利要求 10所述的方法, 其特征在于, 置、 算构造运行的环境密群状 况变依据的密群数据变迁的规律为: 置, 算。 16. The method according to claim 10, characterized in that, setting and calculating the operating environment of the dense group The law of dense group data transition based on the situation change is: set, calculate.
17. 根据权利要求 1 1 所述的方法, 其特征在于, 置、 算构造运行的环境密构造 状况变依据的规格数据变迁的规律为: 置, 算; 产生的规格数据可能存在偏差, 需要 双方相关唯一的修正。 17. The method according to claim 11, characterized in that, the change rule of the specification data based on the environment and structural conditions of the configuration and operation of the configuration and calculation is as follows: configuration, calculation; the generated specification data may have deviations, and both parties are required Relevant only fixes.
18. 根据权利要求 12 所述的方法, 其特征在于, 层内运行构造的埋状况变依据 的有序产生数据变迁的规律为: 本更, 客更, 像元获, 读像源。 18. The method according to claim 12, characterized in that, the orderly generation of data transitions according to the buried status of the operating structure in the layer is as follows: local update, guest update, pixel acquisition, and image source reading.
19. 根据权利要求 6所述的方法, 其特征在于, 已有资源利用下, 实现对现有标 识体系的真实相关的安全度的修补为: 部分修补。 19. The method according to claim 6, characterized in that, under the utilization of existing resources, the repair of the authenticity-related security degree of the existing identification system is: partial repair.
20. 根据权利要求 7所述的方法, 其特征在于, 对象的终识取代中心的终识, 执 行终对象识任务的具体方法与执行终中心识任务的具体方法为界面镜像关系。 20. The method according to claim 7, wherein the terminal knowledge of the object replaces the terminal knowledge of the center, and the specific method for performing the terminal object recognition task and the specific method for performing the terminal center recognition task are in an interface mirroring relationship.
PCT/CN1998/000189 1997-09-17 1998-09-14 An identification method for mode series of the open information network WO1999014890A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU91509/98A AU9150998A (en) 1997-09-17 1998-09-14 An identification method for mode series of the open information network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 97118320 CN1222703A (en) 1997-09-17 1997-09-17 Identifying method for modular program series in open information network
CN97118320.1 1997-09-17

Publications (1)

Publication Number Publication Date
WO1999014890A1 true WO1999014890A1 (en) 1999-03-25

Family

ID=5174745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN1998/000189 WO1999014890A1 (en) 1997-09-17 1998-09-14 An identification method for mode series of the open information network

Country Status (3)

Country Link
CN (1) CN1222703A (en)
AU (1) AU9150998A (en)
WO (1) WO1999014890A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7991851B2 (en) 2002-02-28 2011-08-02 International Business Machines Corporation Remote user substitution at ODBC/CLI level and stored procedure authorization

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996005675A1 (en) * 1994-08-17 1996-02-22 British Telecommunications Public Limited Company User authentication in a communications network
WO1996013920A1 (en) * 1994-10-27 1996-05-09 International Business Machines Corporation Method and apparatus for secure identification of a mobile user in a communication network
WO1997008665A1 (en) * 1995-08-30 1997-03-06 Citibank, N.A. System and method for commercial payments using trusted agents

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996005675A1 (en) * 1994-08-17 1996-02-22 British Telecommunications Public Limited Company User authentication in a communications network
WO1996013920A1 (en) * 1994-10-27 1996-05-09 International Business Machines Corporation Method and apparatus for secure identification of a mobile user in a communication network
WO1997008665A1 (en) * 1995-08-30 1997-03-06 Citibank, N.A. System and method for commercial payments using trusted agents

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7991851B2 (en) 2002-02-28 2011-08-02 International Business Machines Corporation Remote user substitution at ODBC/CLI level and stored procedure authorization

Also Published As

Publication number Publication date
CN1222703A (en) 1999-07-14
AU9150998A (en) 1999-04-05

Similar Documents

Publication Publication Date Title
US10521777B2 (en) Crypto digital currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices
CN108428168B (en) House renting method and system based on block chain technology
TWI768163B (en) Method and device for generating smart contracts
US20030024988A1 (en) System for providing evidence of payment
EP4000028A1 (en) Systems and methods for commerce in a distributed system with blockchain protocols and smart contracts
Anderson et al. On the reliability of electronic payment systems
CN107403372A (en) Internet finance data processing platform
US20110089233A1 (en) Device and process for the authentication of authorizations or enablement of a person with the use of a mobile communication device
CN110264288A (en) Data processing method and relevant apparatus based on information discriminating technology
US20030205616A1 (en) System and method for managing stored-value card data
US20010001856A1 (en) Prepaid cash equivalent card and system
CN106067124A (en) A kind of Quick Response Code that scans pays and real time record total mark of consumption and the method for rebating
CN1183186A (en) Positive identification system and method
CN103745397A (en) System and method for realizing electronic transaction risk control based on position scene identification
CN103714626A (en) Multi-password pre-warning type bank card capable of being controlled by different card
CN1416552A (en) Electronic ticket system
CN101163067A (en) Building industry cooperation network management system and management method thereof
CN107230055A (en) The method and system of payout figure currency
CN107230050A (en) The method and system of digital cash payment is carried out based on viewable numbers currency chip card
CN104376452B (en) System and method based on international card payment channel managing payment success rate
CN107230068A (en) Use the method and system of viewable numbers currency chip card payout figure currency
US20040034597A1 (en) System and method for managing micropayment transactions, corresponding client terminal and trader equipment
CN112862303B (en) Crowdsourcing quality evaluation system and method based on block chain
CN110689415A (en) Public resource transaction platform management system
CN108460596B (en) Quantization value distribution transfer method based on block chain

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA