Movatterモバイル変換


[0]ホーム

URL:


CN113423109B - Designated data sharing method facing personal computer user - Google Patents

Designated data sharing method facing personal computer user
Download PDF

Info

Publication number
CN113423109B
CN113423109BCN202110971565.4ACN202110971565ACN113423109BCN 113423109 BCN113423109 BCN 113423109BCN 202110971565 ACN202110971565 ACN 202110971565ACN 113423109 BCN113423109 BCN 113423109B
Authority
CN
China
Prior art keywords
data
equipment
pairing
algorithm
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110971565.4A
Other languages
Chinese (zh)
Other versions
CN113423109A (en
Inventor
高辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhaoruiyoupin Technology Co ltd
Original Assignee
Shenzhen Zhaoruiyoupin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhaoruiyoupin Technology Co ltdfiledCriticalShenzhen Zhaoruiyoupin Technology Co ltd
Priority to CN202110971565.4ApriorityCriticalpatent/CN113423109B/en
Publication of CN113423109ApublicationCriticalpatent/CN113423109A/en
Application grantedgrantedCritical
Publication of CN113423109BpublicationCriticalpatent/CN113423109B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention relates to the technical field of electric digital data processing, in particular to a specified data sharing method facing to a personal computer user. Which comprises the following steps: the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the second encryption authentication pairing is realized by adopting a positioning matching algorithm; the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame; shaping data of a transmission data frame into a plurality of data blocks by adopting a token bucket segmentation algorithm, and integrating and distributing the plurality of data blocks into a token bucket allowing the maximum data frame memory to be less than or equal to the maximum data frame memory for data sharing through a data memory distribution algorithm; the method adopts the MD5 file detection algorithm to check the change before and after data transmission, ensures the security of shared data through twice encryption authentication, and can control the transmission flow.

Description

Designated data sharing method facing personal computer user
Technical Field
The invention relates to the technical field of electric digital data processing, in particular to a specified data sharing method facing to a personal computer user.
Background
The data sharing is that users using different computers and different software in different places can read data of other people and perform various operation operations and analyses, the data sharing degree reflects the information development level of one region and one country, and the higher the data sharing degree is, the higher the information development level is;
at present, two modes of wired and wireless transmission are adopted during data sharing, data on one computer is shared to the content of the other computer, and during wireless transmission, connection needs to be established wirelessly in a Bluetooth or network mode and the like, so that the two computers are configured to transmit the data, and the data are shared;
at present, when two computers share data and establish wireless connection, the two computers cannot be paired in a targeted manner, the transmission of a personal computer cannot be accurately appointed, and the data sharing is easy to be mistakenly connected with other computers, so that the data sharing causes disclosure to other people;
at present, data can not be transmitted according to the flow accepted by a personal computer when data sharing is carried out, when a large amount of data is transmitted, the data driven by the current mobile mode is in explosive growth, the flow of data transmission can not be controlled, the personal computer is easy to cause overload and serious damage during operation, and after the shared data is received, verification cannot be carried out on the data, the data can be damaged or modified in the transmission process, and the normal use of the data is influenced.
Disclosure of Invention
The present invention aims to provide a method for sharing specific data for a personal computer user, so as to solve the problems in the background art.
In order to achieve the above object, the present invention provides a method for sharing designated data for a personal computer user, comprising the steps of:
the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the shared link is established after the pairing is completed;
the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, the pairing is successfully carried out, a pairing success signal is sent, and through the two times of encryption authentication pairing, the pairing between the two computers is more accurate, and the data error transmission is effectively avoided;
the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by adopting a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared, so that the shared flow is controlled, the phenomenon that the computer is overloaded due to rapid increase of the data is avoided, and the personal computer is protected;
the response equipment receives the shared data, the MD5 file detection algorithm is adopted to check the change before and after the data transmission, verify whether the file is damaged or modified in the transmission process, recover the damaged or modified data, verify the received data, recover the damaged or modified data, ensure the safety of the shared data and improve the sharing quality.
As a further improvement of the technical solution, the wireless encryption pairing algorithm includes the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
and then carrying out the authentication in the opposite direction, generating an authentication random number a by the equipment A, sending the authentication random number a to the equipment B, calculating S2 by the equipment B, sending the authentication random number a to the equipment A, comparing whether the calculated S1 is consistent with the information sent by the equipment B by the equipment A, if so, successfully pairing, and otherwise, failing to pair.
As a further improvement of the present technical solution, the positioning matching algorithm includes the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure 276440DEST_PATH_IMAGE002
wherein,
Figure 100002_DEST_PATH_IMAGE003
in response to carrier phase observations at time tk from device R to satellite j,
Figure 865684DEST_PATH_IMAGE004
in response to the geometric distance of the device R from the satellite j at time tk,
Figure 100002_DEST_PATH_IMAGE005
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure 68258DEST_PATH_IMAGE006
is the clock offset for the satellite j,
Figure 100002_DEST_PATH_IMAGE007
in response to the clock difference of the device R,
Figure 384838DEST_PATH_IMAGE008
is the integer ambiguity of the carrier phase,
Figure 100002_DEST_PATH_IMAGE009
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure 871314DEST_PATH_IMAGE010
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure 100002_DEST_PATH_IMAGE011
for errors due to noise of the responding device R,
Figure 862753DEST_PATH_IMAGE012
for errors due to the multipath effect,
Figure 100002_DEST_PATH_IMAGE013
is the wavelength of the carrier;
the method and the device have the advantages that the position information input by the initiating device is compared with the position information positioned by the responding device by adopting a position information comparison algorithm, the verification is successful if the position information is matched with the position information of the initiating device, otherwise, the verification fails, when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
As a further improvement of the technical solution, the position information comparison algorithm includes the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
the character substrings X1 and Y1 are correspondingly matched, the verification fails when ambiguity occurs between X1 and Y1, and the verification succeeds when the ambiguity occurs between X1 and Y1, so that the comparison between the character position information and the positioned position information is more accurate, the matching verification of the position information is ensured, and the safety is higher.
As a further improvement of the present technical solution, the multilink encapsulation algorithm includes the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
the data packet is converted into a frame at a link layer, so that the data occupying a larger memory is encapsulated into a frame, the memory occupied by the data is reduced, the load in the transmission process is favorably reduced, and the transmission efficiency is improved.
As a further improvement of the technical solution, the token bucket partitioning algorithm has a calculation formula as follows:
and (3) segmentation calculation:
Figure 100002_DEST_PATH_IMAGE015
the token bucket stores data blocks:
Figure DEST_PATH_IMAGE017
number of redundant remaining blocks:
Figure DEST_PATH_IMAGE019
the data transmission method includes the steps that X is all data block memories, X1, X2, the page, xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowing the maximum data block to pass through, n is the total number of data blocks, k is the number of transmittable data blocks, and Y is the number of data blocks stored in a buffer mode.
As a further improvement of the technical solution, a data amount calculation formula of the data memory allocation algorithm is as follows:
Figure DEST_PATH_IMAGE021
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
Compared with the prior art, the invention has the beneficial effects that:
1. in the appointed data sharing method facing to the personal computer user, connection is established through twice encryption authentication pairing, then shared data is packaged into frames in initiating equipment, the data is shaped into small data blocks and stored in a token bucket memory and a buffer memory respectively and sequentially transmitted according to the maximum data frame allowed by keying in of responding equipment, shared flow is controlled, then received data is verified, damaged or modified data is recovered, and the safety of the shared data is guaranteed.
2. According to the designated data sharing method for the personal computer user, the positioning matching algorithm is adopted, so that when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the positioning position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
Drawings
FIG. 1 is an overall flow chart of example 1;
FIG. 2 is an overall algorithm block diagram ofembodiment 1;
FIG. 3 is an overall schematic diagram ofembodiment 1;
FIG. 4 is a flowchart of a wireless encryption pairing algorithm ofembodiment 1;
FIG. 5 is a flowchart of the location matching algorithm ofembodiment 1;
FIG. 6 is a flowchart of the multilink encapsulation algorithm ofembodiment 1;
fig. 7 is a flowchart of the token bucket partitioning algorithm ofembodiment 1.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1-7, the present embodiment provides a method for sharing designated data for a personal computer user, including the following steps:
s1, realizing the first encryption authentication pairing by adopting a wireless encryption pairing algorithm, and completing the pairing to establish a shared link;
s2, the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, the pairing is successful, a pairing success signal is sent, the two computers are paired more accurately through the two times of encryption authentication pairing, and the data mistransmission is effectively avoided;
s3, the initiating device receives the signal of 'pairing success', packages the data needing to be transmitted of the initiating device into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
s4, the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared, so that the shared flow is controlled, the phenomenon that the computer is overloaded due to rapid increase of the data is avoided, and the personal computer is protected;
s5, the response device receives the shared data, the MD5 file detection algorithm is adopted to check the change before and after the data transmission, whether the file is damaged or modified in the transmission process is verified, the damaged or modified data is recovered, the received data is verified, the damaged or modified data is recovered, the safety of the shared data is guaranteed, and the sharing quality is improved.
In this embodiment, the wireless encryption pairing algorithm includes the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
and then carrying out the authentication in the opposite direction, generating an authentication random number a by the equipment A, sending the authentication random number a to the equipment B, calculating S2 by the equipment B, sending the authentication random number a to the equipment A, comparing whether the calculated S1 is consistent with the information sent by the equipment B by the equipment A, if so, successfully pairing, and otherwise, failing to pair.
Further, the positioning matching algorithm comprises the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure 614939DEST_PATH_IMAGE002
wherein,
Figure 282681DEST_PATH_IMAGE003
in response to carrier phase observations at time tk from device R to satellite j,
Figure 404090DEST_PATH_IMAGE004
in response to the geometric distance of the device R from the satellite j at time tk,
Figure 600716DEST_PATH_IMAGE005
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure 823887DEST_PATH_IMAGE006
is the clock offset for the satellite j,
Figure 514893DEST_PATH_IMAGE007
in response to the clock difference of the device R,
Figure 507120DEST_PATH_IMAGE008
is the integer ambiguity of the carrier phase,
Figure 140227DEST_PATH_IMAGE009
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure 834382DEST_PATH_IMAGE010
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure 312768DEST_PATH_IMAGE011
for errors due to noise of the responding device R,
Figure 425080DEST_PATH_IMAGE012
for errors due to the multipath effect,
Figure 714242DEST_PATH_IMAGE013
is the wavelength of the carrier;
the method and the device have the advantages that the position information input by the initiating device is compared with the position information positioned by the responding device by adopting a position information comparison algorithm, the verification is successful if the position information is matched with the position information of the initiating device, otherwise, the verification fails, when the initiating device is matched with the responding device, the position information is compared, the character position information input by the initiating device is matched with the position information of the responding device, the accurate connection between the initiating device and the responding device is ensured, the misconnection is avoided, and the data transmission is safer.
Specifically, the position information comparison algorithm includes the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
the character substrings X1 and Y1 are correspondingly matched, the verification fails when ambiguity occurs between X1 and Y1, and the verification succeeds when the ambiguity occurs between X1 and Y1, so that the comparison between the character position information and the positioned position information is more accurate, the matching verification of the position information is ensured, and the safety is higher.
Further, the multilink encapsulation algorithm comprises the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
the data packet is converted into a frame at a link layer, so that the data occupying a larger memory is encapsulated into a frame, the memory occupied by the data is reduced, the load in the transmission process is favorably reduced, and the transmission efficiency is improved.
Besides, the token bucket partitioning algorithm is calculated as follows:
and (3) segmentation calculation:
Figure 912005DEST_PATH_IMAGE015
the token bucket stores data blocks:
Figure 194082DEST_PATH_IMAGE017
number of redundant remaining blocks:
Figure 410168DEST_PATH_IMAGE019
the data transmission method includes the steps that X is all data block memories, X1, X2, the page, xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowing the maximum data block to pass through, n is the total number of data blocks, k is the number of transmittable data blocks, and Y is the number of data blocks stored in a buffer mode.
Specifically, the data amount calculation formula of the data memory allocation algorithm is as follows:
Figure 119498DEST_PATH_IMAGE021
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (2)

1. A specified data sharing method facing to a personal computer user is characterized by comprising the following steps:
the first encryption authentication pairing is realized by adopting a wireless encryption pairing algorithm, and the shared link is established after the pairing is completed;
the positioning matching algorithm is adopted again to realize the second encryption authentication pairing, the connection is disconnected after the pairing is failed, and a pairing success signal is sent after the pairing is successful;
the initiating equipment receives the signal of successful pairing, packages the data needing to be transmitted of the initiating equipment into frames by adopting a multilink packaging algorithm, and keys in the allowed maximum data frame memory to compare with the transmission data frame;
directly transmitting data when the transmission data frame memory is less than or equal to the maximum data frame memory, and sending a transmission signal when the transmission data frame memory is greater than the maximum data frame memory;
the initiating device receives signals, data of a transmission data frame is shaped into a plurality of data blocks by adopting a token bucket segmentation algorithm, the data blocks are integrated and distributed into a token bucket allowing the maximum data frame memory to be smaller than or equal to through a data memory distribution algorithm to share the data, redundant data blocks are buffered and stored until the data in the token bucket are completely transmitted, and the redundant data blocks are integrated into the token bucket until all the data blocks are shared;
the response equipment receives the shared data, an MD5 file detection algorithm is adopted to check the change before and after the data transmission, whether the file is damaged or modified in the transmission process is verified, and the damaged or modified data is recovered;
the wireless encryption pairing algorithm comprises the following steps:
initializing a device A, generating a random number a, and transmitting the random number to a device B through a Bluetooth channel, wherein the device A and the device B respectively generate an initialization key K by using a function E22;
the equipment B generates an authentication random number B and sends the authentication random number B to the equipment A, the equipment A calculates a response number S1 with 32 bits through an authentication function E1 and sends the response number S1 to the equipment B, the equipment B also calculates the response number S2 with 32 bits through an authentication function E1 and compares whether the S1 is consistent with the S2 to continuously complete the pairing process, otherwise, the pairing fails;
then, the authentication in the opposite direction is carried out, the equipment A generates an authentication random number a, the authentication random number a is sent to the equipment B, the equipment B calculates S2 and sends the authentication random number a to the equipment A, the equipment A compares whether the S1 calculated by the equipment A is consistent with the information sent by the equipment B, if so, the pairing is successful, otherwise, the pairing is failed;
the positioning matching algorithm comprises the following steps:
the initiating equipment keys in the character position information of the responding equipment;
the geographic location of the location-responsive device is calculated as follows:
Figure DEST_PATH_IMAGE001
wherein,
Figure DEST_PATH_IMAGE002
in response to carrier phase observations at time tk from device R to satellite j,
Figure DEST_PATH_IMAGE003
in response to the geometric distance of the device R from the satellite j at time tk,
Figure DEST_PATH_IMAGE004
is the broadcast orbital deviation of satellite j, c is the speed of light in vacuum,
Figure DEST_PATH_IMAGE005
is the clock offset for the satellite j,
Figure DEST_PATH_IMAGE006
in response to the clock difference of the device R,
Figure DEST_PATH_IMAGE007
is the integer ambiguity of the carrier phase,
Figure DEST_PATH_IMAGE008
in response to ionospheric delays in signal propagation between the device R and the satellite j,
Figure DEST_PATH_IMAGE009
in response to tropospheric delays in signal propagation between device R and satellite j,
Figure DEST_PATH_IMAGE010
for errors due to noise of the responding device R,
Figure DEST_PATH_IMAGE011
for errors due to the multipath effect,
Figure DEST_PATH_IMAGE012
is the wavelength of the carrier;
comparing the position information input by the initiating equipment with the position information positioned by the responding equipment by adopting a position information comparison algorithm, and if the position information is matched with the position information, the verification is successful, otherwise, the verification fails;
the multilink encapsulation algorithm comprises the following steps:
converting the original data into a data segment at a transmission layer;
converting the data segment into a data packet in a network layer;
converting the data packet into a frame at a link layer;
the token bucket partitioning algorithm has the following calculation formula:
and (3) segmentation calculation:
Figure DEST_PATH_IMAGE013
the token bucket stores data blocks:
Figure DEST_PATH_IMAGE014
number of redundant remaining blocks:
Figure DEST_PATH_IMAGE015
wherein, X is all data block memories, X1, X2.., xn is a single data block memory, Y is a data block memory stored in a token bucket, M is a memory allowed to pass through the maximum, n is the total number of data blocks, k is the number of data blocks capable of being transmitted, and Y is the number of data blocks in buffer storage;
the data volume calculation formula of the data memory allocation algorithm is as follows:
Figure DEST_PATH_IMAGE016
wherein, K is the data amount of transmission, D is the transmission time period, D is the maximum transmission path, M is the total number of times of data block transmission stay, and i is the sequence of the number of times of data block transmission stay.
2. The personal computer user-oriented specified data sharing method according to claim 1, characterized in that: the position information comparison algorithm comprises the following steps:
reading in a character string X of character position information input by initiating equipment and a character string Y of position information positioned by responding equipment;
dividing the character string X into character sub-strings X1, dividing the character string Y into character sub-strings Y1, inquiring an address matching rule tree, limiting the range of alternative fields during the next search according to the rule tree, and reducing the longitudinal search range of matching inquiry;
and correspondingly matching the character sub-strings X1 and Y1, wherein the verification fails when the ambiguity is generated between X1 and Y1, and the verification succeeds when the ambiguity is generated between X1 and Y1.
CN202110971565.4A2021-08-242021-08-24Designated data sharing method facing personal computer userActiveCN113423109B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110971565.4ACN113423109B (en)2021-08-242021-08-24Designated data sharing method facing personal computer user

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110971565.4ACN113423109B (en)2021-08-242021-08-24Designated data sharing method facing personal computer user

Publications (2)

Publication NumberPublication Date
CN113423109A CN113423109A (en)2021-09-21
CN113423109Btrue CN113423109B (en)2021-10-29

Family

ID=77719877

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110971565.4AActiveCN113423109B (en)2021-08-242021-08-24Designated data sharing method facing personal computer user

Country Status (1)

CountryLink
CN (1)CN113423109B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114337992A (en)*2022-03-092022-04-12深圳市华星联科技有限公司Multi-node-based long-distance data low-loss transmission method

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6088693A (en)*1996-12-062000-07-11International Business Machines CorporationData management system for file and database management
CN1777143A (en)*2004-10-252006-05-24阿尔卡特公司 Internal load balancing in data switches using distributed network processing
CN101778089A (en)*2009-01-122010-07-14武汉蓝鲸世纪科技开发有限公司Bluetooth protocol-based high-security peer-to-peer file transmission method
CN101938396A (en)*2009-06-302011-01-05华为技术有限公司 Data flow control method and device
WO2019043687A2 (en)*2017-08-282019-03-07Luminati Networks Ltd.System and method for improving content fetching by selecting tunnel devices
CN110147915A (en)*2018-02-112019-08-20陕西爱尚物联科技有限公司A kind of method and its system of resource distribution
CN110737918A (en)*2019-10-152020-01-31重庆远见信息产业集团有限公司External data sharing management platform
CN111010437A (en)*2019-12-122020-04-14深圳市深智电科技有限公司Intelligent media playing system and control method
CN111399874A (en)*2020-03-052020-07-10Tcl移动通信科技(宁波)有限公司System upgrading method and device, storage medium and intelligent wearable device
CN112073521A (en)*2020-09-102020-12-11成都中科大旗软件股份有限公司Sharing scheduling method and system for scattered data
CN112231284A (en)*2020-09-282021-01-15广西犇云科技股份有限公司 Blockchain-based big data sharing system, method, device and storage medium
CN112787950A (en)*2021-01-282021-05-11西安交通大学Fair network flow management and control method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6088693A (en)*1996-12-062000-07-11International Business Machines CorporationData management system for file and database management
CN1777143A (en)*2004-10-252006-05-24阿尔卡特公司 Internal load balancing in data switches using distributed network processing
CN101778089A (en)*2009-01-122010-07-14武汉蓝鲸世纪科技开发有限公司Bluetooth protocol-based high-security peer-to-peer file transmission method
CN101938396A (en)*2009-06-302011-01-05华为技术有限公司 Data flow control method and device
WO2019043687A2 (en)*2017-08-282019-03-07Luminati Networks Ltd.System and method for improving content fetching by selecting tunnel devices
CN110147915A (en)*2018-02-112019-08-20陕西爱尚物联科技有限公司A kind of method and its system of resource distribution
CN110737918A (en)*2019-10-152020-01-31重庆远见信息产业集团有限公司External data sharing management platform
CN111010437A (en)*2019-12-122020-04-14深圳市深智电科技有限公司Intelligent media playing system and control method
CN111399874A (en)*2020-03-052020-07-10Tcl移动通信科技(宁波)有限公司System upgrading method and device, storage medium and intelligent wearable device
CN112073521A (en)*2020-09-102020-12-11成都中科大旗软件股份有限公司Sharing scheduling method and system for scattered data
CN112231284A (en)*2020-09-282021-01-15广西犇云科技股份有限公司 Blockchain-based big data sharing system, method, device and storage medium
CN112787950A (en)*2021-01-282021-05-11西安交通大学Fair network flow management and control method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
IoT Meets Blockchain: Parallel Distributed Architecture for Data Storage and Sharing;Shaowei Liu, Jing Wu, Chengnian Long;《2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing,Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics》;20190603;全文*
基于API模式的高校数据共享平台建设研究;杨少冬;《电子技术与软件工程》;20210415;全文*
基于集群共享存储的飞行数据处理系统设计;王敏,沈志平;《信息化研究》;20170220;全文*

Also Published As

Publication numberPublication date
CN113423109A (en)2021-09-21

Similar Documents

PublicationPublication DateTitle
US10885814B2 (en)Share recovery system, share recovery apparatus, share recovery method, and program
US20110093712A1 (en)Communication device supporting pairing
CN112262544B (en)Device, system and method for generating and processing cryptographic parameters
CN103973434A (en)Authenticated key exchange based on pairwise master key
CN113423109B (en)Designated data sharing method facing personal computer user
US11770212B2 (en)Data transmission methods, data transmission device, and data transmission apparatuses
CN113454628B (en) Secure computing network device and method
KR102024991B1 (en)Flying apparatus and data transmission method thereof
CN111465006A (en) Beidou short message encryption and decryption method and communication system based on Zu Chongzhi algorithm
CN120090885B (en) Data transmission method and intelligent gateway terminal based on Dianhong IoT operating system
CN111432010B (en)Block chain platform facing mobile terminal and communication method
CN110287733B (en)File tamper-proofing method and device
US20140149744A1 (en)Method for obtaining encryption keys corresponding terminals, server and computer program products
CN112996099B (en) Transmission and reception method of polarized time slot ALOHA resistant to time slot erasure
CN118694614B (en)Communication network security management method and system
Daraban et al.Protocol over uart for real-time applications
CN102325025A (en) Data processing method and system for providing source authenticity
EP3878115B1 (en)Apparatus and methods for real time soft combining of decrypted data
CN118474708A (en) Authorization-free access method, device, terminal equipment and storage medium based on sparse vector coding
US12166860B2 (en)Method for forming Bluetooth network performing communication based on post-quantum cryptography at application level and operating Bluetooth network operating system performing same
US12095574B2 (en)Eavesdropper detection apparatus and operating method thereof
JP3431136B2 (en) Transmission data loss detection system
CN1856956A (en)Data encryption method and apparatus
CN113630895A (en)Data packet transmission method and device
CN114070693A (en)Data transmission method and device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp