A Secure Processing Method of Variable Signature Uniqueness Based on Redundant Coding
A technology of secure processing and redundant coding, applied in the field of secure coding, it can solve the problems of inability to detect system faults, inconvenient quantitative analysis of the system, etc. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0040] figure 1 Shown is a schematic diagram of the structure of the functional modules of the present invention. The present invention includes sequentially entering the signature distribution module, signature calculation module, and signature checking module through the signature generation module, and finally storing the signature in the signature storage module.
[0041] figure 2 Shown is the work flow chart of the present invention, below in conjunction with Figure 2-Figure 7 Describe each step in detail:
[0042] Step 1: Generate a signature according to the signature generation algorithm, image 3 is the specific steps of the signature generation module, if the number of generated signatures is sufficient, turn to step 2, otherwise continue to step 1. For example, it can be set to generate 10000 signatures.
[0043] Step 2: Input the file to be encoded, determine the type of the statement to be encoded, and assign or calculate a signature for each variable.
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 