Unlock instant, AI-driven research and patent intelligence for your innovation.

A Secure Processing Method of Variable Signature Uniqueness Based on Redundant Coding

A technology of secure processing and redundant coding, applied in the field of secure coding, it can solve the problems of inability to detect system faults, inconvenient quantitative analysis of the system, etc. Effect

Active Publication Date: 2015-10-14
CASCO SIGNAL
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the signature of the variable is not unique, it will cause the failure of the system to be detected, and it is not convenient to conduct quantitative analysis on the security of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Processing Method of Variable Signature Uniqueness Based on Redundant Coding
  • A Secure Processing Method of Variable Signature Uniqueness Based on Redundant Coding
  • A Secure Processing Method of Variable Signature Uniqueness Based on Redundant Coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] figure 1 Shown is a schematic diagram of the structure of the functional modules of the present invention. The present invention includes sequentially entering the signature distribution module, signature calculation module, and signature checking module through the signature generation module, and finally storing the signature in the signature storage module.

[0041] figure 2 Shown is the work flow chart of the present invention, below in conjunction with Figure 2-Figure 7 Describe each step in detail:

[0042] Step 1: Generate a signature according to the signature generation algorithm, image 3 is the specific steps of the signature generation module, if the number of generated signatures is sufficient, turn to step 2, otherwise continue to step 1. For example, it can be set to generate 10000 signatures.

[0043] Step 2: Input the file to be encoded, determine the type of the statement to be encoded, and assign or calculate a signature for each variable.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safe processing method for variable signature uniqueness based on redundant coding. The method comprises the following steps: (1) generating a signature according to a signature generating algorithm; (2) inputting a to-be-coded file, judging the to-be-coded statement types, and distributing or calculating a signature for each variable; (3) subjecting the signature obtained in the step (2) to signature uniqueness inspection, if the signature is the same with the distributed signature, turning to the step (4), or otherwise, turning to the step (5); (4) taking and distributing another signature to the variable from a signature list, and turning to the step (3); (5) storing the signature subjected to the signature uniqueness inspection and judging whether the coding is finished, if the end of the to-be-coded file is not reached, turning to the step (2), otherwise, turning to the step (6); and (6) ending. Compared with the prior art, the safe processing method has the advantages of reducing the non-detectability of systemic errors greatly, and the like.

Description

technical field [0001] The invention relates to a security encoding technology, in particular to a method for safely processing the uniqueness of variable signatures based on redundant encoding. Background technique [0002] In the existing secure redundant coding system, high and low bits are generated for all variables in the source code. The high bits store the variable values ​​of the source code, and the low bits store the verification information of the variables. The signature of the variable can be calculated through the high and low bits. . Therefore, after each cycle of the system runs, you can check whether the signature of the variable is correct to determine whether the system has addressing errors, hardware failures and other failures (not the logic errors of the system itself) during the operation of the system. If the signature of the variable is not unique, the fault of the system may not be detected, and it is also inconvenient to conduct quantitative anal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/08
Inventor 孙军峰汪明新张磊曹杰秘慧杰江伟何昀锋
Owner CASCO SIGNAL