An Adaptive Monitoring Method for Individual Soldiers on Duty
A self-adaptive, individual-soldier technology, applied in branch offices providing special services, digital transmission systems, data exchange networks, etc., can solve problems such as loss and confusion, and achieve the effect of avoiding information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] refer to figure 1 , an adaptive individual duty monitoring method proposed by the present invention includes the following steps.
[0019] S1. Establish an encrypted communication group for each individual device. Each communication device in the encrypted communication group stores the terminal address of the individual device with communication needs, and each communication device in the encrypted communication group only communicates with the individual device that stores the terminal address. device communication. During specific implementation, each individual soldier device exists in each other's encrypted communication group.
[0020] The establishment of an encrypted communication group imposes a range limit on the communication of individual soldier devices, thereby avoiding the situation that information leakage occurs when each communication device in the encrypted communication group is accessed by an illegal individual device.
[0021] S2. Establish an ex...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
