Unlock instant, AI-driven research and patent intelligence for your innovation.
Web map transmission-based data security communication method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A map data and data security technology, applied in the field of data security communication, can solve the problems of inability to carry different types of map offsets, return data errors, reduce map data security, etc. Safety, the effect of increasing use value
Active Publication Date: 2019-03-01
中电科新型智慧城市研究院有限公司
View PDF6 Cites 3 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0002] At present, map transmission is asynchronously requesting the back-end server on the basis of web through http or https, and the request process is all plain text transmission. Illegal personnel can crawl key data through packet capture tools and obtain map data requested by the front end, greatly reducing Security of map data
At the same time, the existing front-end request data packet can only carry the parameters of the map required by the request, but cannot carry the offsets of different types of maps, resulting in errors in the returned data
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0029] see figure 1 , a data security communication method based on web map transmission, comprising the following steps:
[0030] The front end (that is, the requesting end) sends a map data request packet through the TCP protocol. The map data request packet includes a fixed-length protocol header and a customizable GeoJSON protocol body. experience information, the GeoJSON protocol body contains the basic attributes and extended attributes of the requested map; the basic attributes include point, line, area, multi-point, multi-line, multi-face and geometry collection, and the extended attributes include map type and offset quantity;
[0031] After receiving the map data request packet, the back-end server verifies the verification information in it, parses the basic attributes and extended attributes in the GeoJSON protocol body after the verification is passed, and then obtains the front-end required information from the server according to the basic attributes and extend...
Embodiment 2
[0044] see figure 1 , a data security communication system based on web map transmission, comprising a front end and a server, the front end and the server are provided with a memory and a processor, each of the memory stores instructions, and the instructions are loaded and executed by the processor The following steps:
[0045] The front end sends a map data request packet through the TCP protocol, and the map data request packet includes a fixed-length protocol header and a customizable GeoJSON protocol body, and the protocol header contains verification information for back-end server verification. The GeoJSON protocol body contains the basic attributes and extended attributes of the requested map; the basic attributes include point, line, area, multi-point, multi-line, multi-face, and geometry collection, and the extended attributes include map type and offset;
[0046] After receiving the map data request packet, the back-end server verifies the verification information...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a web map transmission-based data security communication method. The web map transmission-based data security communication method comprises the following steps that a front end sends a map data request packet through a TCP, wherein the map data request packet comprises a fixed length of protocol head and a customized GeoJSON protocol body, the protocol head comprises verification information for verification by a rear end server, and the GeoJSON protocol body comprises a base attribute and an extended attribute of the requested map; and the rear end server receives the map data request packet, verifies the verification information, analyzes the base attribute and the extended attribute in the GeoJSON protocol body after the verification succeeds, then acquires mapdata demanded by the front end from the server according to the base attribute and the extended attribute, and returns the map data to the front end finally. The method improves security of map datatransmission, and analyzes map information rapidly and accurately.
Description
technical field [0001] The invention relates to a data security communication method and system based on web map transmission, belonging to the field of mobile communication data transmission. Background technique [0002] At present, map transmission is asynchronously requesting the back-end server on the basis of web through http or https, and the request process is all plain text transmission. Illegal personnel can crawl key data through packet capture tools and obtain map data requested by the front end, greatly reducing Security of map data. At the same time, the existing front-end request data packet can only carry the parameters of the map required for the request, but cannot carry the offsets of different types of maps, resulting in errors in the returned data. Contents of the invention [0003] In order to solve the above technical problems, the present invention provides a data security communication method based on web map transmission, which can prevent reptil...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.