A retransmission method based on finite state machine and its validity verification method

A finite state machine and three-state technology, applied in the information field, can solve problems such as poor communication quality and poor security, and achieve the effects of high authentication success rate, high security, and reasonable authentication delay

Active Publication Date: 2021-12-07
重庆高开清芯科技产业发展有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to effectively solve the problems of poor communication quality and poor security in the prior art, the present invention provides a retransmission method based on a finite state machine and its validity verification method, which enhances the communication quality and improves the authentication success rate. security and verified the effectiveness of the retransmission method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A retransmission method based on finite state machine and its validity verification method
  • A retransmission method based on finite state machine and its validity verification method
  • A retransmission method based on finite state machine and its validity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]The objects and functions of the present invention and methods for achieving the objects and functions will be clarified by referring to the exemplary embodiments. However, the present invention is not limited to the exemplary embodiments disclosed below; it can be implemented in various forms. The essence of the description is only to help those skilled in the relevant art comprehensively understand the specific details of the present invention.

[0045] Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings. In the drawings, the same reference numerals represent the same or similar components, or the same or similar steps.

[0046] According to the present invention, this embodiment provides a retransmission method based on a finite state machine. In this embodiment, a retransmission method based on a finite state machine will be described in detail by taking the user authentication communication process as an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a retransmission method based on a finite state machine. The retransmission method is based on partial retransmission technology. The client and the server use a finite state machine, wherein the finite state machine includes three states: working, inquiry and pause. When data packets are lost during user data transmission, the data packets are retransmitted through the conversion of three states, which improves the quality of information transmission, enhances the security of data transmission, and prevents channel congestion and user information from being stolen. By establishing the main algorithm model and the reference algorithm model, the success rate, delay and security of the data retransmission method are investigated to achieve the goal of verifying the effectiveness of the retransmission method based on the finite state machine.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for retransmitting user information data. Background technique [0002] At present, in the various processes of user authentication, whether it is one-way or two-way authentication, the main authentication communication steps can be roughly divided into four steps (C means client, S means server): [0003] (1) C→S, authentication request (user serial number) [0004] (2) S→C, impact code 1 [0005] (3) C→S, response code 1. If it is biometric authentication, plus biometric information. If it is two-way authentication, plus shock code 2 [0006] (4) S→C, whether to pass or not. If it is two-way authentication, plus response code 2 [0007] In the case that the connection cannot be maintained, packet loss may occur in any of the above four steps. In view of this situation, most systems adopt the common state machine model of the server and the user. The transmi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/16H04L1/18H04L12/26
CPCH04L1/1664H04L1/1858H04L43/0829H04L43/106
Inventor 袁喆喻盛琪
Owner 重庆高开清芯科技产业发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products