Data processing method, device, equipment and system
A data processing device and data processing technology, applied in the field of information security, can solve the problems of data monitoring, theft, and low security of bank self-service equipment, and achieve the effect of ensuring uniqueness and security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] figure 1 It is a flow chart of a data processing method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where the first module sends data to the second module and receives the data returned by the second module. This method can be processed by data device, the data processing device may consist of hardware and / or software, and be integrated in electronic equipment. Specifically include the following steps:
[0049]S110. Obtain data to be sent by the first module and an identifier corresponding to the current sending order of the first module.
[0050] The first module and the second module are two modules for data interaction in the data processing system. For example, in bank self-service equipment, the first module is the industrial control host, and the second module is the cash machine.
[0051] Exemplarily, the data to be sent by the first module includes a command and parameters corresponding to the command. Fo...
Embodiment 2
[0071] In this embodiment, the above-mentioned embodiment is further optimized, and S150 in the above-mentioned embodiment is specifically: if the identification corresponding to the sending order of the second module is the same as the identification corresponding to the current sending order of the first module, send the second module The data is processed; or, if the identification corresponding to the sending order of the second module and the identification corresponding to the current sending order of the first module meet the preset mathematical operation rules, the data sent by the second module is processed.
[0072] Assume that the identification corresponding to the current sending order of the first module is A, and the identification corresponding to the sending order of the second module is B. Optionally, the preset mathematical operation rules include the following:
[0073] B=A+N, B=A-N, B=A / N, B=A*N, where N is a natural number. Identity A and identity B can b...
Embodiment 3
[0076] This embodiment further optimizes the above-mentioned embodiment, and specifically defines "obtaining the identification corresponding to the current sending order of the first module" in the above-mentioned embodiment as "obtaining the identification corresponding to the latest sending order of the first module history; The identifier corresponding to the most recent sending order in the history of a module is increased or decreased by a unit value to obtain the identifier corresponding to the current sending order of the first module".
[0077] The most recent sending order in the history of the first module refers to the previous sending order. For example, the identification corresponding to the previous sending order is 1, then the identification corresponding to the current sending order of the first module increases or decreases the unit value on the basis of 1, such as 2, and the identification corresponding to the current sending order of the first module 3 or ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



