Network RTK data security determination method and apparatus, and electronic device
A technology for data security and determination method, which can be used in measurement devices, radio wave measurement systems, satellite radio beacon positioning systems, etc., and can solve problems such as data tampering or leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0034] Input the first string and the second string into the string comparison function; if the output result of the string comparison function is 0, the comparison result is that the first string is consistent with the second string; if the output result of the string comparison function If it is not 0, the comparison result is that the first character string is inconsistent with the second character string. The above-mentioned string comparison function may be a strcmp() function in C language, a function that can implement string comparison in C language or Java language, or other algorithms that can implement string comparison.
[0035] In a specific implementation manner, the above-mentioned first character string is obtained by the base station operating on the original observation data based on a hash function. The second character string is obtained by calculating the original observation data sent by the base station by the central solution software based on the hash fun...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


