Data transmission method and device and electronic equipment

A data transmission method and data technology, applied in the field of network security, can solve problems such as illegal tampering of access request parameters and response content, and inability to ensure the original integrity of data request or response data, so as to reduce the risk of tampering and ensure the original The effect of completeness

Pending Publication Date: 2020-07-17
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
4 Cites 3 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] In recent years, network security incidents have been on the rise. For example, during the data access process, the parameters of the access request and the content ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In the aforementioned data transmission method provided in the present embodiment, the data sender utilizes the message negotiation mode to obtain the public key pair, and then based on the public key pair, private key and preset secure hash algorithm to treat the requested data The message digest is obtained by digital signature, and finally the message digest, the data to be requested, and the private key are packaged and sent to the data receiver, thus effectively utilizing the one-way hashability of the secure hash algorithm and the security of the negotiated public key Concealment, providing reliable protection for the complete transmission of data and reducing the risk of data tampering
In the data transmission method given above, by carrying out two-way digital signatures to the request data and the response data involved in the data transmission process for data transmission and reception, the risk of data tampering can be effectively reduced, and the originality of data transmission is ensured. integrity.
In the data transmission method provided in the present embodiment, the public key pair is determined through the negotiation between the sending and receiving sides of the data, which can avoid the public key leakage problem that exists when the public key needs to traverse the network in the data transmission process, and can effectively improve The reliability of subsequent digital signature results based on the public key.
In the data transmission process given in this embodiment, the data receiver can use the identification information contained in the received information request message to obtain the corresponding public key pair, and then treat the request based on the public key pair and private key The data is digitally signed to obtain the message digest, and then the integrity of the received information request message is verified based on the message digest, and finally based on the verification result, it is judged whether data is missing or illegally tampered with during data transmission, which is effective Utilizing the one-way hash property of the secure hash algorithm and the concealment of the negotiated public key, it provides reliable guarantee for the complete ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a data transmission method and device, and electronic equipment, and relates to the technical field of network security. The data transmission method comprises steps of based on a public key pair determined by a data receiver and a data sender through message negotiation, performing digital signature on the to-be-requested data in combination with a first private key and asecurity hash algorithm to obtain a first message abstract; packaging the first private key, the first message abstract, the to-be-requested data and the identification information of the data senderto generate an information request message; and sending the information request message to a data receiver, so that the data receiver verifies the integrity of the to-be-requested data based on the first private key and the first message abstract to ensure the original integrity in the data transmission process.

Application Domain

Technology Topic

Image

  • Data transmission method and device and electronic equipment
  • Data transmission method and device and electronic equipment
  • Data transmission method and device and electronic equipment

Examples

  • Experimental program(1)

Example Embodiment

[0028] In order to make the objectives, technical solutions, and advantages of the present application clearer, the technical solutions of the present application will be described clearly and completely in conjunction with specific embodiments of the present application and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.
[0029] The technical solutions provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
[0030] Such as figure 1 As shown, a schematic flow diagram of a data transmission method provided by an embodiment of this application. The method can be applied, but is not limited to the data sender. Specifically, it can be implemented by software or hardware in the data sender. The data sender can be a terminal device. Or the server, this embodiment does not limit this. See again figure 1 The data transmission method given in this embodiment may include the following steps.
[0031] S110: Use a preset public key pair, a first private key, and a secure hash algorithm to digitally sign the requested data to obtain a first message digest.
[0032] Among them, the public key pair can be, but not limited to, the data receiver and the data sender are determined through message negotiation. In this embodiment, the public key pair is pre-determined through negotiation, which can avoid sending an information request message or an information response message. In the process of document receiving, the public key leakage problem exists because the public key is exposed on the network, thereby reducing the risk of illegal tampering during data transmission. In actual implementation, the public key pair can be composed of at least one of numbers, letters, and symbols. The first private key can be, but not limited to, randomly generated by the data sender. For example, in this embodiment, the first private key can be an integer with a larger value, such as 20, 30, etc., which is not done here in this embodiment. limit.
[0033] The secure hash algorithm can be selected, but is not limited to SHA (Secure Hash Algorithm)-256 algorithm, SHA-384, etc., to generate a message digest of a certain length based on the data to be requested. The message digest is not available. reverse. In practical applications, since the secure hash algorithm is a one-way hash, if the data to be requested during the hash operation is the same, then the hash value (first message digest) must be the same, on the contrary, if the data transmission process , The data to be requested is tampered with or there is a problem of data missing, etc., based on the tampered data to be requested, or the problem of data missing, the message digest obtained by hashing the requested data must be different, so that the data receiver can be based on The received message digest verifies the original integrity of the requested data sent by the data receiver.
[0034] Optionally, the data to be requested refers to keywords, identification information, URL information, etc. corresponding to the data that the user needs to obtain, and this embodiment does not limit it here. For example, the data to be requested may be the blog post mid field in the microblog content request initiated by the user.
[0035] S120: Pack the first private key, the first message summary, the data to be requested, and the identification information of the data sender to generate an information request message.
[0036] Wherein, the identification information (User Identification, UID) may be the identification information of the data sender, or the application identification of the application (such as Weibo, etc.) that the user accesses through the data sender, etc., which is not limited in this embodiment .
[0037] S130: Send an information request message to the data receiver, so that the data receiver verifies the integrity of the data to be requested based on the first private key and the first message digest.
[0038] In practical applications, the data receiver can verify the integrity of the data to be requested based on the first private key and the first message digest. For example, the data receiver can generate a message digest corresponding to the data sender. In this way, the matching of the message digest is further verified to determine whether the data to be requested is complete, etc., which is not specifically limited in this embodiment. It should be noted that the integrity refers to whether the data to be requested contained in the information request message has been illegally tampered with, or data is missing during the message transmission process.
[0039] In the foregoing data transmission method given in this embodiment, the data sender obtains a public key pair by means of message negotiation, and then digitally signs the requested data based on the public key pair, private key, and a preset secure hash algorithm. The message digest, finally the message digest, the data to be requested, and the private key are packaged and sent to the data receiver, thereby effectively using the one-way hashing property of the secure hash algorithm and the concealment of the public key determined through negotiation. Provide reliable guarantee for complete data transmission and reduce the risk of data tampering
[0040] Such as figure 2 As shown, the flow diagram of the data transmission method provided by another embodiment of this application can be applied, but is not limited to the data sender, and can be implemented by software or hardware in the data sender. The data sender can be a terminal The device or server is not limited in this embodiment. See again figure 2 The data transmission method given in this embodiment may include the following steps.
[0041] S210: Send a public key negotiation message carrying identification information to the data receiver, so that the data receiver generates a public key pair.
[0042] Wherein, the identification information may be the identification information of the data sender, or the application identification of the application accessed by the user through the data sender, etc., which is not limited in this embodiment. Optionally, the public key pair is randomly generated by the data receiver according to the received public key negotiation message.
[0043] In practical applications, the public key pair may include at least a first public key and a second public key. The first public key is an integer, the second public key is a prime number, and the second public key> The first public key> 1. In this embodiment, the public key pair uses a prime number and an integer to ensure the uniqueness of the result obtained by mod operation based on the public key pair, thereby ensuring the uniqueness of the signature result when the requested data is digitally signed. Sex.
[0044] In addition, in order to facilitate the verification of the original integrity of the message to be requested subsequently sent by the data receiver after receiving the information sender, the data receiver may associate the public key pair with the identification information after generating the public key pair.
[0045] In some implementations, in order to avoid the risk of public key pair leakage due to frequent or long-term use of the public key pair, the data sender and the data receiver may periodically update the public key pair.
[0046] S220, in the case of receiving the public key negotiation response message carrying the public key pair fed back by the data receiver, extract the public key pair, and associate the public key pair with the identification information.
[0047] Among them, by associating and storing the public key pair and the identification information, the corresponding public key pair can be accurately obtained when the data request is made, especially when the identification information is the identification information of the application installed on the data sender , Can quickly call the public key pair corresponding to the identification information.
[0048] S230: Use a preset public key pair, a first private key, and a secure hash algorithm to digitally sign the requested data to obtain the first message digest.
[0049] Regarding the specific execution process of S230, in addition to the detailed description of S110, in a possible implementation of this embodiment, the implementation process of S230 may include: using a pre-saved public key pair to randomly generate the first The private key is encrypted to obtain the first secret key cipher text; the first private key cipher text is used as the salt value (Salt), and the data to be requested is digitally signed using a preset secure hash algorithm to obtain the first message digest.
[0050] Exemplarily, assuming that the public key pair includes at least a first public key g and a second public key p, the first public key g is an integer, the second public key p is a prime number, p>g>1, and the first private key is r, then, using the pre-saved public key to encrypt the randomly generated first private key, the process of obtaining the first secret key cipher text R can be: R=g r modp.
[0051] In addition, it should be noted that the purpose of adding salt when performing secure hashing is to further enhance the security of one-way hashing algorithm. Among them, the actual operation process of adding salt to the secure hashing operation is in this implementation. This example does not repeat this.
[0052] S240: Pack the first private key, the first message digest, the data to be requested, and the identification information of the data sender to generate an information request message.
[0053] For the specific execution process of S240, refer to the foregoing detailed description of S120, which is not repeated in this embodiment.
[0054] S250: Send an information request message to the data receiver, so that the data receiver verifies the integrity of the data to be requested based on the first private key and the first message digest.
[0055] Regarding the specific execution process of S250, in addition to the detailed description of the foregoing S130, in a possible implementation manner of this embodiment, the implementation manner given in S230 is continued, and the data receiver verification given in S250 is received. The process of the original integrity of the data to be requested in the information request message may include: when the data receiver receives the information request message, it may call the corresponding public key pair according to the identification information carried in the information request message , Such as g, p, and then based on the public key pair and the first private key contained in the information request message, the fourth message digest is generated using the same message digest generation method as the aforementioned data sender, if the fourth message The digest matches the first message digest included in the information request message, which indicates that the data to be requested contained in the information request message received by the data receiver is complete and has not been illegally tampered with. Conversely, if the fourth message digest does not match the first message digest, it indicates that the data to be requested is incomplete and may have been illegally tampered with.
[0056] In the data transmission method given in this embodiment, the public key pair is determined through negotiation between the sending and receiving parties, which can avoid the public key leakage problem when the public key needs to traverse the network during the data transmission process, and can effectively improve the subsequent public-based The reliability of the digital signature result achieved by the key.
[0057] Such as image 3 As shown, the flow diagram of the data transmission method provided by another embodiment of this application can be applied, but is not limited to the data sender, and can be implemented by software or hardware in the data sender. The data sender can be a terminal The device or server is not limited in this embodiment. See again image 3 The data transmission method given in this embodiment may include the following steps.
[0058] S310: Use a preset public key pair, a first private key, and a secure hash algorithm to digitally sign the requested data to obtain a first message digest.
[0059] S320: Pack the first private key, the first message summary, the data to be requested, and the identification information of the data sender to generate an information request message.
[0060] S330: Send an information request message to the data receiver, so that the data receiver verifies the integrity of the data to be requested based on the first private key and the first message digest.
[0061] For the specific execution process of S310 to S330, please refer to the foregoing detailed description of S110 to S130, or the foregoing detailed description of S230 to S250, which will not be repeated here in this embodiment.
[0062] S340: In the case of receiving the information request response message, extract the response data, the second message summary, and the second private key included in the information request response message.
[0063] Wherein, the second private key is randomly generated by the data receiver and is used to digitally sign the response data to be sent. For example, it may be an integer with a larger value.
[0064] In practical applications, after the data receiver performs integrity verification on the received information request message, if the data to be requested is complete, then the data receiver can obtain the response data corresponding to the data to be requested, and generate the response data The private key for digital signature when sending, that is, the aforementioned second private key, and then use the public key pair, the first private key, the second private key, etc. to digitally sign the response data to obtain the second message digest, and send the response data , The second message abstract and the second private key are packaged to obtain an information request response message, which is sent to the data receiver.
[0065] It should be noted that when the data receiver generates the second message digest, it can use, but is not limited to, the same or corresponding generation method as the first message digest described above. For example, in this embodiment, in order to improve the security in the data transmission process, the risk of illegal data tampering is further reduced. The process of generating the second message digest by the data receiver may include: invoking a public key pair according to the identification information included in the information request message, and according to the public key pair, the first private key, the second private key, and a preset secure hash The algorithm digitally signs the response data to obtain the second message digest.
[0066] Specifically, assuming that the public key pair includes at least a first public key g and a second public key p, the first public key g is an integer, the second public key p is a prime number, p>g>1, and the second private key is s , Then, the data receiver can encrypt the first private key and the second private key according to the public key to obtain the secret key ciphertext k, such as k=R S modp, where R=g r modp: Use the secret key ciphertext k as the salt value, and use a preset secure hash algorithm to digitally sign the requested data to obtain the second message digest, where the secure hash algorithm can be SHA-256.
[0067] S350: Use the public key pair, the second private key and the secure hash algorithm to digitally sign the response data to obtain a third message digest.
[0068] Among them, the generation rule used by the data sender to generate the third message digest is pre-agreed with the data receiver, so as to ensure the reliability of the integrity verification result. For example, as a possible implementation, the implementation of S350 includes: using a public key pair to encrypt the first private key and the second private key to obtain the private key ciphertext k', k'=S r modp, S=g s modp, r is the first private key randomly generated by the data sender, s is the second private key randomly generated by the data receiver, and the private key ciphertext k'is used as the salt value, and the request is treated with a preset secure hash algorithm The data is digitally signed to obtain the third message summary.
[0069] S360: In a case where the third message digest matches the second message digest, display response data.
[0070] Among them, in the case that the third message digest matches the second message digest, it can be determined that the response data in the information request response message received by the data sender is complete and has not been tampered with. Therefore, the response data can be displayed To the user. On the contrary, it is determined that the response data in the received information request response message is incomplete, and illegal tampering may have occurred, and the data sender can initiate a data request to the data receiver again.
[0071] In the data transmission method given above, by performing two-way digital signatures on the request data and response data involved in the data transmission process of data transmission and reception, it can effectively reduce the risk of data tampering and ensure the original integrity of data transmission.
[0072] Such as Figure 4 As shown, the flow diagram of the data transmission method provided by another embodiment of this application can be applied, but is not limited to the data receiver. Specifically, it can be implemented by software or hardware in the data receiver, and the data sender can be a terminal device. Or the server, this embodiment does not limit this. See again Figure 4 The data transmission method given in this embodiment may include the following steps.
[0073] S410: In the case of receiving the information request message, extract the first private key, the first message summary, the data to be requested, and the identification information included in the information request message.
[0074] S420: Invoke a public key pair corresponding to the identification information, and use the public key pair, the first private key, and a preset secure hash algorithm to digitally sign the requested data to obtain a fourth message digest.
[0075] Among them, the public key pair is determined by the data receiver and the data sender through message negotiation.
[0076] S430: In the case that the fourth message digest matches the extracted first message digest, obtain response data corresponding to the data to be requested, and feed back the response data to the data sender corresponding to the identification information .
[0077] In a possible implementation, the step of feeding back response data to the data sender corresponding to the identification information in S430 may include: generating a second private key, using a public key pair, the first private key, the second private key, and the security The hash algorithm digitally signs the response data to obtain the second message digest; packs the second private key, the second message digest and the response data to generate an information request response message; sends the information request response message to the data sender, The data sender can verify the integrity of the response data based on the first private key, the second private key, and the second message digest.
[0078] For the specific execution process of S410 to S430, reference may be made to the relevant descriptions of S340 to S360 on data reception, data integrity verification and response data feedback, which will not be repeated in this embodiment.
[0079] Further, in an implementation manner, before performing S410, the data receiver given in this embodiment may also include a public key negotiation process, which includes: extracting the public key when a public key negotiation message is received The identification information carried in the negotiation message is generated, and a public key pair is generated; the public key pair is associated with the identification information, and the public key negotiation response message carrying the public key pair is fed back to the data sender corresponding to the identification information. It should be noted that, for the execution process of the aforementioned public key negotiation process, please refer to the detailed description of the aforementioned S210 and S220, which will not be repeated in this embodiment.
[0080] In the data transmission process given in this embodiment, the data receiver can use the identification information contained in the received information request message to obtain the corresponding public key pair, and then digitally perform the requested data based on the public key pair and private key. The message digest is obtained by signing, and the integrity of the received information request message is verified based on the message digest. Finally, based on the verification result, it is judged whether the data is missing or illegally tampered with during the data transmission process. The one-way hash of the column algorithm and the concealment of the negotiated public key provide a reliable guarantee for the complete transmission of data and reduce the risk of data tampering.
[0081] It should be noted that in the foregoing embodiments, according to different application scenarios, the data sender and the data receiver can exchange roles. For example, the data receiver can also perform the steps given in S110 to S130. For the relevant steps of the data transmission method, the data sender can also perform the data transmission given in S410 to S430 to obtain the relevant steps, which is not limited in this embodiment.
[0082] Such as Figure 5 As shown, another embodiment of the present application also provides a data transmission device 500, which uses a data sender, and the device 500 includes a signature module 510, a packaging module 520, and a sending module 530.
[0083] The signature module 510 is configured to use a preset public key pair, a first private key, and a secure hash algorithm to digitally sign the requested data to obtain the first message digest, where the public key pair is passed between the data receiver and the data sender. The message is negotiated.
[0084] The packaging module 520 is configured to package the first private key, the first message digest, the data to be requested, and the identification information of the data sender to generate an information request message.
[0085] The sending module 530 is configured to send an information request message to the data receiver, so that the data receiver verifies the integrity of the data to be requested based on the first private key and the first message digest.
[0086] Regarding the data transmission device 500 in this embodiment, the specific manners of operations performed by each module therein have been described in detail in the embodiment of the method, and detailed description will not be given here.
[0087] Such as Image 6 As shown, another embodiment of the present application also provides a data transmission device 600 that uses a data receiver. The device 600 includes a receiving module 610, a calling module 620, and a verification module 630.
[0088] The receiving module 610 is configured to extract the private key, the message summary, the data to be requested, and the identification information contained in the information request message when the information request message is received;
[0089] The calling module 620 is configured to call the public key pair corresponding to the identification information, and use the public key pair, the private key, and a preset secure hash algorithm to digitally sign the requested data to obtain the fourth message digest;
[0090] The verification module 630 is configured to obtain response data corresponding to the data to be requested when the fourth message digest matches the extracted message digest, and feed back the response data to the data sender corresponding to the identification information.
[0091] Regarding the data transmission device 600 in this embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.
[0092] See Figure 7 , Is a block diagram of an electronic device 700 provided according to an exemplary embodiment. The electronic device 700 may at least include a processor 710 and a memory 720 for storing instructions executable by the processor 710. The processor 710 is configured to execute instructions to implement all or part of the steps of the information interaction method in the foregoing embodiment.
[0093] The processor 710 and the memory 720 are directly or indirectly electrically connected to implement data transmission or interaction. For example, these components can be electrically connected to each other through one or more communication buses or signal lines.
[0094] Among them, the processor 710 is used to read/write data or programs stored in the memory and execute corresponding functions.
[0095] The memory 720 is used for storing programs or data, such as storing executable instructions of the processor 710. The memory 720 can be, but is not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read-only memory (Programmable Read-Only Memory, PROM), and erasable Read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electric Erasable Programmable Read-Only Memory (EEPROM), etc.
[0096] Further, as a possible implementation manner, the electronic device 700 may also include a power supply component, a multimedia component, an audio component, an input/output (I/O) interface, a sensor component, and a communication component.
[0097] The power supply component provides power to various components of the electronic device 700. The power supply components may include a power management system, one or more power supplies, and other components associated with the generation, management, and distribution of power for the electronic device 700.
[0098] The multimedia component includes a screen that provides an output interface between the electronic device 700 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user. The touch panel includes one or more touch sensors to sense touch, sliding, and gestures on the touch panel. The touch sensor can not only sense the boundary of the touch or slide action, but also detect the duration and pressure related to the touch or slide operation. In some embodiments, the multimedia component includes a front camera and/or a rear camera. When the electronic device 700 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
[0099] The audio component is configured to output and/or input audio signals. For example, the audio component includes a microphone (MIC), and when the electronic device 700 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode, the microphone is configured to receive external audio signals. The received audio signal may be further stored in the memory 720 or transmitted via a communication component. In some embodiments, the audio component further includes a speaker for outputting audio signals.
[0100] The I/O interface provides an interface between the processing component and the peripheral interface module. The above-mentioned peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include but are not limited to: home button, volume button, start button, and lock button.
[0101] The sensor assembly includes one or more sensors, which are used to provide the electronic device 700 with various aspects of state evaluation. For example, the sensor component can detect the on/off status of the electronic device 700, the relative positioning of components, such as the display and keypad of the electronic device 700, and the sensor component can also detect the position change of the electronic device 700 or a component of the electronic device 700 , The presence or absence of the user's contact with the electronic device 700, the orientation or acceleration/deceleration of the electronic device 700, and the temperature change of the electronic device 700. The sensor assembly may include a proximity sensor configured to detect the presence of nearby objects when there is no physical contact. The sensor component can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor component may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
[0102] The communication component is configured to facilitate wired or wireless communication between the electronic device 700 and other devices. The electronic device 700 can access a wireless network based on a communication standard, such as WiFi, an operator network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component further includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
[0103] In an exemplary embodiment, the electronic device 700 can be implemented by one or more application specific integrated circuits (ASIC), digital signal processors (DSP), digital signal processing devices (DSPD), programmable logic devices (PLD), field A programmable gate array (FPGA), controller, microcontroller, microprocessor, or other electronic components are implemented to implement the above methods.
[0104] It should be understood that Figure 7 The structure shown is only a schematic structural diagram of the electronic device 700, and the electronic device 700 may also include Figure 7 More or fewer components shown in the Figure 7 Different configurations are shown. Figure 7 The components shown in can be implemented by hardware, software or a combination thereof.
[0105] In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as the memory 720 including instructions, which can be executed by the processor 710 of the electronic device 700 to complete the page processing method described above. For example, the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
[0106] Those skilled in the art should understand that the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
[0107] It should be noted that the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, product or equipment including a series of elements not only includes those elements, but also includes no Other elements clearly listed, or also include elements inherent to such processes, methods, commodities or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity or equipment that includes the element.
[0108] Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
[0109] The above descriptions are only examples of this application and are not intended to limit this application. For those skilled in the art, this application can have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included in the scope of the claims of this application.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Unified account management method and device for a multi-service system

InactiveCN109583901AReduce the risk of tamperingProtocol authorisationService systemDatabase
Owner:BEIJING NONGXIN INTERNET TECH +1

Classification and recommendation of technical efficacy words

  • Reduce the risk of tampering
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products