Unlock instant, AI-driven research and patent intelligence for your innovation.

Abstract-based software trusted message implementation method

An implementation method and message technology, applied in the computer field, can solve the problems of bit error rate limitation, message transmission errors, and inability to fully guarantee the correctness of message layer data, and achieve small resource constraints, high reliability, and complete response to messages. The effect of reliability

Pending Publication Date: 2021-03-05
JIANGNAN INST OF COMPUTING TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] During the communication process, the transmission of messages may be subject to external interference such as channel noise and cause errors, resulting in inconsistencies between the content of the message received by the message receiver and the content sent by the sender
However, the error detection algorithm usually used by network hardware has a certain probability of false positives and false positives due to the limitations of performance and hardware structure; moreover, the packet layer error checking used by hardware cannot fully guarantee the data at the message layer. correctness
[0003] Existing message credibility usually relies on network hardware to check data packets to ensure that this error detection mechanism has two disadvantages: 1. The hardware usually uses a low-overhead CRC (Cyclic Redundancy Check, Cyclic Redundancy Check) algorithm As a data packet error detection algorithm, the bit error rate of the CRC algorithm is limited by the number of hardware bits; 2. For high-level users, the accurate transmission of data packets does not mean that the user information is correct, because when the data packet is converted to the user The message process also includes steps such as packet header parsing and memory copying that may cause message content errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abstract-based software trusted message implementation method
  • Abstract-based software trusted message implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0015] Embodiment: a method for implementing a digest-based software trusted message, based on a language-level message library MPI, comprising the following steps:

[0016] S1. The sender of the message calculates the digest D of the user message M, and calls the network driver interface to send M and D to the receiver of the message successively according to the agreed order;

[0017] S2. The receiver of the message receives M and D from the sender, and obtains the messages M' and D' corresponding to M and D;

[0018] S3. The recipient of the message calculates the digest D" of M';

[0019] S4. The receiver of the message compares D' and D", if D' is the same as D", it indicates that the content of the received message is credible, and releases the relevant data structure, otherwise the alarm exits.

[0020] Examples are further explained as follows:

[0021] The present invention can be implemented in the language-level message library MPI, and the advantage of this metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abstract-based software trusted message implementation method which is based on a language-level message library MPI and comprises the following steps: S1, a message sendercalculates an abstract D of a user message M, and calls a network driving interface to send the M and the D to a message receiver in sequence; s2, the receiver of the message receives the M and the Dfrom the sender to obtain messages M'and D 'corresponding to the M and the D; S3, the receiver of the message computes a digest D "of M '; and S4, the receiver of the message compares the D' with theD ', and if the D' is the same as the D ', the content of the received message is credible, otherwise, the alarm exits. The method directly verifies the correctness of the content of the message froma message level, is more flexible and convenient, is less limited by resources, has high credibility, and can reflect the credibility of the message more directly and more completely.

Description

technical field [0001] The invention relates to a method for realizing a digest-based software trusted message, which belongs to the technical field of computers. Background technique [0002] During the communication process, the transmission of messages may be subject to external interference such as channel noise, resulting in errors, resulting in inconsistencies between the content of the message received by the message receiver and the content sent by the sender. However, the error detection algorithm usually used by network hardware has a certain probability of false positives and false positives due to the limitations of performance and hardware structure; moreover, the packet layer error checking used by hardware cannot fully guarantee the data at the message layer. correctness. [0003] Existing message credibility usually relies on network hardware to check data packets to ensure that this error detection mechanism has two disadvantages: 1. The hardware usually us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L1/00
CPCH04L63/123H04L1/0078H04L1/004
Inventor 于康何王全卿鹏方燕飞董恩铭李雁冰
Owner JIANGNAN INST OF COMPUTING TECH