Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Message sending method and device, message receiving method and device and equipment

A message sending and message receiving technology, applied in the field of Internet of Vehicles, can solve the problems of ASN.1 encoders such as inability to encode, wrong encoding, and transmission failure, and achieve the effects of reducing data transmission failure, improving security, and accurate encoding

Active Publication Date: 2021-03-09
DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this application is to provide a message sending method, receiving method, device and equipment, so as to solve the problem that the data encrypted to the coordinate value in the prior art does not meet the input requirements of the ASN.1 encoder, resulting in the inability of the ASN.1 encoder Encoding or incorrect encoding, causing transmission failure problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message sending method and device, message receiving method and device and equipment
  • Message sending method and device, message receiving method and device and equipment
  • Message sending method and device, message receiving method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0073] A) the latitude and longitude coordinate value of decimal system is converted into binary number;

[0074] B) Select and set the encryption bit of longitude and latitude coordinates. The encryption bit of longitude coordinate is selected from the low M1 bit of the longitude binary coordinate, and the encryption bit of latitude coordinate is selected from the low M2 of the latitude binary coordinate. The encryption bit can be continuous or discontinuous, and can be an entire byte It can also be a non-integer byte, and the number of encrypted bits for longitude coordinates is X1, and the number of encrypted bits for latitude coordinates is X2;

[0075] C) Encrypt the longitude and latitude encrypted bit data respectively, and return equal-length encrypted values, which are X1 bits and X2 bits respectively;

[0076] D) replace the X1 and X2 bit encrypted bit data in the original latitude and longitude binary coordinate value with the encrypted value;

[0077] E) Convert t...

example 2

[0080]A) Preprocessing the latitude and longitude coordinates, subtracting the minimum value of the effective range of coordinates stipulated by the ASN.1 UPER encoding rule, to obtain the decimal number corresponding to the first data; is a binary number, the difference between the two is the first data; among them, the minimum value of longitude is -1799999999, and the minimum value of latitude is -900000000;

[0081] B) Select and set the longitude and latitude coordinate encryption bits after preprocessing, the longitude coordinate encryption bits are selected from the low M1 bits of the longitude binary coordinates, the latitude coordinate encryption bits are selected from the latitude binary coordinates low M2 bits, the encryption bits can be continuous or discontinuous, and can be It can be an integer byte or a non-integral byte. Note that the number of encrypted bits for longitude coordinates is X1, and the number of encrypted bits for latitude coordinates is X2;

[00...

example 3

[0092] A) ASN.1UPER encoding is performed on the decimal latitude and longitude coordinates;

[0093] B) Set the longitude and latitude coordinate encryption bit, the longitude coordinate encryption bit is selected from the low M1 bit of the longitude data segment in the ASN.1 code stream, the latitude coordinate encryption bit is selected from the low M2 of the latitude and latitude data segment in the ASN.1 code stream, the encryption bit It can be continuous or discontinuous, and it can be an integer byte or a non-integral byte. Note that the number of encrypted bits for longitude coordinates is X1, and the number of encrypted bits for latitude coordinates is X2;

[0094] C) Encrypt the longitude and latitude encrypted bit data respectively, and return the encrypted data of equal length, which are X1 bits and X2 bits respectively;

[0095] D) Replace the X1 and X2 encrypted bit data of the longitude and latitude data segment in the ASN.1 code stream with the encrypted data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message sending method, device and equipment and a message receiving method, device and equipment, and relates to the technical field of Internet of Vehicles, and the messagesending method comprises the steps: obtaining first data determined by a target coordinate; wherein the first data is an M-bit binary number; performing equal-length encryption on data of N bits in Mbits of the first data to obtain second data; wherein the N bits are preset low bits in the first data, M and N are both positive integers, and N is smaller than M; correspondingly updating the dataof the N bits of the first data into the second data to obtain third data of the target coordinates, the third data being data corresponding to the updated first data; and transmitting fourth data determined by the third data. According to the scheme, it can be ensured that the ciphertext after target coordinate encryption meets the input range of the encoder, accurate encoding is achieved, and the possibility of data transmission failure is reduced.

Description

technical field [0001] The present application relates to the technical field of Internet of Vehicles, and in particular, to a message sending method, receiving method, device and equipment. Background technique [0002] At present, in the message layer standard of the vehicle-to-everything (V2X) protocol stack, both messages and data are coded using Abstract Synatax Notation One (ASN.1) Unaligned Compression (UPER) encoding. However, according to the ASN.1UPER encoding rules, for integer data units with fixed upper and lower limits such as integer [a,b], N=log(b-a+1,2) bits are used for encoding. There is no need to generate a length indicator bit. For the input value to be encoded, directly subtract the lower limit value defined by ASN.1, and convert the difference between the two into ASN.1UPER encoded data connected to the data in binary. [0003] Taking longitude as an example, the minimum value is -1799999999, and the maximum value is 1800000001, that is, the number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/40H04L29/08H04L29/06
CPCH04W4/40H04L67/12H04L63/0428H04L69/06
Inventor 陈殿勇房家奕赵锐
Owner DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products