Privacy protection added routing method in opportunity network
A privacy protection and network technology, applied in the field of communication, can solve the problem of high complexity of privacy protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] The routing method for adding privacy protection in the opportunistic network provided by this embodiment will be described in detail below in conjunction with specific algorithms. Before the specific algorithms, the symbols used in the specific algorithms are listed in Table 1.
[0039] Symbols in Table 1 Algorithm
[0040]
[0041]
[0042] figure 1 A flowchart showing a routing method adding privacy protection in an opportunistic network in this embodiment. The routing method of adding privacy protection in opportunistic network is applied in opportunistic network, which is used to realize privacy protection when the nodes in the opportunistic network grasp the encounter and forward the message. Such as figure 1 As shown, the routing method of adding privacy protection in the opportunistic network includes the following steps:
[0043] S10: Initialize the nodes in the opportunistic network, each node includes node privacy information, and the node privacy info...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com