A confidential coordinate transmission method, system and system usage method

A transmission method and coordinate technology, applied in the transmission system, electrical components, etc., can solve the problems of increasing fixed constants, damage, slow transmission speed, etc., and achieve the effect of saving time and cost and improving real-time performance

Active Publication Date: 2020-06-02
BC P INC CHINA NAT PETROLEUM CORP +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For confidential coordinate network transmission, the main method currently used is manual acquisition and transmission. The disadvantage of this transmission method is that the transmission speed is slow, the cost is high, and real-time transmission cannot be realized. The need for pipeline construction; there is also the method of adding fixed constants. This transmission method is a simple translation of confidential coordinates, which is easy to be cracked and leaked; there is also a method of directly changing the file name without any change in the content. This method Minimal confidentiality, in violation of relevant regulations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A confidential coordinate transmission method, system and system usage method
  • A confidential coordinate transmission method, system and system usage method
  • A confidential coordinate transmission method, system and system usage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] Embodiment 1, a confidential coordinate transmission method, including:

[0075] Step 1: Store the confidential coordinates of the pipeline facilities collected on-site and the result table of surveying and mapping control points in the transmitting security machine, which are respectively recorded as the first data and the second data, and the transmitting security machine calculates the first data and the second data as having relative The non-confidential data of the relationship is recorded as the third data, and the third data is transmitted to the sending intermediate machine by sending the confidential U disk;

[0076] Step 2, receiving and sending the third data transmitted by the confidential U disk in the middle of sending, and transferring the third data to the sending non-confidential U disk;

[0077] Step 3, the sending non-confidential computer receives and sends the third data transmitted by the non-confidential U disk, and sends the third data to the Int...

Embodiment 2

[0112] Example 2, such as figure 1 As shown, a confidential coordinate transmission system includes:

[0113] Sending security machine, which is used to store the confidential coordinates of the pipeline facilities collected on site and the result table of surveying and mapping control points, which are respectively recorded as the first data and the second data, and the first data and the second data are calculated as non- The encrypted data is recorded as the third data, and the third data is delivered to the sending intermediate machine by sending the confidential U disk;

[0114] Sending intermediate machine, it is used for receiving and sending the 3rd data that transmits confidential U disk, and the 3rd data is sent to send non-secret U disk;

[0115] Sending non-confidential machine, which is used to receive and send the third data transmitted by the non-secret U disk, and send the third data to the Internet;

[0116] A receiving non-confidential machine, which is use...

Embodiment 3

[0125] Embodiment 3, a method for using a secure coordinate transmission system, comprising:

[0126] Step S1, compiling the control point file, which is the second data;

[0127] Step S2, bringing the control point file to the construction site;

[0128] Step S3, taking the control point file to other office locations that need to receive confidential coordinates;

[0129] Step S4, collect the confidential coordinate points of the pipeline facilities at the construction site, and compile the collection point file, which is the first data;

[0130] Step S5, storing the second data and the first data in the sending security machine;

[0131] Step S6, calculating the relational data file in the sending security machine, which is the third data;

[0132] Step S7, the third data is connected to the sending intermediate machine through the sending confidential U disk;

[0133] Step S8, disinfecting the sending confidential U disk and the sending non-confidential U disk on the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security coordinate transmission method. The method comprises the following steps: a pipeline facility security coordinate collected in site and a mapping control point result table are stored in sending security equipment; the sending security equipment computes a relative relation of two pieces of data and transmits the relative relation to sending intermediate equipment through a sending security U disk; the sending intermediate equipment receives the relative relation data and transmits the same to a sending non-security U disk; the sending non-security U disk receives the relative data and sends the same to the internet; receiving non-security equipment receives the relative relation data and transmits the same to receiving intermediate equipment through a receiving non-security U disk; the receiving intermediate equipment receives the relative relation data and transmits the same to the receiving security equipment through a receiving security U disk; the receiving security equipment receives the relative relation data and computes together with the mapping control point result table stored in the receiving security equipment to relieve the relativerelation, thereby acquiring the pipeline facility security coordinate collected in site. The invention further provides a security coordinate transmission system and a system use method thereof. The security coordinate transmission method disclosed by the invention has the advantages of being fast in transmission speed and safe in data transmission.

Description

technical field [0001] The invention relates to the technical fields of pipeline construction and surveying and mapping, in particular to a confidential coordinate transmission method, system and system usage method. Background technique [0002] For confidential coordinate network transmission, the main method currently used is manual acquisition and transmission. The disadvantages of this transmission method are that the transmission speed is slow, the cost is high, and real-time transmission cannot be realized. The need for pipeline construction; there is also the method of adding fixed constants. This transmission method is a simple translation of confidential coordinates, which is easy to be cracked and leaked; there is also a method of directly changing the file name without any change in the content. This method Minimal confidentiality, in violation of relevant regulations. Contents of the invention [0003] In order to solve the above problems, the purpose of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 陈瑞良陈雨杉黄丽郭书太丁睿明陈微王坤瑞刘立华刘长清张灵芳王福东高剑锋方广杰石维东罗伟国
Owner BC P INC CHINA NAT PETROLEUM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products