CN116633543B - 1553B communication protocol data encryption method - Google Patents
1553B communication protocol data encryption method Download PDFInfo
- Publication number
- CN116633543B CN116633543B CN202310896293.5A CN202310896293A CN116633543B CN 116633543 B CN116633543 B CN 116633543B CN 202310896293 A CN202310896293 A CN 202310896293A CN 116633543 B CN116633543 B CN 116633543B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- data block
- algorithm
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 title claims abstract description 27
- 230000008569 process Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 abstract description 13
- 238000013075 data extraction Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005587 bubbling Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
A1553B communication protocol data encryption method belongs to the technical field of communication protocol data encryption, and comprises the following steps: step S01: defining an interface data file format for specifying data writing and reading; step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte; step S03: data is input according to the interface data file prescribed format; step S04: splitting the input data block into data blocks to be encrypted with equal size, and the like. The 1553B data transmission communication network of the encryption algorithm adopts a plurality of encryption algorithms to randomly combine and encrypt, and has strong safety and reliability.
Description
Technical Field
The invention belongs to the technical field of communication protocol data encryption, and particularly relates to a 1553B communication protocol data encryption method.
Background
The 1553B bus is called MIL-STD-1553B digital time-division command/response type multiplexing data bus, and is a digital time-division serial data bus. Currently, standard 1553B communication protocols are widely adopted in an avionics system for data transmission. The 1553B communication protocol is efficient and stable in data transmission, but because all devices adopt the 1553B communication protocol with the same standard, potential safety hazards exist, and the safety and reliability of a communication network are affected.
At present, the common 1553B data encryption method comprises the following steps:
1) Obtaining data to be encrypted, and determining the dividing number according to the memory occupation size of the data to be encrypted;
2) Average segmentation is carried out on the data to be encrypted according to the segmentation quantity, and unordered data blocks are obtained;
3) Adding sequential codes to the head of the unordered data block to obtain a data block to be encrypted;
4) Recording time information formed by each data block to be encrypted to obtain encrypted time data;
5) According to the encryption time data, a corresponding data extraction scheme is called from a preset database, and data extraction is carried out on the data blocks to be encrypted according to the data extraction scheme;
6) Analyzing the encryption time data, and extracting seconds and milliseconds to obtain two groups of random numbers;
7) According to the two groups of random numbers, a corresponding data extraction method is called from a database;
8) Analyzing a data extraction scheme, and carrying out data extraction on the data block to be encrypted according to the extracted position and the data size to obtain random encrypted data;
9) Splitting the data blocks to be encrypted according to a preset insertion sequence to obtain a plurality of split data blocks;
10 Adding random encryption data into the head of each split data block, and splicing all split data blocks according to the splitting sequence;
11 Encryption time data is encrypted before transmission.
The disadvantage is that when the encryption time is matched with the encrypted data, errors exist, and the data is lost; the encryption process is complicated and the transmission efficiency is low.
Disclosure of Invention
In view of the above-mentioned drawbacks and shortcomings of the prior art, the present invention provides a 1553B communication protocol data encryption method, which improves the safety of 1553B data transmission.
In order to achieve the above purpose, the main technical scheme adopted by the invention comprises the following steps:
A1553B communication protocol data encryption method comprises the following steps:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
Further, in the step S01, the interface data file classifies the data according to different devices on the bus, that is, the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
Further, in the step S02, each data block includes a data content of at most 28 bytes, and the definition content includes a byte number, a start word bit, an end word bit, an existence symbol bit, a numerical value type, and an interpretation type in which the data block is located.
Further, in the step S04, the splitting process is as follows: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted.
Further, in the step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, and an IDEA algorithm.
Further, in the step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubbling sorting, fast sorting, direct selection sorting, heap sorting, merging sorting, and radix sorting.
Further, in the step S11, the linked list of the encryption algorithm is the same as the linked list of the encryption algorithm in the step S07, that is, each data block to be encrypted is subjected to algorithm combination encryption twice.
Further, the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are placed in terminal devices of the 1553B bus network.
The beneficial effects of the invention are as follows:
1. the 1553B data transmission communication network of the encryption algorithm of the 1553B communication protocol adopts a plurality of encryption algorithms to randomly combine and encrypt, and has strong safety and reliability;
2. the encryption algorithm of the 1553B communication protocol is integrated before and after data packet encryption, so that the probability of data loss caused in the encryption and decryption processes is low;
3. the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms of the 1553B communication protocol are placed in each terminal device of the 1553B bus network in advance, so that the encryption and decryption efficiency is high;
4. the 1553B communication protocol has low probability of brute force cracking through an exhaustion method under the condition of no encryption database and no ordering database, and has high data transmission safety.
Detailed Description
The invention will be described in detail by way of specific embodiments for better explaining the invention.
The invention provides a 1553B communication protocol data encryption method, which comprises the following steps:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
in step S01, the interface data file classifies the data according to different devices on the bus, i.e. the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
Step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
in step S02, each data block contains data content of at most 28 bytes, and the definition content contains a byte number, a start word bit, an end word bit, a sign bit, a numeric value, and an explanatory type in which the data block is located.
Step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
in step S04, the data splitting process needs to comprehensively consider two attributes of encryption degree and encryption transmission efficiency, if the number of split encrypted data blocks is reduced, the encryption transmission efficiency can be improved, but the encryption degree can be reduced; if the number of split encrypted data blocks increases, the encryption degree can be improved, but the encryption transmission efficiency can be reduced. Considering the encryption degree and the encryption transmission efficiency comprehensively, the splitting process is carried out according to the following modes: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted. On the basis of ensuring the encryption degree, the encryption transmission rate is accelerated as much as possible.
Step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are arranged in each device of the bus in advance, so that the devices can inquire, encrypt and order conveniently.
Step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
in step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, an IDEA algorithm, and the like. The microsecond change rate is extremely high, so that the encryption method belongs to random numbers, and the randomness of the encryption process is increased; the encryption algorithm linked list containing a plurality of encryption algorithms enables each data block to be encrypted to adopt different encryption modes, effectively increases encryption degree and greatly reduces decoding risks.
Step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
in step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubble sorting, quick sorting, direct select sorting, heap sorting, merge sorting, radix sorting, and the like. As the millisecond number has high change rate, belongs to random numbers, and contains various sorting algorithms, the randomness of the sorting encryption process is increased, and the encryption degree is effectively increased.
Step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
in step S11, since the number of seconds belongs to a random number, the randomness of the encryption process is increased. The encryption algorithm linked list is the same as the encryption algorithm linked list in the step S07, namely, each data block to be encrypted is subjected to combined encryption of two algorithms, so that the data security is greatly improved.
Step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
While embodiments of the present invention have been shown and described above, it should be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that alterations, modifications, substitutions and variations may be made by those of ordinary skill in the art without departing from the scope of the invention.
Claims (8)
1. The 1553B communication protocol data encryption method is characterized by comprising the following steps of:
step S01: defining an interface data file format for prescribing data writing and reading, wherein the interface data file classifies data according to different devices on a bus, and divides data blocks;
step S02: each data block contains data content having bytes, defining the meaning of the individual data bits of each byte;
step S03: data is input according to the interface data file prescribed format;
step S04: splitting an input data block into data blocks to be encrypted with equal size;
step S05: adding a data head in front of each data block to be encrypted, and recording the sequence of the data blocks to be encrypted;
step S06: recording the current system time, and extracting the number of seconds, the number of milliseconds and the number of microseconds;
step S07: establishing a corresponding relation between microsecond numbers and seconds and an encryption algorithm to form an encryption algorithm linked list;
step S08: establishing a corresponding relation between the millisecond number and the sorting algorithm to form a sorting algorithm linked list;
step S09: inquiring a corresponding encryption algorithm in an encryption algorithm linked list by utilizing microsecond numbers, and respectively encrypting data of each data block to be encrypted;
step S10: querying a corresponding sorting algorithm in a sorting algorithm linked list by utilizing the millisecond number, and reordering each encrypted data block;
step S11: inquiring a corresponding encryption algorithm in the encryption algorithm linked list by using the seconds, and performing secondary encryption on the ordered data blocks;
step S12: the second, millisecond and microsecond are combined, the corresponding encryption algorithm is inquired in the encryption database catalog for encryption through the microsecond, the encryption algorithm is used as the first block of data to be sent independently, and the decoding basis of the receiving end is used.
2. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S01, the interface data file classifies the data according to different devices on the bus, that is, the data of different devices uses different RT numbers; under the same device, the data blocks are divided again according to the message content, i.e. different SA numbers are used for different data blocks.
3. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S02, each data block includes a data content of at most 28 bytes, and the definition content includes a byte number, a start word bit, an end word bit, a sign bit, a numerical value type, and an interpretation type in which the data block is located.
4. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S04, the splitting process is as follows: when the byte number of the data block is greater than 18 bytes, the data block is padded to 28 bytes, the padded parts are all 0, and the data block is uniformly divided into 4 data blocks to be encrypted; when the byte number of the data block is equal to 18 bytes, uniformly dividing the data block into 3 data blocks to be encrypted; when the byte number of the data block is more than 10 bytes and less than 18 bytes, the data block is padded to 18 bytes, the padded parts are all 0, and the data block is uniformly divided into 3 data blocks to be encrypted; when the byte number of the data block is equal to 10 bytes, uniformly dividing the data block into 2 data blocks to be encrypted; when the byte number of the data block is smaller than 10 bytes, the data block is padded to 10 bytes, the padded parts are all 0, and the data block is uniformly divided into 2 data blocks to be encrypted.
5. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S09, the encryption algorithm linked list includes an RSA algorithm, an ElGamal algorithm, a DES algorithm, and an IDEA algorithm.
6. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S10, the sorting algorithm linked list includes direct insert sorting, hil sorting, bubble sorting, fast sorting, direct select sorting, heap sorting, merge sorting, and radix sorting.
7. The 1553B communication protocol data encryption method of claim 1, wherein: in the step S11, the encryption algorithm linked list is the same as the encryption algorithm linked list in the step S07, that is, each data block to be encrypted is subjected to algorithm combination encryption twice.
8. The 1553B communication protocol data encryption method of claim 1, wherein: the encryption algorithm linked list, the ordering algorithm linked list, the encryption algorithms and the ordering algorithms are placed in terminal devices of the 1553B bus network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310896293.5A CN116633543B (en) | 2023-07-21 | 2023-07-21 | 1553B communication protocol data encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310896293.5A CN116633543B (en) | 2023-07-21 | 2023-07-21 | 1553B communication protocol data encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116633543A CN116633543A (en) | 2023-08-22 |
CN116633543B true CN116633543B (en) | 2023-09-15 |
Family
ID=87597605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310896293.5A Active CN116633543B (en) | 2023-07-21 | 2023-07-21 | 1553B communication protocol data encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116633543B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410616A (en) * | 2014-11-20 | 2015-03-11 | 广州日滨科技发展有限公司 | Method and system for encrypting, decrypting and transmitting data |
CN109636334A (en) * | 2018-12-07 | 2019-04-16 | 深圳市汇鑫科技股份有限公司 | A kind of property intelligence community service system and method |
CN112134696A (en) * | 2020-08-21 | 2020-12-25 | 杭州海兴电力科技股份有限公司 | Electric energy meter dynamic password generation and communication method and communication system thereof |
CN112398779A (en) * | 2019-08-12 | 2021-02-23 | 中国科学院国家空间科学中心 | Network traffic data analysis method and system |
CN114595475A (en) * | 2022-03-14 | 2022-06-07 | 北京科乃思技术有限公司 | 1553B bus module and data encryption method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019204213A1 (en) * | 2018-04-15 | 2019-10-24 | Cooner Jason | Encryption for blockchain cryptocurrency transactions and uses in conjunction with carbon credits |
-
2023
- 2023-07-21 CN CN202310896293.5A patent/CN116633543B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410616A (en) * | 2014-11-20 | 2015-03-11 | 广州日滨科技发展有限公司 | Method and system for encrypting, decrypting and transmitting data |
CN109636334A (en) * | 2018-12-07 | 2019-04-16 | 深圳市汇鑫科技股份有限公司 | A kind of property intelligence community service system and method |
CN112398779A (en) * | 2019-08-12 | 2021-02-23 | 中国科学院国家空间科学中心 | Network traffic data analysis method and system |
CN112134696A (en) * | 2020-08-21 | 2020-12-25 | 杭州海兴电力科技股份有限公司 | Electric energy meter dynamic password generation and communication method and communication system thereof |
CN114595475A (en) * | 2022-03-14 | 2022-06-07 | 北京科乃思技术有限公司 | 1553B bus module and data encryption method |
Non-Patent Citations (1)
Title |
---|
面向星载应用的地面测试***设计;黄欣欣;盛利元;冯旭哲;;宇航计测技术(05);40-41 * |
Also Published As
Publication number | Publication date |
---|---|
CN116633543A (en) | 2023-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8577022B2 (en) | Data processing apparatus | |
CN110505161B (en) | Message processing method and device | |
CN111061804A (en) | Asynchronous data processing method, device, equipment and storage medium based on big data | |
CN103366132A (en) | Device and method for encrypting data | |
CN109409079B (en) | Weak password checking method and device | |
WO2019165175A1 (en) | System and method for securely transferring data | |
CN112235104B (en) | Data encryption transmission method, system, terminal and storage medium | |
CN113014580A (en) | File transmission method and device, electronic equipment and storage medium | |
CN116633543B (en) | 1553B communication protocol data encryption method | |
CN114338217B (en) | Data encryption transmission method | |
CN114861204A (en) | Big data information safe storage encryption system | |
CN114221792A (en) | Internet data transmission encryption system | |
CN113541945A (en) | Electronic information encryption transmission system | |
CN112235101B (en) | Coding method and device based on hybrid coding mechanism, decoding method and device | |
CN114756887A (en) | Method and device for encrypting and storing sensitive information block in file | |
CN114422230B (en) | Information transmission system based on data encryption | |
CN117439744A (en) | Service data transmission method and device based on service security level | |
CN111414341B (en) | Data normalization description method in Internet of things environment | |
CN113572755A (en) | Intelligent media terminal data secure transmission method | |
CN114095746B (en) | Live order data processing and storing system based on block chain | |
CN114465826B (en) | Data encryption method, system and storage medium of coding technology | |
CN110519055B (en) | Method and device for image comparison encryption and decryption algorithm | |
CN105843759B (en) | A kind of multi-serial communication method based on HDLC | |
CN113742759B (en) | Data encryption method and device for financial accounting system | |
CN113783887B (en) | Remote control method, system and storage medium based on network communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |