WO2021134418A1 - Procédé et appareil de vérification de données - Google Patents

Procédé et appareil de vérification de données Download PDF

Info

Publication number
WO2021134418A1
WO2021134418A1 PCT/CN2019/130369 CN2019130369W WO2021134418A1 WO 2021134418 A1 WO2021134418 A1 WO 2021134418A1 CN 2019130369 W CN2019130369 W CN 2019130369W WO 2021134418 A1 WO2021134418 A1 WO 2021134418A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
message
syndrome
rtps protocol
check code
Prior art date
Application number
PCT/CN2019/130369
Other languages
English (en)
Chinese (zh)
Inventor
邓文彬
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201980102869.8A priority Critical patent/CN114788199A/zh
Priority to PCT/CN2019/130369 priority patent/WO2021134418A1/fr
Publication of WO2021134418A1 publication Critical patent/WO2021134418A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a data verification method and device.
  • Intelligent driving systems rely on data from many sensors, such as data generated by lidar, millimeter wave radar, and ultrasonic radar. These sensors act as the "eyes” and “nose” of the car, perceiving changes in the outside world. External data needs to pass through the transmission line to reach the central control system of the intelligent driving system (equivalent to the human brain). With the improvement of sensor performance, more and more data are acquired by sensors. During the process of data transmission to the central control system, due to the unreliability of both software and hardware, the data may be tampered with. The central control system will give wrong auto-driving instructions based on the wrong data, which will endanger the lives of passengers.
  • the check code is usually calculated by software, and the calculation of the check code will slow down if the check code calculation method is more complicated.
  • the calculation of the check code by the software method requires the computing resources of a central processing unit (CPU). Due to the limited computing resources of the CPU, the data length corresponding to the check code calculated by the software is limited to a certain extent.
  • the embodiments of the present application provide a data verification method and device, which are used to improve the data verification capability and solve the end-to-end ultra-long data packet data verification problem.
  • an embodiment of the present application provides a data verification method, including: a first device obtains a first verification code corresponding to the first data, where the first verification code is the first verification code in the first device.
  • the hardware module calculates that the first data is data collected by the first device; the first device generates a syndrome message according to the first check code; the first device sends a syndrome message of the first data to the second device.
  • the first device sends the syndrome message of the first data to the second device through the physical link.
  • the use of hardware modules to calculate the check code can increase the speed of the check code calculation, and the hardware calculation of the check code will not be limited by the data length, which can improve the data check ability and realize the Effective verification of data packets, thereby solving the problem of data verification of ultra-long packets.
  • the foregoing method further includes: the first device generates at least one real-time publish-subscribe (RTPS) protocol message according to the first data;
  • the syndrome message of one data is inserted into each of the at least one RTPS protocol message; at this time, the first device sends the syndrome message of the first data to the second device may be: the first device sends at least one syndrome message to the second device Each message in the RTPS protocol message is sent to the second device in turn.
  • extending the syndrome message to the RTPS protocol can enhance the standard RTPS protocol capability and improve the data verification capability of the RTPS protocol.
  • the first device generating at least one RTPS protocol packet according to the first data may include: if the data length of the first data is greater than or equal to the first threshold, the first device generates the at least one RTPS protocol packet according to the first data One piece of data generates multiple RTPS protocol packets, where multiple RTPS protocol packets are fragmented packets; if the data length of the first data is less than the first threshold, the first device generates one RTPS protocol packet according to the first data The RTPS protocol message is a non-fragmented message. In this implementation manner, when the data length exceeds the first threshold, the first data may be transmitted in fragments.
  • obtaining the first check code by the first device may include: if the data length of the first data is greater than or equal to the second threshold, the first device controls the first hardware module to A data is calculated to obtain the first check code.
  • the syndrome message of the first data may further include at least one of a data length, a timeout parameter, and a data sequence number.
  • the first device is a vehicle-mounted sensor
  • the second device is a vehicle-mounted master control device.
  • an embodiment of the present application provides a data transmission method, including: a second device receives a syndrome message of first data sent by a first device, where the first data is data collected by the first device; The second device extracts the first check code from the syndrome message of the first data; the second device obtains the second check code, where the second check code is the first check code calculated by the second hardware module in the second device The check code corresponding to the second data, the second data is the data received by the second device from the first device; the second device performs data check according to the first check code and the second check code.
  • the hardware module is used to calculate the check code and perform data check, which can increase the speed of check code calculation, and the hardware calculation of check code does not receive the limitation of the data length, which can improve the data check Ability to achieve effective verification of ultra-long data packets, thus end-to-end data verification of ultra-long data packets.
  • the second device receiving the syndrome message of the first data sent by the first device includes: the second device receives a real-time publish and subscribe RTPS protocol message sent by the first device; The second device extracts the syndrome message of the first data from the RTPS protocol message.
  • the second device extracts the syndrome message of the first data from the RTPS protocol message, including: the second device judges the RTPS according to the syndrome message in the RTPS protocol message Whether the protocol message is a fragmented message; if the RTPS protocol message is a fragmented message, the second device determines multiple fragmented messages corresponding to the first data; the second device extracts any one of the multiple fragmented messages The syndrome message in the message obtains the syndrome message of the first data.
  • the above method further includes: if the RTPS protocol message is a non-fragmented message, the second device determines an RTPS protocol message corresponding to the first data; the second device extracts the first data A syndrome message in an RTPS protocol message corresponding to one data obtains a syndrome message of the first data.
  • the second device judges whether the RTPS protocol message is a fragmented message according to the syndrome message in the RTPS protocol message, including: if the checksum in the RTPS protocol message The sub-message and the syndrome message in the upper and lower messages of the RTPS protocol message are different, and the second device determines that the RTPS protocol message is a non-fragmented message; if the syndrome message in the RTPS protocol message is the same as the RTPS protocol Any one of the syndrome messages in the upper and lower messages of the message is the same, and the second device determines that the RTPS protocol message is a fragmented message.
  • the syndrome message of the first data further includes at least one of the following parameters: data length, timeout parameter, and data sequence number.
  • the second device performs data verification according to the first check code and the second check code, including: if the first check code is equal to the second check code, the second The device determines that the data verification is successful; otherwise, the second device determines that the data verification fails.
  • the first device is a vehicle-mounted sensor
  • the second device is a vehicle-mounted main control device.
  • an embodiment of the present application provides a verification device, including: a first hardware module, configured to calculate a first verification code corresponding to the first data, where the first data is collected by the first device Processing module, used to obtain the first check code and generate the syndrome message of the first data according to the first check code; sending module, used to send the syndrome message of the first data to the second device, Wherein, the syndrome message of the first data is used for the second device to perform data verification.
  • the processing module is further configured to: generate at least one real-time publish and subscribe RTPS protocol message according to the first data; insert the syndrome message of the first data into the at least one RTPS protocol message
  • the sending module is specifically configured to: send each of the at least one RTPS protocol message to the second device in turn.
  • the processing module is specifically configured to: if the data length of the first data is greater than or equal to the first threshold, generate multiple RTPS protocol messages according to the first data, wherein multiple RTPS The protocol message is a fragmented message; if the data length of the first data is less than the first threshold, the first device generates an RTPS protocol message according to the first data, where the RTPS protocol message is a non-fragmented message.
  • the processing module is specifically configured to: if the data length of the first data is greater than or equal to the second threshold, control the first hardware module to calculate the first check code.
  • the syndrome message of the first data further includes at least one of the following parameters: data length, timeout parameter, and data sequence number.
  • the verification device is a vehicle-mounted sensor
  • the second device is a vehicle-mounted master control device.
  • an embodiment of the present application provides a verification device, including: a second hardware module for calculating a verification code corresponding to the second data, wherein the second data is received by the second device from the first device Received data; receiving module, used to receive the syndrome message of the first data sent by the first device, where the first data is data collected by the first device; processing module, used to obtain the syndrome from the first data Extract the first check code from the message, obtain the second check code, and perform data check according to the first check code and the second check code, where the second check code is the second hardware in the second device Module.
  • the processing module is further configured to: generate at least one real-time publish and subscribe RTPS protocol message according to the first data; insert the syndrome message of the first data into the at least one RTPS protocol message
  • the sending module is specifically configured to: send each of the at least one RTPS protocol message to the second device in turn.
  • the processing module is specifically configured to: if the data length of the first data is greater than or equal to the first threshold, generate multiple RTPS protocol messages according to the first data, wherein multiple RTPS The protocol message is a fragmented message; if the data length of the first data is less than the first threshold, the first device generates an RTPS protocol message according to the first data, where the RTPS protocol message is a non-fragmented message.
  • the processing module is specifically configured to: if the data length of the first data is greater than or equal to the second threshold, control the first hardware module to calculate the first check code.
  • the syndrome message of the first data further includes at least one of the following parameters: data length, timeout parameter, and data sequence number.
  • the verification device is a vehicle-mounted sensor
  • the second device is a vehicle-mounted master control device.
  • an embodiment of the present application provides a verification device, including: a processor, the processor is coupled with a memory, the memory is used to store operation instructions; the processor is used to call the operation instructions , To perform the method described in any one of the above-mentioned first aspects.
  • the verification device further includes: a first hardware module configured to calculate a first verification code corresponding to the first data.
  • an embodiment of the present application provides a verification device, including: a processor, the processor is coupled with a memory, the memory is used to store operation instructions; the processor is used to call the operation instructions , To perform the method described in any one of the above-mentioned second aspects.
  • the verification device further includes: a second hardware module configured to calculate a second verification code corresponding to the second data.
  • an embodiment of the present application provides a computer storage medium that stores operating instructions in the computer storage medium, and when it runs on a computer, the computer executes the method described in the first aspect.
  • an embodiment of the present application provides a computer storage medium.
  • the computer storage medium stores operating instructions, which when run on a computer, cause the computer to execute the method described in the second aspect.
  • the embodiments of the present application provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the method described in the first aspect.
  • the embodiments of the present application provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the method described in the second aspect.
  • FIG. 1 is a schematic diagram of a system framework structure provided in an embodiment of this application.
  • Figure 2(a) is a schematic diagram of an embodiment of a data verification method provided in an embodiment of the application
  • FIG. 2(b) is a schematic diagram of a structure of a hardware module in the first device provided in an embodiment of the application;
  • FIG. 3 is a schematic diagram of a structure of a verification device in an embodiment of the application.
  • FIG. 4 is another schematic diagram of the structure of the verification device in an embodiment of the application.
  • FIG. 5 is another schematic diagram of the structure of the verification device in an embodiment of the application.
  • FIG. 6 is a schematic diagram of another structure of the verification device in an embodiment of the application.
  • the embodiments of the present application provide a data verification method and device, which are used to improve the data verification capability and solve the end-to-end ultra-long data packet data verification problem.
  • the technical solutions in the embodiments of the present application are applicable to various communication systems, and are especially applicable to data verification scenarios of an automatic driving system.
  • Autonomous driving systems rely on many sensors to obtain external data, such as lidar, millimeter wave radar, and ultrasonic radar.
  • a message verification mechanism is required to ensure the accuracy of external data verification.
  • This application can be free from the data size limitation during the data verification process and enhance the end-to-end End data verification and verification capabilities.
  • Fig. 1 is a schematic diagram of a system framework structure provided in an embodiment of the application.
  • the system framework of the embodiment of the present application includes: a first device 101 and a second device 102, wherein data verification is performed between the first device 101 and the second device.
  • the first device 101 may be a sensor-end device, such as lidar, etc.
  • the second device 102 may be a vehicle-mounted master control device of the automatic driving system, such as a vehicle-mounted central control computer, a mobile data center ( mobile data center, MDC), etc.
  • Figure 2(a) is a schematic diagram of an embodiment of a data verification method provided in an embodiment of the application.
  • the data verification method in the embodiment of the present application includes:
  • a first device obtains a first check code corresponding to the first data, where the first check code is calculated by a first hardware device in the first device.
  • the first check code is a check code corresponding to the first data calculated by the first hardware module in the first device, and the first data refers to data sent by the first device to the second device. It should be understood that, compared with the calculation of the check code by the software module, the calculation of the check code by the hardware module has the advantages of fast calculation speed and large amount of calculation data. Among them, the first data is data collected by the first device; the first hardware module in the first device may be set in a built-in manner or may be set in an external manner.
  • Figure 2(b) is a schematic structural diagram of the first hardware module in the first device.
  • the hardware module structure shown in FIG. 2 may specifically be the first hardware module in the first device or the second hardware module in the second device below.
  • the hardware module 20 includes an input unit 207, a logic calculation unit 208, an output unit 209, and a timeout monitoring unit 210.
  • the input unit 207 is used to obtain the content of the message and the corresponding message parameters. Specifically, the data address and length of the message are input to the hardware module 20, and the input unit 207 can read the specified length from the corresponding data address.
  • the logic calculation unit 208 is configured to preset multiple check code calculation methods, such as a hash function, and can select a corresponding hash function for calculation according to the data length of the message to generate a hash value, that is, a check code.
  • the timeout monitoring unit 210 is used to monitor whether the time length for calculating the check code in the logic calculation unit 208 exceeds a preset time length.
  • the output unit 209 is used to output the check code generated by the logic calculation unit 208. It should also be noted that the hardware module 20 also needs to support the functions of automatic data analysis and calculation.
  • the composition structure of the above-mentioned hardware module 20 supports pipelines and has good performance.
  • the first device is a sensor such as a lidar.
  • the first data is data collected by the lidar and transmitted to the second device, such as a vehicle-mounted central control computer.
  • the first device to obtain the first check code may be: when the data length of the first data is greater than or equal to the second threshold, the first device controls the first hardware module to calculate the first check code corresponding to the first data .
  • the second threshold may be 4M.
  • CRC cyclic redundancy check
  • the calculation method for the first hardware module to calculate the first check code includes: hash value calculation algorithms such as CRC16, CRC32, CRC64, AES128, and SHA256.
  • the first device generates a syndrome message of the first data according to the first check code.
  • the first device generates a real-time publish and subscribe RTPS protocol message according to the first data, and inserts a syndrome message of the first data in the RTPS protocol message.
  • the syndrome message can be inserted into the header of the RTPS protocol message.
  • the first device generates at least one real-time publish and subscribe RTPS protocol message according to the first data, and further, the first device inserts the syndrome message of the first data into each of the at least one RTPS protocol message.
  • the first device sequentially sends each of the at least one RTPS protocol packet to the second device.
  • the first device generating at least one RTPS protocol message according to the first data may specifically include: the first device may determine whether the RTPS protocol message needs to be fragmented according to the data length of the first data. Specifically, if the data length of the first data is greater than or equal to the first threshold, the first device generates multiple (for example, N) RTPS protocol messages corresponding to the first data, and the N RTPS protocol messages carry the complete first One data, each RTPS protocol message carries part of the first data, each RTPS protocol message is inserted with the first check code, and N is an integer greater than or equal to 2. If the data length of the first data is less than the first threshold, the first device generates an RTPS protocol message corresponding to the first data, and the RTPS protocol message includes all the first data and inserts the first check code.
  • the first device may determine whether the RTPS protocol message needs to be fragmented according to the data length of the first data. Specifically, if the data length of the first data is greater than or equal to the first
  • the syndrome message of the first data may further include the data length corresponding to the first data, the timeout parameter, and the data sequence number.
  • the data length is the data length of the first data or the data length corresponding to a fragment of the RTPS protocol message, which is used for data integrity verification and verification of the reliability of the data.
  • the data sequence number is used to determine whether the RTPS protocol message is in an orderly receiving state.
  • the timeout parameter is used to determine the timeliness of the data.
  • a message format of the syndrome sub-message includes: a sub-message identification field, a hash function option field, a position offset field, a check code field, and an extension field.
  • the sub-message identification field is 8 bits, used to indicate the data sequence number
  • the hash function option field is used to indicate the calculation method of the check code, for example, the sequence number 0 indicates the AES128 algorithm, 1 indicates the SHA256 algorithm, and 2 indicates the CRC64 algorithm , 3 means CRC32 algorithm, 4 means CRC16 algorithm
  • the position offset field is used to indicate the offset of the next syndrome message position
  • the check code field is used to indicate the value of the first check code and the length of the check code field It can be between 64 bits and 256 bits
  • the extended field can store other extended data such as sensor type and sensor location.
  • the first device sends a syndrome message of the first data to the second device.
  • the first device sending the syndrome message of the first data to the second device may be: the first device sends an RTPS protocol message to the second device through a physical link, and the RTPS protocol message includes: the first data and the checksum Sub-message.
  • the physical link is used to transmit end-to-end data transmission and verification.
  • the physical link may be a CAN bus or an Ethernet interface for interconnection between the first device and the second device.
  • the second device extracts the first check code from the syndrome message of the first data.
  • the second device can obtain the syndrome message from any one of the multiple (such as the above-mentioned N) RTPS protocol messages, and then the second device receives the syndrome message Extract the first check code from.
  • the second device extracts the syndrome message of the first data from the RTPS protocol message, and then the second device extracts the first checksum from the syndrome message of the first data code.
  • the second device may determine whether the RTPS protocol message is a fragmented message. If the syndrome message in the RTPS protocol message and the syndrome message in the upper and lower messages of the RTPS protocol message are both If it is not the same, the second device determines that the RTPS protocol message is a non-fragmented message; if the syndrome message in the RTPS protocol message is the same as any one of the syndrome messages in the upper and lower messages of the RTPS protocol message, the second The device determines that the RTPS protocol packet is a fragmented packet.
  • the second device obtains the second check code.
  • the second device extracts the data in the N RTPS protocol messages and reorganizes the extracted data to obtain the second data.
  • the second device controls the second hardware module to calculate the second data corresponding to the second data. Two check code.
  • the second device extracts the second data from the RTPS protocol message, and the second device controls the second hardware module to calculate the second check code corresponding to the second data.
  • the second device performs data verification according to the first verification code and the second verification code.
  • the second device determines that the data verification is successful; otherwise, the second device determines that the data verification fails.
  • the second device may send a data retransmission request to the first device, and the data verification succeeds.
  • the hardware module is used to calculate the check code, which can increase the speed of the check code calculation, and the hardware calculation of the check code does not receive the limitation of the data length, which can improve the data check ability and realize the detection of ultra-long data packets. Effective verification, thus solving the data verification problem of ultra-long packets.
  • the calculation of the check code by the hardware module may not occupy the computing resources of the processor and save computing resources.
  • the verification device 300 includes: a processing module 301, a sending module 302, and a first hardware module 303.
  • the first hardware module 303 It is used to calculate the first check code corresponding to the first data, where the first data is the data collected by the check device 300; the processing module 301 is configured to perform the following operations: obtain the first check code and according to the first check code The check code generates a syndrome message, the first check code is the check code corresponding to the first data calculated by the first hardware module, and the first data is sent by the first device to the second device Data; sending module 302, used to send the syndrome message of the first data to the second device.
  • the processing module 301 is further configured to: generate at least one real-time publish and subscribe RTPS protocol message according to the first data; insert the syndrome message of the first data into the at least In each message in one RTPS protocol message; the sending module is specifically configured to: send each message in the at least one RTPS protocol message to the second device in turn.
  • the processing module 301 is specifically configured to: if the data length of the first data is greater than or equal to a first threshold, generate multiple RTPS protocol messages according to the first data, where: The multiple RTPS protocol messages are fragmented messages; if the data length of the first data is less than the first threshold, the first device generates an RTPS protocol message according to the first data, where: The RTPS protocol message is a non-fragmented message.
  • the processing module 301 is specifically configured to: if the data length of the first data is greater than or equal to a second threshold, control the first hardware module to calculate the first check code .
  • the syndrome message of the first data further includes at least one of the following parameters: data length, timeout parameter, and data sequence number.
  • the verification device 300 is a vehicle-mounted sensor, and the second device is a vehicle-mounted master control device.
  • the verification apparatus 300 may specifically be the aforementioned first device, and its respective component modules (processing module 301, sending module 302, and first hardware module 303) can be used to execute the first device in the foregoing method embodiment. All operations.
  • the verification device 400 includes: a receiving module 401, a processing module 402, and a second hardware module 403.
  • the second hardware module 403 is used to calculate a verification code corresponding to the second data, where the second data is the The data received by the second device from the first device;
  • the receiving module 401 is configured to receive the syndrome message of the first data sent by the first device, where the first data is collected by the first device Data;
  • processing module 402 used to extract the first check code from the syndrome message of the first data, obtain the second check code, and according to the first check code and the second check Code for data verification, where the second verification code is a second hardware module in the second device.
  • the receiving module 401 is specifically configured to: receive a real-time publish and subscribe RTPS protocol message sent by the first device; and extract the correction of the first data from the RTPS protocol message. Test child news.
  • the processing module 402 is specifically configured to: determine whether the RTPS protocol message is a fragmented message according to the syndrome message in the RTPS protocol message; if the RTPS protocol message The message is a fragmented message, and multiple fragmented messages corresponding to the first data are determined; the syndrome message in any one of the multiple fragmented messages is extracted to obtain the first data The syndrome message.
  • the processing module 402 is further configured to: if the RTPS protocol message is a non-fragmented message, determine an RTPS protocol message corresponding to the first data; and extract the first data A syndrome message in an RTPS protocol message corresponding to one piece of data obtains the syndrome message of the first data.
  • the processing module 402 is specifically configured to: if the syndrome message in the RTPS protocol message is different from the syndrome message in the upper and lower messages of the RTPS protocol message. Same, it is determined that the RTPS protocol message is a non-fragmented message; if the syndrome message in the RTPS protocol message is the same as any syndrome message in the upper and lower messages of the RTPS protocol message, It is determined that the RTPS protocol message is a fragmented message.
  • the syndrome message of the first data further includes at least one of the following parameters: data length, timeout parameter, and data sequence number.
  • the processing module 402 is specifically configured to: if the first check code is equal to the second check code, determine that the data check is successful; otherwise, the second device determines the data The verification failed.
  • the first device is a vehicle-mounted sensor
  • the verification device 400 is a vehicle-mounted master control device.
  • the verification apparatus 400 may specifically be the above-mentioned second device, and its respective component modules (receiving module 401, processing module 402, and second hardware module 403) may be used to execute the second device in the above method embodiment. All operations.
  • An embodiment of the present application also provides a computer storage medium, wherein the computer storage medium stores a program, and the program executes some or all of the steps recorded in the above method embodiments.
  • the verification device 500 may specifically be the above-mentioned first device.
  • the verification device 500 includes a processor 501, wherein the verification device 500 includes a processor 501.
  • the number of processors in the test apparatus 500 may be one or more, and one processor is taken as an example in FIG. 5.
  • the verification apparatus 500 further includes: a memory 502, a transceiver 503, and a first hardware module 504.
  • the processor 501, the memory 502, the transceiver 503, and the first hardware module 504 may be connected by a bus or other methods. In FIG. 5, the connection by a bus is taken as an example.
  • the memory 502 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1103. A part of the memory 502 may also include a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory 502 stores an operating system and operating instructions, executable modules or data structures, or a subset of them, or an extended set of them.
  • the operating instructions may include various operating instructions for implementing various operations.
  • the operating system may include various system programs for implementing various basic services and processing hardware-based tasks.
  • the processor 501 controls the operation of the first device 500, and the processor 501 may also be referred to as a central processing unit (CPU).
  • the various components of the verification device 500 are coupled together through a bus system.
  • the bus system may also include a power bus, a control bus, and a status signal bus.
  • various buses are referred to as bus systems in the figure.
  • the method disclosed in the foregoing embodiment of the present application may be applied to the processor 501 or implemented by the processor 501.
  • the processor 501 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 501 or instructions in the form of software.
  • the aforementioned processor 501 may be a general-purpose processor, a digital signal processing (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or Other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processing
  • ASIC application specific integrated circuit
  • FPGA field-programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502, and completes the steps of the foregoing method in combination with its hardware.
  • the transceiver 503 can be used to receive input digital or character information, and to generate signal input related to the relevant settings and function control of the verification device 500, and can be used to output digital or character information through an external interface.
  • the processor 501 is configured to execute the aforementioned data verification method executed by the first device.
  • the verification device 600 includes a processor 601, wherein the verification device 600 includes a processor 601.
  • the number of processors in the apparatus 600 may be one or more, and one processor is taken as an example in FIG. 6.
  • the verification apparatus 600 further includes: a memory 602, a transceiver 603, and a second hardware module 604.
  • the processor 601, the memory 502, the transceiver 503, and the second hardware module 504 may be connected by a bus or other methods. In FIG. 6, the connection by a bus is taken as an example.
  • the memory 602 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1103. A part of the memory 602 may also include a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory 602 stores an operating system and operating instructions, executable modules or data structures, or a subset of them, or an extended set of them.
  • the operating instructions may include various operating instructions for implementing various operations.
  • the operating system may include various system programs for implementing various basic services and processing hardware-based tasks.
  • the processor 601 controls the operation of the second device 600, and the processor 601 may also be referred to as a central processing unit (CPU).
  • the various components of the verification device 600 are coupled together through a bus system, where the bus system may include a power bus, a control bus, a status signal bus, etc., in addition to a data bus.
  • bus system may include a power bus, a control bus, a status signal bus, etc., in addition to a data bus.
  • various buses are referred to as bus systems in the figure.
  • the method disclosed in the foregoing embodiment of the present application may be applied to the processor 601 or implemented by the processor 601.
  • the processor 601 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 601 or instructions in the form of software.
  • the aforementioned processor 601 may be a general-purpose processor, a digital signal processing (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or Other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processing
  • ASIC application specific integrated circuit
  • FPGA field-programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602, and completes the steps of the foregoing method in combination with its hardware.
  • the transceiver 603 can be used to receive input digital or character information, and to generate signal input related to the relevant settings and function control of the verification device 600, and can be used to output digital or character information through an external interface.
  • the processor 601 is configured to execute the aforementioned data verification method executed by the second device.
  • processor mentioned in any of the foregoing may be a general-purpose central processing unit, a microprocessor, an ASIC, or one or more integrated circuits used to control the execution of the program of the method in the first aspect.
  • the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physically separate.
  • the physical unit can be located in one place or distributed across multiple network units. Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the connection relationship between the modules indicates that they have a communication connection between them, which may be specifically implemented as one or more communication buses or signal lines.
  • this application can be implemented by means of software plus necessary general hardware.
  • it can also be implemented by dedicated hardware including dedicated integrated circuits, dedicated CPUs, dedicated memory, Dedicated components and so on to achieve.
  • all functions completed by computer programs can be easily implemented with corresponding hardware.
  • the specific hardware structures used to achieve the same function can also be diverse, such as analog circuits, digital circuits or special-purpose circuits. Circuit etc.
  • software program implementation is a better implementation in more cases.
  • the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a readable storage medium, such as a computer floppy disk. , U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk, etc., including several instructions to make a computer device (which can be a personal computer, server, or network device, etc.) execute the methods described in each embodiment of this application .
  • a computer device which can be a personal computer, server, or network device, etc.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • wired such as coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

La présente invention concerne un procédé et un appareil de vérification de données, ceux-ci sont utilisés pour améliorer la capacité de vérification de données et pour résoudre le problème de vérification de données de bout en bout d'un paquet de données ultra long. Le procédé de vérification de données comprend les étapes suivantes : un premier dispositif acquiert un premier code de vérification correspondant à des premières données, le premier code de vérification étant un code de vérification correspondant aux premières données obtenu au moyen du calcul d'un premier module matériel dans le premier dispositif et les premières données étant des données collectées par le premier dispositif ; le premier dispositif génère un sous-message de vérification des premières données selon le premier code de vérification ; et le premier dispositif envoie le sous-message de vérification des premières données à un second dispositif, le sous-message de vérification des premières données étant utilisé par le second dispositif pour effectuer une vérification de données.
PCT/CN2019/130369 2019-12-31 2019-12-31 Procédé et appareil de vérification de données WO2021134418A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980102869.8A CN114788199A (zh) 2019-12-31 2019-12-31 一种数据校验方法及装置
PCT/CN2019/130369 WO2021134418A1 (fr) 2019-12-31 2019-12-31 Procédé et appareil de vérification de données

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130369 WO2021134418A1 (fr) 2019-12-31 2019-12-31 Procédé et appareil de vérification de données

Publications (1)

Publication Number Publication Date
WO2021134418A1 true WO2021134418A1 (fr) 2021-07-08

Family

ID=76685815

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/130369 WO2021134418A1 (fr) 2019-12-31 2019-12-31 Procédé et appareil de vérification de données

Country Status (2)

Country Link
CN (1) CN114788199A (fr)
WO (1) WO2021134418A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609532A (zh) * 2021-08-13 2021-11-05 阳光电源股份有限公司 一种数据完整性校验方法、装置、计算机设备和存储介质
CN114024576A (zh) * 2021-09-29 2022-02-08 广东电网有限责任公司电力调度控制中心 一种低压电力线载波运维管控方法及***
CN116781756A (zh) * 2023-08-21 2023-09-19 成都骁博锐电子科技有限责任公司 一种汽车整车控制***及汽车无线通讯控制方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050047590A1 (en) * 2003-08-28 2005-03-03 Sunplus Technology Co., Ltd. System and method of applying parity bits to protect transmitting and receiving data
CN106209982A (zh) * 2016-06-24 2016-12-07 成都之达科技有限公司 基于无线传感器的胎压监测方法
CN110086891A (zh) * 2019-06-25 2019-08-02 奥特酷智能科技(南京)有限公司 基于dds协议在自动驾驶中实现分布式通信的方法
CN110351015A (zh) * 2019-08-21 2019-10-18 上海云丁微电子有限公司 一种数据发送方法、接收方法及设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281121B (zh) * 2010-06-13 2014-10-29 中兴通讯股份有限公司 一种数据文件传输和校验的方法、设备及***
CN104579948A (zh) * 2013-10-29 2015-04-29 国家计算机网络与信息安全管理中心 一种报文分片处理方法及装置
JP6657690B2 (ja) * 2015-09-10 2020-03-04 富士ゼロックス株式会社 復号化装置、プログラム、及び情報伝送システム
CN109855646B (zh) * 2019-04-30 2020-02-28 奥特酷智能科技(南京)有限公司 分布集中式自动驾驶***和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050047590A1 (en) * 2003-08-28 2005-03-03 Sunplus Technology Co., Ltd. System and method of applying parity bits to protect transmitting and receiving data
CN106209982A (zh) * 2016-06-24 2016-12-07 成都之达科技有限公司 基于无线传感器的胎压监测方法
CN110086891A (zh) * 2019-06-25 2019-08-02 奥特酷智能科技(南京)有限公司 基于dds协议在自动驾驶中实现分布式通信的方法
CN110351015A (zh) * 2019-08-21 2019-10-18 上海云丁微电子有限公司 一种数据发送方法、接收方法及设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KAI BECKMANN , MARCUS THOSS: "A wireless sensor network protocol for the OMG Data Distribution Service", PROCEEDINGS OF THE 10TH INTERNATIONAL WORKSHOP ON INTELLIGENT SOLUTIONS IN EMBEDDED SYSTEMS, 1 July 2012 (2012-07-01), pages 45 - 50, XP055826423 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609532A (zh) * 2021-08-13 2021-11-05 阳光电源股份有限公司 一种数据完整性校验方法、装置、计算机设备和存储介质
CN113609532B (zh) * 2021-08-13 2024-04-12 阳光电源股份有限公司 一种数据完整性校验方法、装置、计算机设备和存储介质
CN114024576A (zh) * 2021-09-29 2022-02-08 广东电网有限责任公司电力调度控制中心 一种低压电力线载波运维管控方法及***
CN114024576B (zh) * 2021-09-29 2022-12-23 广东电网有限责任公司电力调度控制中心 一种低压电力线载波运维管控方法
CN116781756A (zh) * 2023-08-21 2023-09-19 成都骁博锐电子科技有限责任公司 一种汽车整车控制***及汽车无线通讯控制方法

Also Published As

Publication number Publication date
CN114788199A (zh) 2022-07-22

Similar Documents

Publication Publication Date Title
CN111512603B (zh) 一种数据传输方法及第一设备
US10868767B2 (en) Data transmission method and apparatus in optoelectronic hybrid network
WO2021134418A1 (fr) Procédé et appareil de vérification de données
US10346344B2 (en) Method, client device and data forwarding device for transmitting data through serial port
CN111327603B (zh) 数据传输方法、装置和***
CN110061896B (zh) 一种modbus-rtu总线地址冲突检测方法
CN110830460B (zh) 一种连接建立方法、装置、电子设备及存储介质
JP2008131640A (ja) ネットワーク試験装置及び方法
WO2020042884A1 (fr) Système et procédé de transmission de données entre des dispositifs internet des objets, et dispositif électronique
CN104348578B (zh) 数据处理的方法及装置
CN105610730B (zh) Cpu与网络设备之间的消息交互方法及***
US11892955B2 (en) System and method for bypass memory read request detection
US20160140345A1 (en) Information processing device, filtering system, and filtering method
CN110870286B (zh) 容错处理的方法、装置和服务器
CN112713964B (zh) 数据校验加速方法、装置、计算机设备及存储介质
US20140172994A1 (en) Preemptive data recovery and retransmission
CN110134419B (zh) 一种双面柜的***升级方法、装置、设备及存储介质
CN115604052B (zh) 车辆通讯交互方法、***及电子设备
US20120066305A1 (en) Transmitting system and method thereof
CN113472878B (zh) 利用浏览器插件实现vnc中文件拖拽传输的方法及装置
CN113259490B (zh) 基于udp传输协议的多级节点网络数据传输方法
WO2020238881A1 (fr) Procédé et appareil de génération et de vérification de message
JP2015216450A (ja) 情報処理装置、情報処理システム及び中継プログラム
RU2715016C1 (ru) Передающее устройство, способ, программа и носитель записи
CN112910910A (zh) Opcda协议报文处理方法、装置、设备以及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19958165

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19958165

Country of ref document: EP

Kind code of ref document: A1