摘要 |
<p>The method involves performing identity control, and generating encrypted rate using inverse mapping by a transmitter. Another encrypted rate is generated using mapping on the former encrypted rate by the transmitter, where the mapping represents a software defined mapping. Key elements of the software defined mapping are made from of an encryption method and a key, where the elements contain hash values as seed points for determining the key elements of values of an amount containing the elements.</p> |