Skip to main content
. 2022 May 28;19(11):6594. doi: 10.3390/ijerph19116594
Algorithm A1. SDSC
Input: H(i); Data; D; Ds
Authority()//Authorization Template
{
Verify(H(i))//Authenticate user unique hash
}
Standardization()//Data Standardization Module
{
Arrange(Data)//The data is matched and arranged to produce D
}
Summary()//Data table processing module
{
Hash(D)//Get D hash
}
Storage()//Storage module
{
Encryption(Ds)//digest encryption
Chain(D,Ds)//D,Ds wind up
}