CN101895457A - Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process - Google Patents

Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process Download PDF

Info

Publication number
CN101895457A
CN101895457A CN2009100841720A CN200910084172A CN101895457A CN 101895457 A CN101895457 A CN 101895457A CN 2009100841720 A CN2009100841720 A CN 2009100841720A CN 200910084172 A CN200910084172 A CN 200910084172A CN 101895457 A CN101895457 A CN 101895457A
Authority
CN
China
Prior art keywords
packet
data
communication process
client
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100841720A
Other languages
Chinese (zh)
Inventor
刘立军
王磊
张守文
陶勇胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HUIXIONG (BEIJING) TECHNOLOGY Co Ltd
Original Assignee
HUIXIONG (BEIJING) TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HUIXIONG (BEIJING) TECHNOLOGY Co Ltd filed Critical HUIXIONG (BEIJING) TECHNOLOGY Co Ltd
Priority to CN2009100841720A priority Critical patent/CN101895457A/en
Publication of CN101895457A publication Critical patent/CN101895457A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method for ensuring data transmission integrity in a transmission control protocol (TCP) communication process. The method comprises the following steps of: specifying a special character as the closing tag of each message packet according to a practical situation; detecting whether a data packet to be transmitted comprises the closing tag of the message packet or not and if so, replacing the data packet by other escape character so as to ensure that each complete message packet only comprises one closing tag at most; allowing a client or a server to add a special tag at the end of each integrate data packet to be transmitted; and after the client or the server receives a message, verifying the integrity of the data packet according to the special tag and performing corresponding processing. Due to the adoption of the method, the integrity of the data packet in the TCP communication process is ensured effectively.

Description

A kind of method of guaranteeing transfer of data integrality in the TCP communication process
Technical field
The present invention relates to the method for transfer of data integrality in a kind of TCP of guaranteeing communication process, particularly a kind of method of guaranteeing data integrity in the TCP communication data reciprocal process by the mode that adds special marking.
Background technology
Adopt between the client and server of Transmission Control Protocol communication; when data interaction is more frequent; because network and all factors that may exist of client and server itself; in fact comprise a plurality of independently packets in a packet that client or server receive appears in regular meeting, perhaps a packet sending of client or server has been splitted into the situation that a plurality of packets send.
Summary of the invention
Technical problem to be solved by this invention provides the method for transfer of data integrality in a kind of TCP of guaranteeing communication process, enhancing program stability.
The method of transfer of data integrality comprises following step at least in a kind of TCP of guaranteeing communication process of the present invention:
Step 1: according to the end mark of spcial character of actual conditions regulation as each message bag.
Step 2: whether comprise<step 1 in the packet that detection will send〉described in the end mark of message bag.If comprise then replace, to guarantee having only an end mark at most in each complete message bag with other escape character (ESC).
Step 3: client or server add<step 1 at last each complete data packet that will send〉described in special marking.
Step 4: client or server carry out the packet integrity verification according to special marking after receiving message, and make corresponding processing.
The processing method of a kind of abnormal logging of chess/card game user in server of the present invention, client or server are carried out the packet integrity verification according to special marking after receiving message, and make corresponding processing, the steps include:
Step 41: state a storage of variables, the data of at every turn receiving all are appended in this variable.
Step 42: check<step 41〉whether comprise<step 1 in the described storage of variables described in, if do not comprise, then explanation is incomplete packet, is left intact.
Step 43: according to<step 42〉assay, if do not wrap one or more<step 1〉described end mark, illustrate that then this packet comprises an a plurality of independently packet. with<step 1〉the gained end mark is mark, obtains each independently packet.
Step 44: check each independently whether to comprise<step 2 in the packet〉described in escape character (ESC), it be reduced into corresponding spcial character handle again if comprise then.
Step 45: deletion<step 41〉data processed bag in the described storage of variables, to avoid the reprocessing of packet.
A kind of method of guaranteeing transfer of data integrality in the TCP communication process of the present invention, the feasible integrality that effectively guarantees with the packet that occurs in the Transmission Control Protocol communication process.
Embodiment
Key step of the present invention is as follows
Step 1: according to the end mark of spcial character of actual conditions regulation as each message bag.
Step 2: the end mark that whether comprises the message bag in the packet that detection will send.If comprise then replace, to guarantee having only an end mark at most in each complete message bag with other escape character (ESC).
Step 3: client or server add special marking at last each complete data packet that will send.
Step 4: client or server carry out the packet integrity verification according to special marking after receiving message, and make corresponding processing.
Above-mentioned steps 4 clients or server carry out the packet integrity verification according to special marking after receiving message, and the concrete steps of making corresponding processing are:
Step 41: state a storage of variables, the data of at every turn receiving all are appended in this variable.
Step 42: check<step 41〉whether comprise<step 1 in the described storage of variables described in, if do not comprise, then explanation is incomplete packet, is left intact.
Step 43: according to<step 42〉assay, if do not wrap one or more<step 1〉described end mark, illustrate that then this packet comprises an a plurality of independently packet. with<step 1〉the gained end mark is mark, obtains each independently packet.
Step 44: check each independently whether to comprise<step 2 in the packet〉described in escape character (ESC), it be reduced into corresponding spcial character handle again if comprise then.
Step 45: deletion<step 41〉data processed bag in the described storage of variables, to avoid the reprocessing of packet.
Above-mentioned technical scheme can effectively guarantee the integrality with the packet that occurs in the Transmission Control Protocol communication process when implementing.
It should be noted last that above embodiment is only in order to explanation and unrestricted technical scheme described in the invention; Therefore, although this specification has been described in detail the present invention with reference to the above embodiments,, those of ordinary skill in the art should be appreciated that still and can make amendment or replacement to the present invention with being equal to; And all do not break away from the technical scheme and the improvement thereof of the spirit and scope of the present invention, and it all should be encompassed in the middle of the claim scope of the present invention.

Claims (2)

1. method of guaranteeing transfer of data integrality in the TCP communication process, it is characterized in that: this method comprises following step at least:
Step 1: according to the end mark of spcial character of actual conditions regulation as each message bag.
Step 2: the end mark that whether comprises the message bag in the packet that detection will send.If comprise then replace, to guarantee having only an end mark at most in each complete message bag with other escape character (ESC).
Step 3: client or server add special marking at last each complete data packet that will send.
Step 4: client or server carry out the packet integrity verification according to special marking after receiving message, and make corresponding processing.
2. a kind of method of guaranteeing transfer of data integrality in the TCP communication process according to claim 1 is characterized in that: client or server carry out the packet integrity verification according to special marking after receiving message, and make corresponding processing, the steps include:
Step 41: state a storage of variables, the data of at every turn receiving all are appended in this variable.
Step 42: the check storage of variables, if do not comprise, then explanation is incomplete packet, is left intact.
Step 43:, illustrate that then this packet comprises an a plurality of independently packet, obtains each independently packet if do not comprise one or more end marks.
Step 44: check each independently whether to comprise<step 2 in the packet〉described in escape character (ESC), it be reduced into corresponding spcial character handle again if comprise then.
Step 45: data processed bag in the deletion storage of variables to avoid the reprocessing of packet.
CN2009100841720A 2009-05-20 2009-05-20 Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process Pending CN101895457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100841720A CN101895457A (en) 2009-05-20 2009-05-20 Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100841720A CN101895457A (en) 2009-05-20 2009-05-20 Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process

Publications (1)

Publication Number Publication Date
CN101895457A true CN101895457A (en) 2010-11-24

Family

ID=43104530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100841720A Pending CN101895457A (en) 2009-05-20 2009-05-20 Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process

Country Status (1)

Country Link
CN (1) CN101895457A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015014308A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited A method and a device for data processing
CN105592135A (en) * 2015-09-25 2016-05-18 杭州华三通信技术有限公司 Method and device for determination of data redundancy elimination DRD dictionary
CN105681271A (en) * 2014-12-08 2016-06-15 三星电子株式会社 Method and apparatus for providing integrity check data
CN105743865A (en) * 2014-12-12 2016-07-06 上海大潮电子技术有限公司 Multimedia file data transmission system and transmission method
CN108833380A (en) * 2018-05-31 2018-11-16 安徽四创电子股份有限公司 The method of data exchange between a kind of system the superior and the subordinate platform
CN108965484A (en) * 2018-09-30 2018-12-07 深圳市酷达通讯有限公司 A kind of transmission method of internet of things data, system and terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015014308A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited A method and a device for data processing
CN105681271A (en) * 2014-12-08 2016-06-15 三星电子株式会社 Method and apparatus for providing integrity check data
CN105681271B (en) * 2014-12-08 2019-03-29 三星电子株式会社 The method and apparatus of integrity checking data is provided
US10516677B2 (en) 2014-12-08 2019-12-24 Samsung Electronics Co., Ltd. Method and apparatus for providing integrity check data
CN105743865A (en) * 2014-12-12 2016-07-06 上海大潮电子技术有限公司 Multimedia file data transmission system and transmission method
CN105592135A (en) * 2015-09-25 2016-05-18 杭州华三通信技术有限公司 Method and device for determination of data redundancy elimination DRD dictionary
CN105592135B (en) * 2015-09-25 2019-05-24 新华三技术有限公司 Data redundancy eliminates DRE dictionary confirmation method and equipment
CN108833380A (en) * 2018-05-31 2018-11-16 安徽四创电子股份有限公司 The method of data exchange between a kind of system the superior and the subordinate platform
CN108965484A (en) * 2018-09-30 2018-12-07 深圳市酷达通讯有限公司 A kind of transmission method of internet of things data, system and terminal
CN108965484B (en) * 2018-09-30 2021-08-03 深圳市酷达通讯有限公司 Internet of things data transmission method, system and terminal

Similar Documents

Publication Publication Date Title
CN101895457A (en) Method for ensuring data transmission integrity in transmission control protocol (TCP) communication process
CN105516080B (en) The processing method of TCP connection, apparatus and system
CN103259768B (en) A kind of message authentication method, system and device
CN111083161A (en) Data transmission processing method and device and Internet of things equipment
CN103209072B (en) A kind of MACsec key updating methods and equipment
CN103384242A (en) Intrusion detection method and system based on Nginx proxy server
CN102231748B (en) Method and device for verifying client
CN102571488B (en) Failure processing method, device and system for encryption card
CN102377524A (en) Fragment processing method and system
CN102510385A (en) Method for preventing fragment attack of IP (Internet Protocol) datagram
CN100481779C (en) Upgrade control method and control device
CN101803303A (en) Method and system for managing transmission of fragmented data packets
CN107948195B (en) Method and device for protecting Modbus attack
CN102096772B (en) Smart client system of power transmission and transformation project
CN206461664U (en) A kind of data collecting system
CN110177116B (en) Secure data transmission method and device for intelligent identification network
CN106131177A (en) A kind of message processing method and device
CN104009961A (en) PPPoE session ID distribution method and equipment thereof
CN103428677B (en) The sending method and signaling channel of grouping busihess data send the method for reseptance of information
CN103475465B (en) MACsec key update method and device in ISSU process
CN101945083B (en) Authentication method and counterfeit judgment method for virtual router redundancy protocol
CN107528929A (en) The processing method and processing device of arp entry
CN103501298A (en) Method and device for ensuring continuous flow in a link circuit during no-break service upgrade process
CN115297009B (en) Digital encryption consistency optimization method based on blockchain distributed network
CN114553559B (en) Method and device for modifying protocol data in router and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: CHINA GAMES COMPETITIVE CULTURE CO., LTD.

Free format text: FORMER OWNER: GRIZZLY (BEIJING) TECHNOLOGY CO., LTD.

Effective date: 20111111

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 102218 CHANGPING, BEIJING TO: 570215 HAIKOU, HAINAN PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20111111

Address after: 570215 room 17A, crystal building, Pearl River Plaza, No. 2, Kun Kun Road, Hainan, Haikou

Applicant after: Middle reaches competitive culture Limited by Share Ltd

Address before: 102218, 701, building 39, 2 District, Tiantongyuan north, Beijing, Changping District, 7

Applicant before: Huixiong (Beijing) Technology Co., Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101124