CN103095835A - Realization method for reasonable construction and correct parse of communication data package based on alarm system - Google Patents

Realization method for reasonable construction and correct parse of communication data package based on alarm system Download PDF

Info

Publication number
CN103095835A
CN103095835A CN2013100167908A CN201310016790A CN103095835A CN 103095835 A CN103095835 A CN 103095835A CN 2013100167908 A CN2013100167908 A CN 2013100167908A CN 201310016790 A CN201310016790 A CN 201310016790A CN 103095835 A CN103095835 A CN 103095835A
Authority
CN
China
Prior art keywords
data
length
packet
bag
cmd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100167908A
Other languages
Chinese (zh)
Inventor
羊贵祥
高开文
谢武松
谭前学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lixiang TECH Development Co Ltd Chengdu
Original Assignee
Lixiang TECH Development Co Ltd Chengdu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lixiang TECH Development Co Ltd Chengdu filed Critical Lixiang TECH Development Co Ltd Chengdu
Priority to CN2013100167908A priority Critical patent/CN103095835A/en
Publication of CN103095835A publication Critical patent/CN103095835A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to the technical field of security of computer networks, in particular to a realization method for reasonable construction and correct parse of a communication data package based on an alarm system. Fixed-length data package header identification is used as data package feature identification, the length of a fixed-length data package is set at the rear of the data package header identification, the system can parse the finial size of the package according to the length of the data package after receiving data and then parse out the whole data package, and the size of the whole package can be known without traversing to the end of the package. A coding scheme of abstract syntax markup is used for coding to divide the data into the operation type of Cmd and the operation content of Value, wherein Key corresponds to the header of data package, Length corresponds to the data length, Cmd and Value both correspond to the data, Key, Length, Cmd and Value are coded through the coding and the decoding rule to form a bit stream data package, and the data content is encrypted and decrypted through a special encryption protocol. The security and the transmission speed are obviously promoted.

Description

Rational structure and correct implementation method of resolving based on the warning system communication data packet
Technical field
The present invention relates to a kind of rational structure to network packet (construct) and correct implementation method of resolving (parse), particularly based on the rational structure of warning system communication data packet and the implementation method of correct parsing.
Background technology
Along with the fast development of computer network, application increasingly extensive, huge numbers of families' safety problem is subject to people and more and more pays close attention to.Security product is as a kind of effective means of protection user property safety; progressively develop into a research direction of computer network security field; in traditional security product; standard is different; unsound (the Luo Wanjie of communication protocol; the complete compatible research 2008 of warning message) correct encapsulation and the parsing difficulty of data realize, and data transparent transmission is very easily revealed.
This research is for traditional security protection communication protocol technology defective, a kind of method that proposes science more seems very important, the present invention proposes a kind of rationally efficient data processing method ILD for this reason, wherein " I " is writing a Chinese character in simplified form of " Identity ", " L " is writing a Chinese character in simplified form of " Length ", " D " is writing a Chinese character in simplified form of " Data ", data content, that is: and the packet composition is represented by data packet head sign, data length, data content.This kind method has solved the problem that the data of legacy network alarm communication agreement can not correctly be resolved, and adopts the dynamic encryption mode that data are encrypted, and solves data transparent transmission problem in the legacy network alarm communication.It is more reasonable to realize on traditional security protection communication protocol basis, the method that data are safer.
Summary of the invention
The object of the invention is to propose and design a kind of rational structure and correct implementation method of resolving based on the warning system communication data packet, unpacking rate to reduce rate of false alarm and to improve data, increasing data peace property entirely; The correct encapsulation and the parsing that overcome data in traditional security protection agreement are difficult to realize, the technological deficiency that data transparent transmission is easily revealed.
The technical scheme that realizes the object of the invention is as follows: a kind of rational structure and correct implementation method of resolving based on the warning system communication data packet, the communication format that comprises the security protection communication data, packet is carried out rational structure (construct) and correct resolve (parse), namely formulate the coding and decoding rule, be used for main frame and server, the mode that is connected by the TCP network between server and Surveillance center communicates; Described rational structure (construct) refers to by realize the rational structure of bag (package) on the TCP/IP principle; Utilize fixed-length data packet header sign as the packet signature identification, at data packet head sign back setting long data packet length value, system can parse according to data packet length the final size of bag after receive data, thereby parse complete data packet, need not to traverse the whole size that the bag tail is just known bag (package).
Further, described rational structure and correct implementation method of resolving based on the warning system communication data packet, the data storage method of described packet is:
Figure BDA00002745223800021
Wherein, Key packet header sign, the whole packet length of Len comprises data packet head, bag is long, and content Data is user data; Carrying out suitable encapsulation process according to user input content obtains Xin Bao and forms one-to-one relationship with decoding.Data packet format is as follows:
Figure BDA00002745223800022
Further, described rational structure based on the warning system communication data packet is resolved and implementation method with correct, utilizes the coded system coding of abstract syntax notation one; Abstract syntax notation one ASN(Abstract Syntax Notation) coded system that length is determined, forming (Identifier octets, Lengthoctets, Command octets, Contents octets) by 4 parts is namely the Key-Length-Cmd-Value model, in order to distinguish concrete operation, data are marked off action type Cmd and content of operation Value; KEY corresponding data bag packet header wherein; Length corresponding data length; Cmd and Value be corresponding data together.
Further, described rational structure based on the warning system communication data packet is resolved and implementation method with correct, and wherein, length field Length represents the length of numerical value; Command field Cmd represents type of message; Content field Content represents actual numerical value.
Further, described rational structure based on the warning system communication data packet is resolved and implementation method with correct, implementation method is to utilize described coding and decoding rule to complete, finger is encoded to Key, Length, Cmd and Value, form the bitstream data bag, and by the dedicated encrypted agreement, the data content is encrypted and deciphers.
By realize enabling correct parsing by the rational structure of bag on the TCP/IP principle.The method utilizes fixed-length data packet header sign as the packet signature identification, in the TCP transmitting procedure, upper layer application can be according to the correct differentiation packet of this bag sign, and the correct differentiation that solves legacy network alert data bag is difficult, the problem that can not correctly resolve that even has.
Add fixed-length data packet length sign in packet, whether enable to solve fast the integrality of packet, the method identifies the back immediately following the fixed-length data packet length value at data packet head, can solve according to the data packet length value the final size of this bag after receive data, thereby parse complete data packet.whether completely utilize this mode that bag is known fast, be fixed in data trailer when comparing traditional network alarming agreement and namely communicating by letter and finish sign, the time complexity that has increased when resolving (identifies owing to will looking for from the beginning to the end ending up, can compare successively, to the last, if contain in packet content and the identical character code of end of data sign, data will can not correctly solve complete data packet because sign is identical so, thereby cause the upper unreasonable data mistake bag that causes of design, be not the authentic data packet loss), package identification adds length mark ILD and can longly according to the bag that closely follow later in packet header identify, need not to traverse the whole size that the bag tail is just known bag, thereby speed is exceedingly fast, time complexity is Constant Grade O(1), and due to packet when sending, before the packet header sign is added in data content all the time, need not ergodic data leader knowledge in data content, thereby avoid causing the mistake package operation owing to occurring the character code identical with Data Identification in data content, traditional network alarming agreement can be followed the length of data content and be changed, therefore his time complexity is O(n), linear), safety, transparent.Data content adds the mode of dynamic encryption, make data safer, encryption key is generated by server and returns when logging in successfully, all need in whole communication process to use this key that dynamically generates could with the server proper communication, with its disconnection, can suitably prevent some malicious attacks as incorrect.Fail safe: because traditional network alarming is to send in transparent mode, this kind mode is very easily arrested, thereby information is cracked, even can be used to easily attack server, cause server stress, and ILD can weaken this risk to a certain extent, the one, data content is encrypted (DATA, the user can the Custom Encryption mode forms new DATA), difficult quilt is really separated; The 2nd, key is dynamic generation, even if caught also with server generate not corresponding.Thereby serviced device initiatively disconnects.Based on These characteristics, find through test in real network, separate speed packet and obviously promote.The sticking bag of TCP is processed under normal circumstances, and number of comparisons is obviously fallen at the end, is generally hit at first time.Data are by packet catcher observed data mess code.
The present invention makes ILD communication protocol connect by the mode that length connects, and has guaranteed the communication real-time between main frame, server, Surveillance center.
The data that the ILD communications protocol is used have comprised temporal information, so require equipment to be consistent with server time, process when at first carrying out the school when the main frame connection server.
Compare with traditional safety alarm system communication system technology, the present invention has outstanding advantage and significant good effect.
(1) transmission speed improves significantly.Traditional network alarming agreement, it is communicated by letter with being fixed in data trailer and finishes sign, owing to will looking for from the beginning to the end the ending sign, can compare successively, to the last, thus the time complexity when having increased parsing; The present invention makes packet add regular length according to head afterwards immediately following the long sign of fixed length newspaper, need not to traverse the whole size that the bag tail is just known bag, thereby speed to be exceedingly fast; The length that traditional network alarming agreement can be followed data content changes, thereby its time complexity is O(n), linearity), and the present invention to make the time complexity of DID agreement be Constant Grade O(1).
(2) fail safe.Because traditional network alarming is to send in transparent mode, this kind mode is very easily arrested, thereby information is cracked, and even can be used to easily attack server, causes server stress; And the present invention can weaken this risk to a certain extent, the one, data content is encrypted, be difficult for being cracked, the 2nd, key is dynamic generation, even if caught also with server generate not corresponding, thereby serviced device initiatively disconnects.
(3) find through test in real network, the present invention obviously promotes the solution speed packet.The sticking bag of TCP is processed under normal circumstances, and number of comparisons obviously reduces, and is generally hit at first time, affects hardly the normal operation of application program.
Description of drawings
Fig. 1 is coding flow process block diagram representation of the present invention.
Fig. 2 is the present invention's TCP implementation framework schematic diagram in the network service experiment.
When Fig. 3 is decoding of the present invention, sticking bag is processed block diagram representation.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the present invention is described in further detail.It is emphasized that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention the scope of design and claim thereof.
A kind of rational structure and correct implementation method of resolving based on the warning system communication data packet, the communication format that comprises the security protection communication data, packet is carried out rational structure (construct) and correct resolve (parse), namely formulate the coding and decoding rule, be used for main frame and server, the mode that is connected by the TCP network between server and Surveillance center communicates; Described rational structure (construct) refers to by realize the rational structure of bag (package) on the TCP/IP principle; Utilize fixed-length data packet header sign as the packet signature identification, at data packet head sign back setting long data packet length value, system can parse according to data packet length the final size of bag after receive data, thereby parse complete data packet, need not to traverse the whole size that the bag tail is just known bag (package).Data packet format is as follows:
Traditional:
The N data #@
The present invention:
Figure BDA00002745223800051
When as seen conventional data communications is fetched data, all to find end end mark " #@", owing to searching traversal N data space, so spended time is relatively long, and can be with the linear increase of the growth of data n.
In the present invention, start owing to being identified at data field, thus just hit for the first time, then be offset 2 bytes, and get corresponding data bag size, thus irrelevant with the N size of data, need not to travel through the N data space, so speed is obviously accelerated.
Described rational structure based on the warning system communication data packet is resolved and implementation method with correct, and the data storage method of described packet is:
Wherein, Key packet header sign, the whole packet length of Len comprises data packet head, bag is long, and content Data is user data; Carrying out suitable encapsulation process according to user input content obtains Xin Bao and forms one-to-one relationship with decoding.Fig. 1 has illustrated coding flow process of the present invention to receive the user input data length M, and sign KEY, bag overall length LEN, DATA are data after last coding; Initially begin M=0LEN=0DATA=0; Receiving data stream M, data flow M user encryption ENCODE(M) formation new data M=ENCODE(M); DATA=KEY (sign length)+LEN(wraps overall length)+the rear data content of M(encryption is long); Data encapsulation is completed.
Described rational structure and correct implementation method of resolving based on the warning system communication data packet utilize the coded system of abstract syntax notation one to encode; Abstract syntax notation one ASN(Abstract Syntax Notation) coded system that length is determined, forming (Identifier octets, Length octets, Command octets, Contents octets) by 4 parts is namely the Ken-Length-Cmd-Value model, in order to distinguish concrete operation, data are marked off action type Cmd and content of operation Value; Key corresponding data bag packet header wherein; Length corresponding data length; Cmd and Value be corresponding data together.
Further, wherein, length field Length represents the length of numerical value; Command field Cmd represents type of message; Content field content represents actual numerical value.
Further, described rational structure and correct implementation method of resolving based on the warning system communication data packet, implementation method is to utilize described coding and decoding rule to complete, finger is encoded to Key, Length, Cmd and Value, form the bitstream data bag, and by the dedicated encrypted agreement, the data content is encrypted and deciphers.
Form the coded system coding that ILD communication protocol adopts abstract syntax notation one during the communication of the present invention between main frame, server, Surveillance center, and by desirable dedicated encrypted agreement, the data content is encrypted, guaranteed the disguise of valid data contents, prevented that data from being intercepted by the disabled user and making corresponding illegal act.
The ILD coding just refers to Key, Length, Cmd and Value are encoded, and forms the bitstream data bag; Decoding is the inverse process of coding, is to resolve to restore initial data from the bit stream buffering area.Specific embodiment is as follows:
1 data packet format:
Packet header (Headkey) Bag long (Len) Order (Cmd) Content (Content)
Byte 1~2 Byte 3~6 Byte 7~8 Byte 9 ... byte n
Wherein:
Packet header (Headkey): be fixed as 0x3995
Bag long (Len): have suffered data packet head length, the 2+4+2+ content-length
Order (Cmd): be used to indicate the content type that this packet comprises
Content (Content): actual data content
2 centers log in:
Be used for each center and be connected to given server, and obtain from server the facility information that this center is administered.
Center → server: Cmd=10001
Figure BDA00002745223800061
Figure BDA00002745223800071
Server → center: Cmd=20001
Figure BDA00002745223800072
Annotate: after server logged in the center, iret was used for the return state after prompting logs in:
Iret=0001: log in successfully
-1: log in failure
-2: user name or password mistake
-3: packet number does not exist
Other: keep, undefined, expansion after being convenient to
3 warning messages:
After alarm host machine produce to be reported to the police, the mode by network with content delivery such as warning alerts (comprising transmitting time, alert locations, type of alarm) to given server.
(center → server): Cmd=10010
Figure BDA00002745223800073
4 host informations
Alarm host machine is set up long the connection in order to guarantee alert to be transferred to server, and regularly sends online monitoring information to server, with the normal connection of maintenance TCP, and need to send the main frame relevant information to server.
(4.1 main frame → server)
Heartbeat message: Cmd=10011
Logon information: Cmd=10012
Port information: Cmd=10013
Other information: Cmd=1001X
Figure BDA00002745223800081
(4.2 server → main frame)
After server is received the relevant information of main frame, and the correct response of making, the correlation behavior information of return service device.
Heartbeat message: Cmd=20011
Logon information: Cmd=20012 (the information during school)
Port information: Cmd=20013
Other information: Cmd=2001X
Figure BDA00002745223800082
5 remote programmables are controlled
Alarm center can be by remote programmable mode to alarm host machine inquire about, revise, the operation such as control,
Main frame is made necessary response according to corresponding operating.
(5.1 center → server → main frame)
Inquiry version information: Cmd=20022
Inquiry Host Status: Cmd=20023
Inquiry alert event: Cmd=20024
Inquiry programming data: Cmd=20025
Long-distance Control: Cmd=20021
Remote programmable: Cmd=20026
Figure BDA00002745223800091
(5.2 main frame → server → center)
Inquiry version information: Cmd=10022
Inquiry Host Status: Cmd=10023
Inquiry alert event: Cmd=10024
Inquiry programming data: Cmd=10025
Long-distance Control: Cmd=10021
Remote programmable: Cmd=10026
Figure BDA00002745223800092
Fail safe of the present invention can be found out by following examples:
It is as follows that traditional data captures packet data recording by packet capture software " Network Data Capturing hand ":
send?buf245
"LA1129175311011888889300001121000000*FFFFFF#@"。
The present invention is: after dedicated encrypted:
Figure BDA00002745223800093
Figure BDA00002745223800101
The network service EXPERIMENTAL EXAMPLE is as follows:
1, implementation framework:
Referring to Fig. 2, network communication program adopts the socket api programming of ICP/IP protocol to realize.Socket is oriented client/server model.
2, Experimental Hardware environment:
Server: pentium I3 microcomputer
Client computer: pentium I3 microcomputer
The network platform: the local area network (LAN) that is formed by connecting by 10,000,000 shared hub
3, experiment software environment:
Operating system: windows2003
Programming language: visual c++7.0
4, main thread:
Multithreading is adopted in programming, and server end has two threads: transmission data thread, transmission statistics show thread.Client has three threads: receive data thread, the sticking envelope curve journey of reception preliminary treatment, receiving and counting show thread.Wherein, the sending and receiving thread priority is made as the thread_priority_time_critical(limit priority), preliminary treatment thread priority is that thread_priority_above_normal(is higher than normal priority), show that thread priority is the thread_priority_normal(normal priority).
The data structure of experiment transmission data is as follows:
Figure BDA00002745223800102
5, Packetization:
For the sticking bag of the difference that may exist phenomenon, Packetization has been taked respectively corresponding solution.Its basic ideas are at first to convert by force pending receiving data stream (length is made as m) to predetermined structured data form, and therefrom take out the structured data length field, be the n in above-mentioned table, then calculate the first bag data length according to n, flow process as shown in Figure 3.
Interpretation:
1) under above-mentioned experimental situation, the some bag data length sums that send continuously when transmit leg sticking bag phenomenon often can occur during less than 1500b, and the recipient can correctly untie coherent bag after the preliminary treatment thread is processed.If be provided with " send and do not postpone " in program: (setsockopt (socket_name, ipproto_tcp, tcp_nodelay, (char*) ﹠amp; On, sizeof on), on=1 wherein), do not have sticking bag phenomenon.
2) when the transmission data are the random length data of every bag 1kb~2kb, if send interval time less than 10ms, the sticking bag appears in occasional, and the recipient can correctly untie coherent bag after the preliminary treatment thread is processed.
3) for measuring the time of processing sticking bag, transmit leg circulates successively and sends length is 1.5kb, 1.9kb, 1.2kb, 1.6kb, 1.0kb data, amounts to 1000 bags.For making sticking bag phenomenon, all wait for 10ms before the each reception of receiving thread, reception buffer zone is made as 5000b, and the recipient receives 526 bag data as a result, and wherein length is 175 bags that have of 5000b.Process through the preliminary treatment thread and can obtain 1000 bag correct data, sticking bag is processed total time less than 1ms.
Experimental result shows, the sticking bag of TCP phenomenon exists really, but can be solved by recipient's preliminary treatment, and the processing time is very short, for example in the experiment 1000 bag data the processing time less than 1ms, affects the normal operation of application program hardly altogether.

Claims (5)

1. one kind based on the rational structure of warning system communication data packet and correct implementation method of resolving, the communication format that comprises the security protection communication data, packet is carried out rational structure (construct) and correct resolve (parse), namely formulate the coding and decoding rule, be used for main frame and server, the mode that is connected by the TCP network between server and Surveillance center communicates; It is characterized in that, described rational structure (construct) refers to by realize the rational structure of bag (package) on the TCP/IP principle, utilize fixed-length data packet header sign as the packet signature identification, at data packet head sign back setting long data packet length value, system can parse according to data packet length the final size of bag after receive data, thereby parse complete data packet, need not to traverse the whole size that the bag tail is just known bag (package).
2. rational structure and correct implementation method of resolving based on the warning system communication data packet according to claim 1, is characterized in that, the data storage method of described packet is:
Figure FDA00002745223700011
Wherein, Key packet header sign, the whole packet length of Len comprises data packet head, bag is long, and content Data is user data; Carrying out suitable encapsulation process according to user input content obtains Xin Bao and forms one-to-one relationship with decoding; Data packet format is as follows:
Figure FDA00002745223700012
3. rational structure and correct implementation method of resolving based on the warning system communication data packet according to claim 1, is characterized in that, utilizes the coded system coding of abstract syntax notation one; Abstract syntax notation one ASN(Abstract Syntax Notation) coded system that length is determined, forming (Identifier octets, Length octets, Command octets, Contents octets) by 4 parts is namely the Key-Length-Cmd-Value model, in order to distinguish concrete operation, data are marked off action type Cmd and content of operation Value; Key corresponding data bag packet header wherein; Length corresponding data length; Cmd and Value be corresponding data together.
4. rational structure and correct implementation method of resolving based on the warning system communication data packet according to claim 3, is characterized in that, length field Length represents the length of numerical value; Command field Cmd represents type of message; Content field Content represents actual numerical value.
5. according to claim 1 based on the rational structure of warning system communication data packet and the implementation method of correct parsing, it is characterized in that, implementation method is to utilize described coding and decoding rule to complete, finger is encoded to Key, Length, Cmd and Value, form the bitstream data bag, and by the dedicated encrypted agreement, the data content is encrypted and deciphers.
CN2013100167908A 2013-01-17 2013-01-17 Realization method for reasonable construction and correct parse of communication data package based on alarm system Pending CN103095835A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100167908A CN103095835A (en) 2013-01-17 2013-01-17 Realization method for reasonable construction and correct parse of communication data package based on alarm system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100167908A CN103095835A (en) 2013-01-17 2013-01-17 Realization method for reasonable construction and correct parse of communication data package based on alarm system

Publications (1)

Publication Number Publication Date
CN103095835A true CN103095835A (en) 2013-05-08

Family

ID=48207958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100167908A Pending CN103095835A (en) 2013-01-17 2013-01-17 Realization method for reasonable construction and correct parse of communication data package based on alarm system

Country Status (1)

Country Link
CN (1) CN103095835A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532668A (en) * 2013-10-12 2014-01-22 成都阜特科技股份有限公司 Method for ensuring integrity and correctness of TCP (transmission control protocol) communication data
CN104809100A (en) * 2015-04-02 2015-07-29 上海新时达电气股份有限公司 Text coding and decoding method and corresponding coding and decoding system
CN105610901A (en) * 2015-12-15 2016-05-25 深圳市航盛电子股份有限公司 Network data packet transmission and analysis method
CN105681322A (en) * 2016-02-24 2016-06-15 清德智体(北京)科技有限公司 Network streaming media frame data acquisition method
CN106781102A (en) * 2017-01-19 2017-05-31 深圳怡化电脑股份有限公司 The method and system of automatic teller machine managed paper currency
CN107005746A (en) * 2014-09-05 2017-08-01 微软技术许可有限责任公司 Partial encryption for the data flow head of system setup
CN107209672A (en) * 2015-01-28 2017-09-26 日立公共系统有限公司 Information processor and information processing method
CN107566395A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of building method of interactive data bag
CN111459713A (en) * 2020-06-17 2020-07-28 北京机电工程研究所 Memory detection method and device
CN114938400A (en) * 2022-07-25 2022-08-23 倍智智能数据运营有限公司 Method for analyzing data reported by Internet of things sensing equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003015369A2 (en) * 2001-08-07 2003-02-20 Innominate Security Technologies Ag Method and computer system for securing communication in networks
CN101958825A (en) * 2009-07-20 2011-01-26 新奥特(北京)视频技术有限公司 Asynchronous data exchange method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003015369A2 (en) * 2001-08-07 2003-02-20 Innominate Security Technologies Ag Method and computer system for securing communication in networks
CN101958825A (en) * 2009-07-20 2011-01-26 新奥特(北京)视频技术有限公司 Asynchronous data exchange method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ITEYE: "应用层通信协议开发浅析", 《HTTP://SABOLASI.ITEYE.COM/BLOG/1254164》 *
杨小平等: "解决TCP网络传输"粘包"问题", 《软件世界》 *
王文广: "智能小区安防系统的研究与设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532668B (en) * 2013-10-12 2016-11-23 成都阜特科技股份有限公司 A kind of method guaranteeing that TCP communication data are complete and correct
CN103532668A (en) * 2013-10-12 2014-01-22 成都阜特科技股份有限公司 Method for ensuring integrity and correctness of TCP (transmission control protocol) communication data
CN107005746B (en) * 2014-09-05 2020-05-08 微软技术许可有限责任公司 Method, system, and computer-readable storage medium for encryption
CN107005746A (en) * 2014-09-05 2017-08-01 微软技术许可有限责任公司 Partial encryption for the data flow head of system setup
CN107209672B (en) * 2015-01-28 2020-08-14 日立社会信息服务有限公司 Information processing apparatus and information processing method
CN107209672A (en) * 2015-01-28 2017-09-26 日立公共系统有限公司 Information processor and information processing method
CN104809100A (en) * 2015-04-02 2015-07-29 上海新时达电气股份有限公司 Text coding and decoding method and corresponding coding and decoding system
CN105610901A (en) * 2015-12-15 2016-05-25 深圳市航盛电子股份有限公司 Network data packet transmission and analysis method
CN105681322A (en) * 2016-02-24 2016-06-15 清德智体(北京)科技有限公司 Network streaming media frame data acquisition method
CN105681322B (en) * 2016-02-24 2019-08-23 清德智体(北京)科技有限公司 A kind of frame data acquisition methods of network flow-medium
CN106781102A (en) * 2017-01-19 2017-05-31 深圳怡化电脑股份有限公司 The method and system of automatic teller machine managed paper currency
CN107566395A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of building method of interactive data bag
CN111459713A (en) * 2020-06-17 2020-07-28 北京机电工程研究所 Memory detection method and device
CN111459713B (en) * 2020-06-17 2020-09-25 北京机电工程研究所 Memory detection method and device
CN114938400A (en) * 2022-07-25 2022-08-23 倍智智能数据运营有限公司 Method for analyzing data reported by Internet of things sensing equipment
CN114938400B (en) * 2022-07-25 2022-11-25 倍智智能数据运营有限公司 Method for analyzing data reported by Internet of things sensing equipment

Similar Documents

Publication Publication Date Title
CN103095835A (en) Realization method for reasonable construction and correct parse of communication data package based on alarm system
CN105208018B (en) A kind of industry control network information spy method based on funneling white list
WO2017084600A1 (en) Internet of things system used for intelligent gas meter and information transmission method for internet of things system
CN108011698B (en) RSSP-I secure communication method based on dual-system synchronization
CN106953855B (en) Method for intrusion detection of GOOSE message of IEC61850 digital substation
CN104993952A (en) Network user behavior audit and responsibility management system
CN110401624A (en) The detection method and system of source net G system mutual message exception
CN105187209B (en) A kind of method of ethernet communication safeguard protection
CN102594563A (en) Source authentication method for secure multicast
CN103929411B (en) Information displaying method, terminal, safety server and system
CN107483409B (en) A method of the operational order real-time monitoring echo towards industry control operating system
CN104572416A (en) Operation and maintenance data processing method and device
CN105049232A (en) Network information log audit system
CN101945116A (en) Method for exchanging cross-domain video data safely
CN106888217A (en) A kind of management-control method attacked for ARP and system
CN108566284A (en) A kind of collecting method for MES
CN110380842A (en) CAN bus message endorsement method, device and system suitable for wisdom net connection automobile
CN102857503A (en) Secure wireless transmission method for fingerprint data
CN106657145B (en) A kind of database automatic discovering method based on communication protocol and SQL syntax
CN106572103B (en) hidden port detection method based on SDN network architecture
CN105337797B (en) A kind of sophisticated electronic information systems internetting protocol data catching method
CN107426166A (en) A kind of acquisition methods of information, device and electronic equipment
CN104079578A (en) Evidence-taking data hidden transmission method and system
CN108023884A (en) A kind of encryption method of Networks and information security
CN105187219A (en) Method for preventing tampering of identity information in real name authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130508