CN111224864A - Message transmission method and device, computer equipment and storage medium - Google Patents

Message transmission method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111224864A
CN111224864A CN202010037071.4A CN202010037071A CN111224864A CN 111224864 A CN111224864 A CN 111224864A CN 202010037071 A CN202010037071 A CN 202010037071A CN 111224864 A CN111224864 A CN 111224864A
Authority
CN
China
Prior art keywords
message
sub
data
server
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010037071.4A
Other languages
Chinese (zh)
Inventor
陈义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An International Smart City Technology Co Ltd
Original Assignee
Ping An International Smart City Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An International Smart City Technology Co Ltd filed Critical Ping An International Smart City Technology Co Ltd
Priority to CN202010037071.4A priority Critical patent/CN111224864A/en
Publication of CN111224864A publication Critical patent/CN111224864A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Abstract

The application relates to a message transmission method, a message transmission device, computer equipment and a storage medium in the field of transmission protocols. The method comprises the following steps: acquiring a message transmission task, wherein the message transmission task carries message data; acquiring a specific field corresponding to a message transmission task based on a preset private protocol, wherein the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol; acquiring message configuration information corresponding to a preset private protocol, wherein the message configuration information comprises header format information corresponding to a specific field; optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number; generating a message header according to the specific optimized field, determining message data as a message body, and generating a message according to the message header and the message body; and sending the message to a server, so that the server analyzes the message based on a preset private protocol to obtain message data. The method can reduce communication cost.

Description

Message transmission method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a message transmission method, an apparatus, a computer device, and a storage medium.
Background
With the development of computer technology, Instant Messenger (IM) technology has emerged. The use of instant messaging tools to enable message transmission between a plurality of terminals has become one of the important applications of current mobile communication networks. The user can send the message to the server through the terminal, and the server routes and forwards the message to other corresponding terminals, so that real-time message communication among different users is realized.
In the process of transmitting a message to a server by a terminal, the terminal usually generates a corresponding message according to the message to be transmitted, and sends the message to the server. However, in the conventional method, the message structure generated by the terminal is complex, and the data volume contained in the message is large. When transmitting the corresponding message, the message with a large data amount may consume more communication resources of the terminal, for example, may consume more traffic resources, and the communication cost is higher. Therefore, how to reduce the communication resources consumed by the terminal for transmitting the message and reduce the communication cost becomes a technical problem to be solved at present.
Disclosure of Invention
In view of the above, it is necessary to provide a message transmission method, a message transmission apparatus, a computer device, and a storage medium, which can reduce communication resources consumed by a terminal for transmitting a message, thereby reducing communication costs.
A method of message transmission, the method comprising:
acquiring a message transmission task, wherein the message transmission task carries message data;
acquiring a specific field corresponding to the message transmission task based on a preset private protocol, wherein the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol;
acquiring message configuration information corresponding to the preset private protocol, wherein the message configuration information comprises header format information corresponding to the specific field;
optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number;
generating a message header according to the specific optimized field, determining the message data as a message body, and generating a message according to the message header and the message body;
and sending the message to a server, so that the server analyzes the message based on the preset private protocol to obtain the message data.
In one embodiment, the obtaining of the specific field corresponding to the message transmission task based on the preset private protocol includes:
analyzing the message transmission task to obtain a task type corresponding to the message transmission task;
counting the message data carried in the message transmission task to obtain the message length corresponding to the message data;
and acquiring version information corresponding to the preset private protocol to obtain the specific field comprising the task type, the message length and the version information.
In one embodiment, the method further comprises:
reading shifting information from the message configuration information, wherein the shifting information comprises a shifting direction and a shifting digit;
and encrypting the message length according to the shifting direction and the shifting digit to obtain a target length corresponding to the message data.
In one embodiment, the message configuration information further includes message format information, and the determining the message data as a message body includes:
acquiring a serialization model, and inputting the message data into the serialization model;
calling the serialization model to perform serialization processing on the message data according to the message format information to obtain target message data;
and packaging the target message data to obtain the message body.
In one embodiment, the sending the message packet to a server, so that the server analyzes the message packet based on the preset private protocol to obtain the message data includes:
acquiring the message length corresponding to the message;
when the message length is larger than a threshold value, splitting the message to obtain a plurality of sub-messages, wherein the sub-messages comprise corresponding sub-message identifications;
and sending the sub-messages to the server, so that the server combines the received sub-messages according to the sub-message identifications and analyzes the combined sub-messages to obtain the message data.
In one embodiment, the method further comprises:
receiving response information returned by the server according to the sent sub-message, wherein the response information comprises a received sub-message identifier corresponding to the sub-message received by the server;
judging whether an unreceived sub-message identifier corresponding to a sub-message which is not received by the server exists according to the received sub-message identifier;
and when the sub-message identification which is not received exists, retransmitting the sub-message corresponding to the sub-message identification which is not received to the server.
A message transmission apparatus, the apparatus comprising:
a transmission task obtaining module, configured to obtain a message transmission task, where the message transmission task carries message data;
a specific field acquisition module, configured to acquire a specific field corresponding to the message transmission task based on a preset private protocol, where the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol;
a configuration information obtaining module, configured to obtain message configuration information corresponding to the preset private protocol, where the message configuration information includes header format information corresponding to the specific field;
the specific field optimizing module is used for optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number;
a message generating module, configured to generate a message header according to the specific optimized field, determine that the message data is used as a message body, and generate a message according to the message header and the message body;
and the message transmission module is used for sending the message to a server, so that the server analyzes the message based on the preset private protocol to obtain the message data.
In one embodiment, the message configuration information further includes message format information, and the message generation module is further configured to obtain a serialization model, and input the message data into the serialization model; calling the serialization model to perform serialization processing on the message data according to the message format information to obtain target message data; and packaging the target message data to obtain the message body.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the message transmission method when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the message transmission method.
According to the message transmission method, the message transmission device, the computer equipment and the storage medium, after the message transmission task is obtained, the specific field corresponding to the message transmission task is obtained based on the preset private protocol. And optimizing the corresponding specific field according to the header format information corresponding to the specific field in the message configuration information corresponding to the preset private protocol to obtain the specific optimized field with the specific byte number. And generating a message according to the specific optimized field and the message data carried in the message transmission task and sending the message to the server, wherein the server can analyze the message to obtain the message data. Compared with the traditional mode, the specific fields corresponding to the message transmission tasks are optimized based on the preset private protocol, the specific fields are simplified, the message messages for transmission are generated according to the specific optimized fields, the data volume of the message messages is reduced, the consumption of communication resources such as flow resources is effectively reduced, and the communication cost is reduced.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a message transmission method;
FIG. 2 is a flow diagram illustrating a method for message transmission in one embodiment;
fig. 3 is a schematic flow chart illustrating a step of sending a message to a server in an embodiment, so that the server parses the message based on a predetermined private protocol to obtain message data;
FIG. 4 is a block diagram of a message transmission apparatus according to an embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The message transmission method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 acquires a message transmission task, and the message transmission task carries message data. The terminal 102 obtains a specific field corresponding to the message transmission task based on a preset private protocol, where the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol. The terminal 102 obtains message configuration information corresponding to a preset private protocol, where the message configuration information includes header format information corresponding to a specific field, and optimizes the specific field according to the header format information to obtain a specific optimized field with a specific byte number. The terminal 102 generates a message header according to the specific optimized field, determines message data as a message body, and generates a message according to the message header and the message body. The terminal 102 sends the message to the server 104, so that the server 104 analyzes the message based on the preset private protocol to obtain the message data sent by the terminal 102. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a message transmission method is provided, which is described by taking the method as an example applied to the terminal 102 in fig. 1, and includes the following steps:
step 202, a message transmission task is obtained, and the message transmission task carries message data.
The message transmission task may be used to instruct the terminal to send message data carried by the message transmission task to the server, where the message data may be data communicated between users. The message data may be various types of data, for example, the message data may be text data, image data, or a collection of various types of data. The terminal may be installed and run with an Instant Messaging (IM) application on an operating system, where the IM application is an application program for implementing Instant Messaging between multiple users. The terminal can communicate with the Server through the network, and the terminal and the Server can be in a C/S (Client-Server) Architecture or a B/S (Browser/Server Architecture) Architecture. Correspondingly, the instant messaging application may be a client application or a web application.
The terminal can acquire the message transmission task generated by the instant messaging application and execute the acquired message transmission task to perform message transmission. Specifically, the terminal may receive a message to be transmitted input by the user through the instant messaging application, and the user may input the message through an input device associated with the terminal. The instant messaging application can respond to the triggered transmission control to generate a message transmission task, and the transmission control can be an entity control on the terminal input equipment or a virtual control displayed in a terminal display interface. The terminal can obtain a message transmission task generated by the instant messaging application, wherein the message transmission task carries message data to be transmitted input by a user.
And 204, acquiring a specific field corresponding to the message transmission task based on a preset private protocol, wherein the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol.
The preset private protocol is preset by a user, and may be an application layer protocol for a message transmission service, which is obtained by optimizing an application layer protocol based on a transmission control protocol. The preset private protocol is used for defining messages and transmission modes mutually transmitted between the terminal and the server. The preset proprietary protocol may be referred to simply as the proprietary protocol. For example, the private protocol obtained after the optimization processing may redefine the message structures, message formats, and other information corresponding to the multiple messages, respectively. The messages may include login messages, message messages, authentication messages, verification messages, and the like, and the structures of the messages may be the same or different. Compared with the traditional application layer protocol, the optimized private protocol can simplify the message structure, reduce the data volume of the message on the premise of not losing data, and further effectively save the flow resource in the message transmission process. The proprietary protocol may enable communication between the terminal and the server based on a transmission control protocol. The transmission control protocol may be one of a variety of transport layer communication protocols. For example, the Transmission Control Protocol may be a TCP (Transmission Control Protocol) Protocol or a UDP (User datagram Protocol) Protocol.
The terminal can acquire a specific field corresponding to the message transmission task based on the private protocol. The specific field refers to a specific field included in a message structure defined by the optimized private protocol. Specifically, the terminal may obtain message structure information corresponding to the private protocol, where the message structure information includes header structure information and body structure information. Specific fields required for generating a message are described in the header structure information. The terminal may obtain a specific field corresponding to the message transmission task according to the header structure information corresponding to the private protocol, where the obtained specific field may include a task type corresponding to the message transmission task, a message length corresponding to the message data, and version information corresponding to the private protocol.
Step 206, obtaining message configuration information corresponding to the preset private protocol, where the message configuration information includes header format information corresponding to the specific field.
The message configuration information corresponding to the private protocols of different versions of information may be completely the same, or may be partially different or completely different. The preset private protocol may include corresponding message configuration information and is stored in the terminal and the server. The terminal can obtain message configuration information corresponding to the current private protocol for executing the message transmission task. The message configuration information corresponding to the private protocol records the configuration information of the messages corresponding to different types of tasks. The message configuration information may include message structure information and message format information corresponding to the task type, and the message structure information may include header structure information and body structure information. Correspondingly, the message format information may include header format information and message format information.
After the terminal obtains the specific field corresponding to the message transmission task according to the private protocol, the terminal can obtain header format information corresponding to the specific field from message configuration information corresponding to the private protocol, wherein the header format information includes field format information corresponding to a plurality of specific fields respectively.
And step 208, optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number.
The terminal may optimize the obtained specific field according to the header format information in the message configuration information. Specifically, the terminal may read field format information corresponding to each of the plurality of specific fields from the header format information, and optimize the corresponding specific field according to the field format information. The field format information may describe the data format required for the corresponding specific field. For example, the terminal may optimize a specific field according to the field format information, and convert the specific field into data in a binary format.
The field format information may also record the optimized data size corresponding to the specific field. The field format information may include the number of bytes occupied by the optimized corresponding specific field, and the number of bytes occupied by each specific field may be fixed. And the terminal optimizes the corresponding specific field according to the field format information to obtain the specific optimized field with specific byte number. Compared with the traditional mode, the method simplifies the number of bytes occupied by the specific field, effectively reduces the data volume of the message and reduces the communication cost of the terminal.
In one embodiment, the specific field acquired by the terminal may include a task type corresponding to the message transmission task, a message length corresponding to the message data, and version information corresponding to the private protocol. The terminal optimizes the specific fields according to the field format information corresponding to the specific fields respectively to obtain specific optimized fields with binary format and including specific byte number, the optimized task type occupies 2 bytes, the optimized version information occupies 2 bytes, and the optimized message length occupies 4 bytes. The terminal optimizes the specific field through the message format information, can unify the data format of the specific field, simplifies the specific field, obtains the specific optimized field with less bytes, and effectively reduces the data volume contained in the specific field compared with the traditional message field which needs to occupy a large number of bytes.
Step 210, generating a message header according to the specific optimized field, determining message data as a message body, and generating a message according to the message header and the message body.
The terminal can splice a plurality of optimized specific optimized fields according to the header structure information in the message configuration information to generate a message header. In one embodiment, the specific optimization field of the message header may include and only include optimized task type, message length, and version information. The terminal can determine the message data carried in the message transmission task as a message body, and package the message data according to the body structure information and the body format information in the message configuration information to obtain the message body. And the terminal combines the generated message header and the message body to generate a message corresponding to the message transmission task.
Step 212, sending the message to the server, so that the server analyzes the message based on the preset private protocol to obtain the message data.
The terminal can upload the generated message to the server through a communication channel between the terminal and the server. The communication channel between the terminal and the server may be established according to a transport layer transmission control protocol corresponding to a private protocol. For example, when the transmission control protocol is the TCP protocol, the terminal may establish a long connection with the server through three handshakes. The terminal can execute the message transmission task and transmit the message to the server, so that the server obtains message data according to the message. Specifically, the server is provided with a private protocol the same as that of the terminal, and the server can analyze the message according to the private protocol. The server can analyze the message header of the message, acquire version information in the message header, determine the private protocol of the corresponding version according to the version information, and analyze the message through the private protocol with the same version. The server can determine the real message data part in the message body according to the message length, thereby avoiding the omission of the message data and ensuring the effectiveness of message transmission. And the server responds to the operation corresponding to the task according to the task type and carries out routing forwarding on the message data according to the message transmission task so as to realize the communication between the user terminals.
In this embodiment, after acquiring the message transmission task, the terminal acquires the specific field corresponding to the message transmission task according to a preset private protocol, where the private protocol is an application layer protocol obtained after performing optimization processing. And the terminal optimizes the specific field according to the header format information in the message configuration information to obtain the specific optimized field with specific byte number, and generates a message according to the specific optimized field and the message data. And the terminal sends the message to the server, so that the server analyzes the message to obtain message data. The message is packaged according to the private protocol, so that even if the message is leaked or intercepted, the message cannot be analyzed under the condition of no private protocol, and the safety of message data in the message is effectively improved. Compared with the traditional message header structure with a large number of fields in the application layer protocol, and each field comprises a large number of data, the embodiment acquires part of specific fields, simplifies the structure of the message header, eliminates unnecessary fields, and performs corresponding optimization on the specific fields, thereby reducing the bytes occupied by the fields, reducing the data volume of the generated message, effectively reducing the communication resources consumed by the terminal when the terminal transmits the message, and reducing the communication cost of the terminal.
In one embodiment, the step of obtaining the specific field corresponding to the message transmission task based on the preset private protocol comprises: analyzing the message transmission task to obtain a task type corresponding to the message transmission task; counting message data carried in the message transmission task to obtain a message length corresponding to the message data; and acquiring version information corresponding to the preset private protocol to obtain a specific field comprising the task type, the message length and the version information.
After the terminal obtains the message transmission task, the terminal can analyze the message transmission task according to the private protocol to obtain a task type corresponding to the message transmission task. The task type may be tagged with a corresponding type identification. The terminal can obtain various different types of tasks according to different actual operation requirements of the instant messaging application. Many different types of tasks may include, but are not limited to, authentication tasks, connection establishment tasks, message transmission tasks, and heartbeat packet sending tasks, among others. For example, when the instant messaging application is connected with the server, the terminal may acquire a connection establishment task according to a connection requirement with the server. When the terminal is in an idle state, a heartbeat packet sending task can be generated, so that the connection between the terminal and the server is ensured. The type of task to which the messaging task corresponds may be one of a number of specific fields.
After the terminal analyzes the message transmission task, the message data carried by the message transmission task can be obtained. The message data may be text data for communication input by a user through a terminal input device, and the text data may be a single character or a character string composed of a plurality of characters. The message data may be data in a variety of formats. For example, the message data may be XML (Extensible Markup Language) data, and may also be data in binary format. The terminal can count the message data carried by the message transmission task to obtain the message length corresponding to the message data. For example, when the message data is a character string, the terminal may count the number of characters included in the character string. When the message data is in binary format, the terminal can count the bit number of the binary data and determine the message length corresponding to the message data.
The private protocol can be updated according to actual service requirements, and the private protocol of the corresponding version is obtained after updating. After the private protocol is updated for multiple times, the private protocols corresponding to multiple versions can be obtained. The terminal may obtain version information of the private protocol corresponding to the execution of the message transmission task, where the version information may include a version identifier for marking the version information of the private protocol. The terminal can obtain a plurality of specific fields corresponding to the message transmission task according to the private protocol, wherein the specific fields comprise a task type corresponding to the message transmission task, a message length corresponding to the message data and version information corresponding to the private protocol.
In this embodiment, the terminal parses the message transmission task according to the preset private protocol, obtains a specific field including a task type, a message length, and version information, and can generate a message header for transmission according to the specific field. In the conventional application layer protocol, the message structure further includes a large number of fields such as a request method, an application name, a uniform resource locator, connection attributes, and the like. Compared with the traditional message header, the specific field obtained based on the private protocol only comprises partial fields, and unnecessary fields are eliminated, so that the data volume of the message is effectively reduced, and the communication resource of the terminal is saved when the message is transmitted.
In one embodiment, before the terminal encapsulates the message data into the message body, the message data may be preprocessed. The terminal can process the message data by adopting one or more of a plurality of preprocessing modes. For example, the preprocessing mode of the terminal may be compression processing of the message data, encryption processing of the message data, or a combination of the compression processing and the encryption processing.
Specifically, after the terminal counts the message data to obtain the corresponding message length, the message length corresponding to the message data may be compared with a preset value. The preset value can be a length value preset by a user according to actual requirements. When the message length is smaller than or equal to the preset value, the terminal can directly generate a message body according to the message data. When the message length is larger than the preset value, the terminal can call a preset compression algorithm to compress the message data, and a message body is generated according to the compressed message data with smaller data volume. The preset compression algorithm may be one or more of a plurality of compression algorithms. For example, the compression algorithm that the terminal may call may include LZW (Lempel-Ziv-Welch Encoding, string table compression algorithm) algorithm, huffman compression algorithm, and the like. The terminal compresses the message data through a compression algorithm, and reduces the data volume of the corresponding message body, thereby reducing the communication resources consumed by the terminal when transmitting the message and reducing the communication cost of the terminal. The terminal can also encrypt the message data. The message data to be encrypted may be compressed message data or uncompressed message data. The terminal can acquire various encryption algorithms to encrypt the message data and generate a corresponding message body according to the encrypted message data. For example, the encryption algorithm called by the terminal may be an ECC (elliptic encryption algorithm) algorithm, may also be encrypted according to an AES (Advanced encryption standard), and may also call a combination of multiple encryption algorithms to encrypt the message data.
In this embodiment, before the terminal generates the message body according to the message data, the terminal may perform preprocessing on the message data. The terminal compresses the message data by calling a compression algorithm, generates the message body according to the compressed message data, and reduces the data volume of the corresponding message body, thereby reducing the communication resources consumed by the terminal when transmitting the message and reducing the communication cost of the terminal. The terminal encrypts the message data by calling an encryption algorithm, generates a message body according to the encrypted message data, cannot decrypt the data in the message body even if the message is leaked or intercepted, and effectively improves the safety of the message data in the message.
In one embodiment, the message configuration information further includes message format information, and the step of determining the message data as the message body includes: acquiring a serialization model, and inputting message data into the serialization model; calling a serialization model to perform serialization processing on the message data according to the message format information to obtain target message data; and packaging the target message data to obtain a message body.
The message configuration information further includes message format information, and the message format information may include a format type of data in the message body. For example, the format type of the data in the message body may be a binary data format. The terminal can perform serialization processing on the acquired message data according to the body format information.
Specifically, the terminal may obtain the serialization model and input the message data into the serialization model. The serialization model can be a data processing model which is established and trained by the terminal according to the data serialization protocol. The data serialization Protocol may be a Protocol Buffer Protocol, which defines an efficient structured data exchange format, and the terminal may establish a serialization model according to the Protocol Buffer Protocol. The terminal can call the serialization model to carry out serialization processing on the input message data, and the message data is converted into target message data in a binary format corresponding to the message format information. When the message data carried in the message transmission task is a character string in an XML format, the terminal can convert the character string into data in a binary format through a serialization model. After the terminal calls the serialization model to perform serialization processing on the message data, the terminal can receive the target message data in the binary format output by the serialization model and package the target message data to obtain the message body of the message. After the terminal transmits the message to the server, the server can analyze the message to obtain a message body, and perform deserialization processing on target message data in the message body according to the message body format information corresponding to the private protocol, so as to obtain the message data uploaded by the terminal.
In one embodiment, after the terminal performs the serialization processing on the message data, the target message data in the binary format may be processed according to the preprocessing method in the above embodiment. For example, the terminal may perform compression processing and encryption processing on the target message data in the binary format, thereby further reducing the data volume of the corresponding message body and improving the security of the message data.
In one embodiment, the terminal may optimize the specific field according to the header format information, and convert the specific field into a specific optimized field in a binary format. The terminal can generate the message in binary format according to the specific optimized field and the target message data.
In this embodiment, the terminal may obtain the serialization model, call the serialization model to perform serialization processing on the message data according to the message format information, to obtain target message data in a binary format, and package the target message data in the binary format to obtain the message body. Compared with the character string in the XML format, the data volume corresponding to the target message data in the binary format with the same data content is smaller, the transmission speed in the transmission process is higher, and the communication resources consumed by the terminal in the message transmission process are reduced. Even under the condition of poor network environment, the times of retransmission can be reduced by a small message, the effectiveness of message transmission is ensured, and the communication cost of the terminal is reduced. Moreover, the server can deserialize and restore the message data according to the message format information corresponding to the private protocol, so that the safety of the message data is effectively improved.
In one embodiment, the message transmission method further includes: reading shifting information from the message configuration information, wherein the shifting information comprises a shifting direction and a shifting digit number; and encrypting the message length according to the shifting direction and the shifting digit to obtain the target length corresponding to the message data.
The terminal counts the message data carried in the message transmission task, and after the message length corresponding to the message data is obtained, the obtained message length can be encrypted. Wherein the unit of the message length may vary according to the format of the message data. For example, when the message data is a character string, the terminal may read the character string, and determine the number of characters included in the character string as the message length corresponding to the message data. When the message data is converted into the target message data in the binary format, the terminal may determine the bit number of the binary data as the message length corresponding to the message data. The terminal can convert the counted message length into data in binary format.
The message configuration information corresponding to the private protocol also comprises shift information used for length encryption, and the terminal can read the shift information from the message configuration information and encrypt the message length according to the shift information. Specifically, the shift information in the message configuration information includes a shift direction and a shift digit number, the shift direction may include leftward shift and rightward shift, and the user may preset the shift direction and the shift digit number. The terminal can move the message length data in the binary format according to the shift direction and the moving digit to obtain the processed binary data. The terminal may determine the moved binary data as the encrypted target length corresponding to the message data. After the terminal uploads the message to the server, the server needs to decrypt the target length in the message header, and then can read the corresponding real message data from the message body.
For example, when the terminal obtains the message length corresponding to the message data by statistics as 5, taking the case that the message length occupies one byte, the binary data corresponding to the message length is 00000101. The terminal acquires the shift information in the message configuration information, and when the shift direction included in the shift information configured by the user is leftward and the number of the mobile bits is 1 bit, the terminal can encrypt the message length in the binary format according to the shift information. The target length obtained after the encryption process is 00001010. It will be appreciated that the message length is changed from 5 to 10 by the encryption process.
In this embodiment, the terminal may encrypt the message length through the shift information in the message configuration information, and splice the encrypted target length into the message header. After receiving the message, the server needs to decrypt the target length according to the private protocol, and reads corresponding real message data from the message body according to the decrypted target length. If the target length is not known or the target length is not decrypted, the corresponding real message data cannot be read according to the real message length. Even if the message is leaked or intercepted, the real message data in the message body cannot be extracted, and the safety of the message data is effectively improved.
In an embodiment, as shown in fig. 3, the step of sending the message to the server so that the server analyzes the message based on the preset private protocol to obtain the message data includes:
step 302, obtaining the message length corresponding to the message.
And 304, splitting the message to obtain a plurality of sub-messages when the message length is larger than the threshold value, wherein the sub-messages comprise corresponding sub-message identifications.
And step 306, sending the sub-messages to the server, so that the server combines the received sub-messages according to the sub-message identifiers and analyzes the combined sub-messages to obtain message data.
After the message header and the message body are spliced by the terminal to generate the message, the message length corresponding to the message can be acquired. Specifically, the message may be a binary format message. The terminal can acquire the message length corresponding to the message in various ways. For example, the terminal may count the message length of the message according to the message length corresponding to the message data and the number of specific bytes respectively corresponding to the specific field in the message header. The terminal can also count the data size occupied by the message and determine the corresponding message length according to the size of the message.
The terminal may compare the message length corresponding to the message with the threshold. The threshold is a length value preset by a user according to actual requirements. When the message length is smaller than or equal to the threshold value, the terminal can directly upload the message to the server through a communication channel established between the terminal and the server, so that the server analyzes the message to obtain message data. When the message length is larger than the threshold value, the terminal can split the message into a plurality of sub-messages.
In one embodiment, the terminal may further split the message when meeting other preset conditions. For example, when the size of the message is larger than a preset size, the terminal may split the message. Or when the network transmission speed between the terminal and the server is less than the preset speed, the message can be split. The terminal can also split the message when the task type is a preset target type. The terminal can trigger the splitting of the message in various modes, so that the flexibility of message splitting is improved.
The terminal can split the message into a plurality of sub-messages in a plurality of ways. For example, the terminal may split the message packet into sub-packets of a preset size according to the preset size, where the size of the last sub-packet after splitting should be smaller than or equal to the preset size. The terminal can also split the message into a preset number of sub-messages with the same size.
In one embodiment, after splitting the message into a plurality of sub-messages, the terminal may further obtain the sub-message lengths corresponding to the sub-messages. When the length of the sub-message is larger than the preset length, the terminal can compress the plurality of sub-messages to obtain the compressed sub-messages. The terminal can send the compressed sub-message to the server, so that the data volume of the sub-message in the transmission process is further reduced, the effectiveness of message transmission is ensured, communication resources consumed by message transmission are saved, and the communication cost of the terminal is reduced.
The terminal can allocate corresponding sub-message identifiers to the sub-messages, and mark the split sub-messages by using the sub-message identifiers, wherein the sub-message identifiers can be used for marking the sub-messages and the sequence of the sub-messages. The unique mapping relation exists between the sub-message identification and the sub-message. The terminal can use various information as sub-message identification mark sub-message. For example, the sub-packet identifier may be a sequence number corresponding to the sub-packet, or may be a UUID (universal unique identifier) corresponding to the sub-packet. The terminal can send the split sub-message to the server. The server can combine a plurality of sub-messages according to the sub-message identifications corresponding to the received sub-messages and the sub-message sequence marked by the sub-message identifications, so that a complete message is obtained. The server can analyze the complete message to obtain message data.
In this embodiment, after the terminal generates the message, the terminal obtains the message length corresponding to the message. When the message length is larger than the threshold value, splitting the message into a plurality of sub-messages, and distributing corresponding sub-message identifications to each sub-message. The terminal can send the sub-message to the server, and the server combines and analyzes the sub-message according to the sub-message identifier to obtain message data. The terminal reduces the data volume of the transmitted sub-messages by splitting the message messages, and can also quickly transmit the message messages to the server under the conditions of poor network environment and the like, thereby ensuring the effectiveness of message transmission. Even if the message is lost, only the corresponding sub-message needs to be retransmitted, thereby effectively reducing the communication cost of the terminal.
In an embodiment, when the terminal sends the sub-packet to the server, the terminal may repeatedly send a preset number of sub-packets to the server until all split sub-packets are sent to the server. The preset number may be a number preset by a user according to actual needs. The preset number may be a fixed value. And when the preset number is 1, the terminal sends the sub-messages to the server one by one. When the number of the sub-messages split by the terminal is smaller than the preset number, the terminal can also send all the sub-messages to the server at the same time. The preset number may also be variable. For example, the preset number may be a percentage of the number of sub-packets, and may vary with the number of sub-packets. The preset number may also be adjusted with network conditions. The value of the preset number may decrease with network conditions when the network is transmitting congested or poorly signaled. Otherwise, the number of the sub-messages sent by the terminal is increased.
In this embodiment, after splitting the message into a plurality of sub-messages, the terminal sends a preset number of sub-messages to the server each time, which reduces the amount of data transmitted each time compared with sending the message or sending all sub-messages at the same time. Even if the network transmission is crowded or the signals are not good, the sub-message can be quickly sent to the server, and the message transmission efficiency is effectively improved.
In one embodiment, the message transmission method further includes: receiving response information returned by the server according to the sent sub-message, wherein the response information comprises a received sub-message identifier corresponding to the sub-message received by the server; judging whether an unreceived sub-message identifier corresponding to a sub-message which is not received by the server exists according to the received sub-message identifier; and when the unreceived sub-message identifier exists, retransmitting the sub-message corresponding to the unreceived sub-message identifier to the server.
After the server receives the sub-message uploaded by the terminal, the server can return response information to the terminal according to the received sub-message. The terminal can receive response information returned by the server according to the sub-message sent by the terminal. The response information refers to the response of the server to the received sub-message. The response information may include a sub-packet identifier corresponding to the sub-packet received by the server, and the sub-packet identifier corresponding to the sub-packet received by the server may be marked as the received sub-packet identifier. The server may return the received sub-packet identifier to the terminal, and determine that the server receives the sub-packet corresponding to the received sub-packet identifier.
The terminal can judge whether the sub-message which is not received by the server exists according to the received sub-message identification returned by the server and the sub-message identification corresponding to the sent sub-message. The terminal may mark the sub-packet identifier corresponding to the sub-packet that has been sent but not received by the server as an unreceived sub-packet identifier. The sub-packets sent by the terminal may be all the sub-packets split according to the message packet, or a preset number of sub-packets sent by the terminal in the above embodiments. The terminal can compare the received sub-message identifier returned by the server with the sent sub-message identifier to determine the non-received sub-message identifier. The sub-packet corresponding to the unreceived sub-packet identifier may be a sub-packet lost during transmission.
In one embodiment, when the terminal does not receive the response information returned by the server within the preset time period, it may be determined that the sub-packet identifiers corresponding to all the sent sub-packets are the non-received sub-packet identifiers. The preset time period may be a time period preset by a user according to actual requirements, and the preset time period may be calculated from the time when the terminal sends the sub-packet. The terminal is prevented from waiting for the server to return the response message for a long time, and the efficiency of sending the sub-message by the terminal is effectively improved.
When the identity of the sub-message which is not received does not exist, the terminal can continue to send the rest sub-messages. When the unreceived sub-message identifier exists, the terminal can resend the sub-message corresponding to the unreceived sub-message identifier to the server and receive a response message returned by the server. And after the server receives the sub-message corresponding to the sub-message identification which is not received, continuing to send the rest sub-messages until all the split sub-messages are sent to the server.
In this embodiment, the terminal may determine the identifier of the unreceived sub-packet through a response message returned by the server, and resend the sub-packet corresponding to the identifier of the unreceived sub-packet to the server. When the sub-packet is lost in the transmission process, the terminal can resend the specific lost sub-packet. Compared with the traditional method of repeatedly sending the message messages or corresponding to the sub-messages with the preset number, the method reduces the data volume of the terminal for retransmitting the sub-messages under the condition of sub-message loss, effectively improves the transmission efficiency of the message messages and reduces the communication cost of the terminal.
It should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided a message transmission apparatus including: a transmission task obtaining module 402, a specific field obtaining module 404, a configuration information obtaining module 406, a specific field optimizing module 408, a message generating module 410, and a message transmitting module 412, wherein:
a transmission task obtaining module 402, configured to obtain a message transmission task, where the message transmission task carries message data.
A specific field obtaining module 404, configured to obtain a specific field corresponding to a message transmission task based on a preset private protocol, where the preset private protocol is an application layer protocol obtained after performing optimization processing based on a transmission control protocol.
The configuration information obtaining module 406 is configured to obtain message configuration information corresponding to a preset private protocol, where the message configuration information includes header format information corresponding to a specific field.
And a specific field optimization module 408, configured to optimize the specific field according to the header format information, so as to obtain a specific optimized field with a specific number of bytes.
And a message generating module 410, configured to generate a message header according to the specific optimized field, determine message data as a message body, and generate a message according to the message header and the message body.
The message transmission module 412 is configured to send the message to the server, so that the server parses the message based on the preset private protocol to obtain message data.
In an embodiment, the specific field obtaining module 404 is further configured to analyze the message transmission task to obtain a task type corresponding to the message transmission task; counting message data carried in the message transmission task to obtain a message length corresponding to the message data; and acquiring version information corresponding to the preset private protocol to obtain a specific field comprising the task type, the message length and the version information.
In an embodiment, the specific field obtaining module 404 is further configured to read shifting information from the message configuration information, where the shifting information includes a shifting direction and a shifting bit number; and encrypting the message length according to the shifting direction and the shifting digit to obtain the target length corresponding to the message data.
In one embodiment, the message configuration information further includes message format information, and the message generation module 410 is further configured to obtain a serialization model, and input message data into the serialization model; calling a serialization model to perform serialization processing on the message data according to the message format information to obtain target message data; and packaging the target message data to obtain a message body.
In an embodiment, the message transmission module 412 is further configured to obtain a message length corresponding to a message; when the message length is larger than a threshold value, splitting the message to obtain a plurality of sub-messages, wherein the sub-messages comprise corresponding sub-message identifications; and sending the sub-messages to a server, so that the server combines the received sub-messages according to the sub-message identifiers and analyzes the combined sub-messages to obtain message data.
In an embodiment, the message transmission module 412 is further configured to receive response information returned by the server according to the sent sub-message, where the response information includes a received sub-message identifier corresponding to the sub-message received by the server; judging whether an unreceived sub-message identifier corresponding to a sub-message which is not received by the server exists according to the received sub-message identifier; and when the unreceived sub-message identifier exists, retransmitting the sub-message corresponding to the unreceived sub-message identifier to the server.
For specific limitations of the message transmission device, reference may be made to the above limitations of the message transmission method, which is not described herein again. The respective modules in the above message transmission device may be wholly or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a message transmission method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory storing a computer program and a processor implementing the steps in the above-described message transmission method embodiments when the processor executes the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the above-mentioned message transmission method embodiment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of message transmission, the method comprising:
acquiring a message transmission task, wherein the message transmission task carries message data;
acquiring a specific field corresponding to the message transmission task based on a preset private protocol, wherein the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol;
acquiring message configuration information corresponding to the preset private protocol, wherein the message configuration information comprises header format information corresponding to the specific field;
optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number;
generating a message header according to the specific optimized field, determining the message data as a message body, and generating a message according to the message header and the message body;
and sending the message to a server, so that the server analyzes the message based on the preset private protocol to obtain the message data.
2. The method according to claim 1, wherein the obtaining of the specific field corresponding to the message transmission task based on the preset private protocol comprises:
analyzing the message transmission task to obtain a task type corresponding to the message transmission task;
counting the message data carried in the message transmission task to obtain the message length corresponding to the message data;
and acquiring version information corresponding to the preset private protocol to obtain the specific field comprising the task type, the message length and the version information.
3. The method of claim 2, further comprising:
reading shifting information from the message configuration information, wherein the shifting information comprises a shifting direction and a shifting digit;
and encrypting the message length according to the shifting direction and the shifting digit to obtain a target length corresponding to the message data.
4. The method of claim 1, wherein the message configuration information further includes message format information, and wherein the determining the message data as a message body comprises:
acquiring a serialization model, and inputting the message data into the serialization model;
calling the serialization model to perform serialization processing on the message data according to the message format information to obtain target message data;
and packaging the target message data to obtain the message body.
5. The method according to any one of claims 1 to 4, wherein the sending the message packet to a server, so that the server parses the message packet based on the preset private protocol to obtain the message data comprises:
acquiring the message length corresponding to the message;
when the message length is larger than a threshold value, splitting the message to obtain a plurality of sub-messages, wherein the sub-messages comprise corresponding sub-message identifications;
and sending the sub-messages to the server, so that the server combines the received sub-messages according to the sub-message identifications and analyzes the combined sub-messages to obtain the message data.
6. The method of claim 5, further comprising:
receiving response information returned by the server according to the sent sub-message, wherein the response information comprises a received sub-message identifier corresponding to the sub-message received by the server;
judging whether an unreceived sub-message identifier corresponding to a sub-message which is not received by the server exists according to the received sub-message identifier;
and when the sub-message identification which is not received exists, retransmitting the sub-message corresponding to the sub-message identification which is not received to the server.
7. A message transmission apparatus, characterized in that the apparatus comprises:
a transmission task obtaining module, configured to obtain a message transmission task, where the message transmission task carries message data;
a specific field acquisition module, configured to acquire a specific field corresponding to the message transmission task based on a preset private protocol, where the preset private protocol is an application layer protocol obtained after optimization processing based on a transmission control protocol;
a configuration information obtaining module, configured to obtain message configuration information corresponding to the preset private protocol, where the message configuration information includes header format information corresponding to the specific field;
the specific field optimizing module is used for optimizing the specific field according to the header format information to obtain a specific optimized field with specific byte number;
a message generating module, configured to generate a message header according to the specific optimized field, determine that the message data is used as a message body, and generate a message according to the message header and the message body;
and the message transmission module is used for sending the message to a server, so that the server analyzes the message based on the preset private protocol to obtain the message data.
8. The apparatus of claim 7, wherein the message configuration information further includes message format information, and the message generation module is further configured to obtain a serialization model, and input the message data into the serialization model; calling the serialization model to perform serialization processing on the message data according to the message format information to obtain target message data; and packaging the target message data to obtain the message body.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202010037071.4A 2020-01-14 2020-01-14 Message transmission method and device, computer equipment and storage medium Pending CN111224864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010037071.4A CN111224864A (en) 2020-01-14 2020-01-14 Message transmission method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010037071.4A CN111224864A (en) 2020-01-14 2020-01-14 Message transmission method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111224864A true CN111224864A (en) 2020-06-02

Family

ID=70827011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010037071.4A Pending CN111224864A (en) 2020-01-14 2020-01-14 Message transmission method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111224864A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935243A (en) * 2020-07-17 2020-11-13 杭州海康机器人技术有限公司 Data information transmission method, device, system and equipment
CN111970526A (en) * 2020-08-18 2020-11-20 广州华多网络科技有限公司 Interface notification message processing method, device, equipment and storage medium
CN112437466A (en) * 2020-10-15 2021-03-02 珠海云洲智能科技股份有限公司 Data transmission method, data processing unit, receiving unit and unmanned equipment
CN112953953A (en) * 2021-03-02 2021-06-11 招商银行股份有限公司 Communication protocol design method, terminal and computer storage medium
CN114070876A (en) * 2021-11-16 2022-02-18 广东小狼星物联有限公司 Vehicle positioning management method
CN114070806A (en) * 2021-12-03 2022-02-18 重庆邮电大学 Unmanned aerial vehicle system based on variable message format data link and communication method
CN114125071A (en) * 2021-11-23 2022-03-01 北京人大金仓信息技术股份有限公司 Data compression transmission method and device
CN114124360A (en) * 2021-12-10 2022-03-01 胜斗士(上海)科技技术发展有限公司 Encryption device, method, apparatus, and medium
CN114401321A (en) * 2021-12-31 2022-04-26 中国电力科学研究院有限公司 Method, system, equipment and storage medium for lightweight transmission of broadband measurement data
CN114785843A (en) * 2022-03-22 2022-07-22 成都爱瑞无线科技有限公司 Data communication method, device, communication system and storage medium
CN115118686A (en) * 2022-06-23 2022-09-27 中国民航信息网络股份有限公司 System, method, equipment, medium and product for processing passenger message
WO2024032426A1 (en) * 2022-08-10 2024-02-15 北京有竹居网络技术有限公司 Data processing method, network interface card, electronic device, and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1298272A (en) * 1999-11-30 2001-06-06 三星电子株式会社 Method for receiving & transmitting multimedia data with short message service on mobile phone
CN102571892A (en) * 2010-12-30 2012-07-11 腾讯科技(深圳)有限公司 Browser-based data communication method, client and browser-based data interaction system
CN103957241A (en) * 2014-04-16 2014-07-30 中国工商银行股份有限公司 Communication method and device based on message data
CN105577433A (en) * 2015-12-16 2016-05-11 福建星网锐捷网络有限公司 ACS cluster management method, apparatus and system
CN106059848A (en) * 2016-05-06 2016-10-26 南京大学 BeiDou short message communication-based electric power data acquisition transmission processing system and method
CN106230541A (en) * 2016-08-05 2016-12-14 深圳市骏龙电子有限公司 A kind of Site synch system and method for EPA
CN108960307A (en) * 2018-06-22 2018-12-07 中国人民解放军战略支援部队信息工程大学 A kind of proprietary protocol field format extracting method, device and server
CN109818950A (en) * 2019-01-18 2019-05-28 北京和利时系统工程有限公司 A kind of access control rule optimization method and device, computer readable storage medium
CN110381056A (en) * 2019-07-17 2019-10-25 钛马信息网络技术有限公司 Proprietary protocol decoding method and device based on Netty

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1298272A (en) * 1999-11-30 2001-06-06 三星电子株式会社 Method for receiving & transmitting multimedia data with short message service on mobile phone
CN102571892A (en) * 2010-12-30 2012-07-11 腾讯科技(深圳)有限公司 Browser-based data communication method, client and browser-based data interaction system
CN103957241A (en) * 2014-04-16 2014-07-30 中国工商银行股份有限公司 Communication method and device based on message data
CN105577433A (en) * 2015-12-16 2016-05-11 福建星网锐捷网络有限公司 ACS cluster management method, apparatus and system
CN106059848A (en) * 2016-05-06 2016-10-26 南京大学 BeiDou short message communication-based electric power data acquisition transmission processing system and method
CN106230541A (en) * 2016-08-05 2016-12-14 深圳市骏龙电子有限公司 A kind of Site synch system and method for EPA
CN108960307A (en) * 2018-06-22 2018-12-07 中国人民解放军战略支援部队信息工程大学 A kind of proprietary protocol field format extracting method, device and server
CN109818950A (en) * 2019-01-18 2019-05-28 北京和利时系统工程有限公司 A kind of access control rule optimization method and device, computer readable storage medium
CN110381056A (en) * 2019-07-17 2019-10-25 钛马信息网络技术有限公司 Proprietary protocol decoding method and device based on Netty

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935243A (en) * 2020-07-17 2020-11-13 杭州海康机器人技术有限公司 Data information transmission method, device, system and equipment
CN111970526B (en) * 2020-08-18 2022-04-26 广州华多网络科技有限公司 Interface notification message processing method, device, equipment and storage medium
CN111970526A (en) * 2020-08-18 2020-11-20 广州华多网络科技有限公司 Interface notification message processing method, device, equipment and storage medium
CN112437466B (en) * 2020-10-15 2023-02-10 珠海云洲智能科技股份有限公司 Data transmission method, data processing unit, receiving unit and unmanned equipment
CN112437466A (en) * 2020-10-15 2021-03-02 珠海云洲智能科技股份有限公司 Data transmission method, data processing unit, receiving unit and unmanned equipment
CN112953953A (en) * 2021-03-02 2021-06-11 招商银行股份有限公司 Communication protocol design method, terminal and computer storage medium
CN114070876A (en) * 2021-11-16 2022-02-18 广东小狼星物联有限公司 Vehicle positioning management method
CN114070876B (en) * 2021-11-16 2024-05-07 广东小狼星物联有限公司 Vehicle positioning management method
CN114125071A (en) * 2021-11-23 2022-03-01 北京人大金仓信息技术股份有限公司 Data compression transmission method and device
CN114070806A (en) * 2021-12-03 2022-02-18 重庆邮电大学 Unmanned aerial vehicle system based on variable message format data link and communication method
CN114070806B (en) * 2021-12-03 2023-10-13 重庆邮电大学 Unmanned aerial vehicle system based on variable message format data chain and communication method
CN114124360A (en) * 2021-12-10 2022-03-01 胜斗士(上海)科技技术发展有限公司 Encryption device, method, apparatus, and medium
CN114401321A (en) * 2021-12-31 2022-04-26 中国电力科学研究院有限公司 Method, system, equipment and storage medium for lightweight transmission of broadband measurement data
CN114785843A (en) * 2022-03-22 2022-07-22 成都爱瑞无线科技有限公司 Data communication method, device, communication system and storage medium
CN115118686A (en) * 2022-06-23 2022-09-27 中国民航信息网络股份有限公司 System, method, equipment, medium and product for processing passenger message
WO2024032426A1 (en) * 2022-08-10 2024-02-15 北京有竹居网络技术有限公司 Data processing method, network interface card, electronic device, and storage medium

Similar Documents

Publication Publication Date Title
CN111224864A (en) Message transmission method and device, computer equipment and storage medium
EP1092186B1 (en) Method and apparatus for wireless internet access
US6937731B2 (en) End to end real-time encrypting process of a mobile commerce WAP data transmission section and the module of the same
CN113765713A (en) Data interaction method based on Internet of things equipment acquisition
CN110620762A (en) RDMA (remote direct memory Access) -based data transmission method, network card, server and medium
CN111107051A (en) Message transmission method and device, computer equipment and storage medium
CN114157649A (en) Reliable data transmission method and device, computer equipment and storage medium
CN112511892B (en) Screen sharing method, device, server and storage medium
KR101554760B1 (en) Network message transformation device and methods thereof
Montella et al. Performance, resilience, and security in moving data from the fog to the cloud: the DYNAMO transfer framework approach
CN111276231A (en) Medical data monitoring method and device, computer equipment and storage medium
US20010005884A1 (en) Communication method and communication system
WO2021051673A1 (en) Data transmission method and apparatus, computer device, and storage medium
CN111835519A (en) Covert communication method based on public block chain
CN115883671A (en) Big data transmission method, device, equipment and storage medium
CN105959263B (en) Aged caring institutions data interactive method and system based on JSON
CN114996730A (en) Data encryption and decryption system, method, computer equipment and storage medium
CN110557374B (en) Power data acquisition method and device, computer equipment and storage medium
CN111669431B (en) Message transmission method and device, computer equipment and storage medium
CN111294359B (en) Pressure testing method, pressure testing device, computer equipment and storage medium
CN114900510A (en) Information pushing method, server, client and storage medium
CN114629891A (en) File transmission method and device, electronic equipment and computer readable storage medium
CN114124914A (en) Data security transmission method and device, computer equipment and storage medium
CN113422754A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN115189969B (en) Network encryption communication method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200602

RJ01 Rejection of invention patent application after publication