CN101645883A - Data transmitting method, a data sending method and a data receiving method - Google Patents

Data transmitting method, a data sending method and a data receiving method Download PDF

Info

Publication number
CN101645883A
CN101645883A CN200810146046A CN200810146046A CN101645883A CN 101645883 A CN101645883 A CN 101645883A CN 200810146046 A CN200810146046 A CN 200810146046A CN 200810146046 A CN200810146046 A CN 200810146046A CN 101645883 A CN101645883 A CN 101645883A
Authority
CN
China
Prior art keywords
application layer
layer data
data bag
bag
transmit leg
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810146046A
Other languages
Chinese (zh)
Inventor
阮洲
吴建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN200810146046A priority Critical patent/CN101645883A/en
Publication of CN101645883A publication Critical patent/CN101645883A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a data transmitting method, which comprises that: a sending party packages an application layer data packet carrying verification information into a transport layer protocol data packet, sends the transport layer protocol data packet, caches the application layer data packet, and starts a retransmission timer; a receiving party judges whether the application layer data packet is correct according to the verification information, and if so, a confirmation packet representing correct receiving is sent, otherwise, a confirmation packet representing no correct receiving issent; and if the receiving party receives the confirmation packet representing no correct receiving, or does not receive the confirmation packet representing correct receiving when the retransmissiontimer is overtime, the application layer data packet in a buffer zone is retransmitted, and the retransmission timer is started again, otherwise, the sending party deletes the application layer data packet in the buffer zone. The invention also discloses a data sending method and a data receiving method. The methods can obtain high data transmission reliability on the premise of maintaining high transmission efficiency.

Description

Data transmission method, data transmission method for uplink and data receive method
Technical field
The present invention relates to network data transmission technology, particularly data transmission method, data transmission method for uplink and data receive method.
Background technology
Current many equipment and depend on communication system based on the service of calculating and transmitting necessary information each other.Described communication system is made of a plurality of independently communication networks usually, comprising cable network and wireless network.
User Datagram Protoco (UDP) (UDP) is a kind of towards the disconnected network transmission protocol, is in the transport layer in the network hierarchy model, and it does not guarantee transmission reliability.Under the situation of unstable networks, application layer data is carried on to transmit in the UDP bag may causes data-bag lost, as seen, UDP can't satisfy the needs of some application that transfer of data is had relatively high expectations.
Transmission control protocol (TCP) is in transport layer equally, and it is a kind of connection-oriented network transmission protocol, can be for the higher application layer protocol of reliability requirement is selected, in order to carry its packet.Needing at first to set up TCP when carrying out transfer of data based on TCP between receiving-transmitting sides connects, and under the relatively poor situation of network quality, particularly in wireless network, TCP between the receiving-transmitting sides connects frequent disconnection may occur, connect and whenever break once, just need rebulid a TCP and connect, need receiving-transmitting sides to carry out repeatedly Signalling exchange and set up the TCP connection, this will cause producing many extra data traffics between receiving-transmitting sides, thereby make efficiency of transmission lower.In addition, according to the regulation of Transmission Control Protocol, even under the situation that does not have data to send between the receiving-transmitting sides, also need to send heartbeat packet to the other side and connect to keep bipartite TCP, this has also caused the waste of the communication resource to a certain extent.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of data transmission method, a kind of data transmission method for uplink and a kind of data receive method, with under the prerequisite that keeps higher transmission efficient, obtains the higher data transmission reliability.
For achieving the above object, technical scheme of the present invention specifically is achieved in that
A kind of data transmission method comprises:
The application layer data that A, transmit leg will carry check information is sealed to install in disconnected transport layer protocol packet and is sent, and described application layer data bag is stored in the buffering area, starts retransmission timer;
B, recipient receive described transport layer protocol packet, therefrom obtain the application layer data bag that carries check information, and judge according to described check information whether the application layer data bag that is received is correct, if correct, send corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag; If incorrect, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive;
C, if transmit leg receive that the recipient returns corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive, or the overtime fashion of described retransmission timer do not receive that the recipient returns corresponding to described application layer data bag, the correct affirmation bag that receives of expression application layer data bag, execution in step D then, otherwise, execution in step E;
This application layer data bag in D, the transmit leg retransmission buffer restarts retransmission timer, and returns step C;
E, transmit leg are with this application layer data bag deletion in the buffering area.
A kind of data transmission method for uplink comprises:
The application layer data that A1, transmit leg will carry check information is sealed to install in disconnected transport layer protocol packet and is sent, and described application layer data bag is stored in the buffering area, starts retransmission timer;
B1, if transmit leg receive that the recipient returns corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive, or the overtime fashion of described retransmission timer do not receive corresponding to described application layer data bag, the correct affirmation bag that receives of expression application layer data bag, execution in step C1 then, otherwise, execution in step D1;
This application layer data bag in C1, the transmit leg retransmission buffer restarts retransmission timer, and returns step B1;
D1, transmit leg are with this application layer data bag deletion in the buffering area.
A kind of data receive method comprises:
A, recipient receive come from transmit leg towards disconnected transport layer protocol packet, therefrom obtain the application layer data bag that carries check information;
B, recipient calculate the check results of described application layer data bag, whether more described check results is identical with described check information, if check results is identical with check information, judge that the application layer data bag correctly receives, send corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag; If check results and check information are inequality, judge that the application layer data bag does not correctly receive, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive.
The present invention corresponding to the data receive method of above-mentioned data transmission method for uplink after receiving the application layer data bag that carries check information, by calculating the check results of this application layer data bag, and judge by more described check results and described check information be whether identical whether described application layer data bag correctly receives, under correct situation about receiving, return corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag to transmit leg, make transmit leg confirm that its packet that sends is correctly received; Under incorrect situation about receiving, return corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive to transmit leg, make transmit leg can retransmit the described incorrect application layer data bag that receives, thereby improved reliability of data transmission.Similarly, because application layer data bag of the present invention and affirmation bag are by carrying towards disconnected transport layer protocol packet, need not to connect between the data transmit-receive both sides, thereby saved many communication resources that are used for Signalling exchange, maintenance connection, thereby guaranteed higher efficiency of transmission.
As seen, the present invention is by introducing verification scheme and overtime retransmission mechanism in application layer, and application layer data is carried in disconnected transport layer protocol packet transmits, thereby under the prerequisite that keeps higher transmission efficient, obtained the higher data transmission reliability.
Description of drawings
Fig. 1 is the schematic flow sheet of data transmission method in the embodiment of the invention;
Fig. 2 is the schematic flow sheet of data transmission method for uplink in the embodiment of the invention;
Fig. 3 is the schematic flow sheet of data receive method in the embodiment of the invention;
Fig. 4 is the structural representation of application layer data bag in a preferred embodiment of the present invention.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is described in further detail.
Main thought of the present invention is by introduce verification scheme and overtime retransmission mechanism in application layer, and application layer data is carried in disconnected transport layer protocol packet transmits, thereby under the prerequisite that keeps higher transmission efficient, obtained the higher data transmission reliability.
Fig. 1 is the schematic flow sheet of data transmission method in the embodiment of the invention.Referring to Fig. 1, this method comprises:
Step 101: the application layer data that transmit leg will carry check information is sealed to install in disconnected transport layer protocol packet and is sent, and described application layer data bag is stored in the buffering area, starts retransmission timer;
Step 102: the recipient receives described transport layer protocol packet, therefrom obtain the application layer data bag that carries check information, and judge according to the check information that is received whether described application layer data bag is correct, if correct, send corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag; If incorrect, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive;
Step 103: if transmit leg receive that the recipient returns corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive, or the overtime fashion of described retransmission timer do not receive that the recipient returns corresponding to described application layer data bag, the correct affirmation bag that receives of expression application layer data bag, then execution in step 104, otherwise, execution in step 105;
Step 104: this application layer data bag in the transmit leg retransmission buffer, restart retransmission timer, and return step 103;
Step 105: transmit leg is with this application layer data bag deletion in the buffering area.
So far, finish data transmission method flow process of the present invention.
Between transmit leg and the recipient each application layer data bag to be sent can transmit according to said method of the present invention.
Transfer of data is carried out between receiving-transmitting sides usually, in fact described receiving-transmitting sides in data transmission procedure be transmit leg be again the recipient, but the function that data send and the function of Data Receiving normally independently realize, therefore, for ease of more clearly describing the present invention, respectively from the angle of data transmission and Data Receiving, describe data transmission method for uplink of the present invention and data receive method in detail below.
Fig. 2 is the schematic flow sheet of data transmission method for uplink in the embodiment of the invention.Referring to Fig. 2, this method is carried out by transmit leg, and transmit leg sets in advance the number of retransmissions upper limit and the application layer data packet length upper limit, and collects data message, and when needs sent collected data message, this method comprised:
Step 201: judge whether this secondary data sends is the transfer of data first time between the receiving-transmitting sides, if, execution in step 202, otherwise, jump to step 206.
For between data transmission security between the assurance receiving-transmitting sides and the receiving-transmitting sides the other side being carried out authentication, in the process of the transfer of data first time, can carry out key agreement and authentication etc. between the receiving-transmitting sides.
The described transmit leg of this step is at communicating by letter of setting up between receiving-transmitting sides each time with the transfer of data first time between the recipient, that is: set up a communication between the receiving-transmitting sides, carried out the several times data interaction, after stopping bipartite communication, if need again next time to set up communication, then be considered to once communicate by letter in addition.
Step 202: need to judge whether logarithm reportedly to be input into row and encrypt, if need, execution in step 203, otherwise, jump to step 204.
Step 203: generate first random number (below be designated as r1) at random, the inverible transform form of this r1 or r1 is carried in the application layer data bag, and will represents that the information that this application layer data bag carries random number is carried in the application layer data bag.
Can make an appointment and be used for r1 is carried out the mapping algorithm of inverible transform, after the recipient receives that transmit leg is carried on the inverible transform form of the r1 in the application layer data bag, can carry out inverse transformation to the inverible transform form of r1 according to the mapping algorithm of described agreement, thereby obtain r1.
Step 204: judge whether the recipient needs could set up communication to self authenticating, if, execution in step 205, otherwise, jump to step 206.
The described authentication mechanism of this step is applicable to the server/customer end pattern, server end stores the authentication information of client, before the user end to server request communicates, server need authenticate client, therefore, client need be carried in the application layer data bag the information that self authenticates for server and send to server.
Step 205: will be carried in the application layer data bag for the information that the recipient authenticates self.
In this step,, can use the described random number r1 of step 203, the information that authenticates self for the recipient is encrypted, and resulting ciphertext is carried in the application layer data bag as the information that authenticates self for the recipient in order to strengthen protection to authentication information.
Step 206: whether the length of judging the application layer data bag surpasses the application layer data packet length upper limit that sets in advance, if surpass, then execution in step 207, otherwise, jump to step 208.
Data packet length that the described application layer data packet length of this step upper limit can obtain according to statistics and the corresponding relation between the drop probabilities reasonably are provided with.For example: table 1 shows the drop probabilities of adding up the packet of different length in the GPRS network that obtains:
Data packet length 32 ?64 ?128 ?256 512 ?1024
Drop probabilities 0 ?0 ?0 ?0.2% 0.3% ?0.5%
Table 1
In the table 1, data packet length calculates with byte.
Step 207: according to the set application layer data packet length upper limit application layer data bag is carried out the subpackage processing and obtain a plurality of new application layer data bags; These a plurality of new application layer data bags are encapsulated into separately in each transport layer protocol packet, and with identical serial number, represent that the information that this application layer data bag handled by subpackage, total subpackage number, current packet number are carried in each new application layer data bag.
The described serial number of this step is represented the numbering of current application layer data bag, counts since 1 after this numbering adds up, overflows since 1 again.Handle a plurality of new application layer data bag that obtains by same application layer data bag subpackage and have identical serial number, utilize described identical serial number, and the total subpackage number and the current packet number that carry in each application layer data bag, make the recipient after receiving these packets, can re-assembly easily, obtain subpackage application layer data bag before.
Step 208: judge that local whether storing is used for password that this communication is encrypted, if having, execution in step 209, otherwise, jump to step 210.
As described in step 201, if need encrypt the data of being transmitted, receiving-transmitting sides will carry out key agreement in the data transmission procedure in the first time, and the key that consults is preserved separately by receiving-transmitting sides, is used for follow-up data encryption.Be described because this flow process is the angle from transmit leg, about password consult, the password storage will relate in the step of back.
Step 209: the password with storage is encrypted using the data of carrying in the layer data bag, and will represent that the encrypted information of data in this application layer data bag is carried in this application layer data bag.
Step 210: need to judge whether the other side to reply and should use the layer data bag, if desired, execution in step 211, otherwise, jump to step 212.
Application layer data bag that transmit leg is issued the recipient has plenty of and need reply, for example: the packet that carries authentication information, need after the other side authenticates, return and whether authenticate the response packet that passes through, at this moment, need transmit leg in the application layer data bag, to carry the information that expression needs the other side to reply.
Step 211: will represent that the information that need reply is carried in this application layer data bag.
Step 212: the check information of application layer data bag is carried in this application layer data bag.
The described check information of this step is that packet header to the data at the data segment end of application layer data bag from the application layer data bag are carried out the check information that verification obtains, and can adopt modes such as CRC check to carry out verification.
Step 213: application layer data sealed install in disconnected transport layer protocol packet.
Step 214: this transport layer protocol packet is sent, and described application layer data bag is stored in the buffering area, start retransmission timer.
Step 215: judge whether not receive affirmation bag corresponding to sending application layer data bag in the overtime fashion of retransmission timer, if, execution in step 216, otherwise, execution in step 217.
Step 216: judge whether the number of times send this application layer data bag has surpassed the number of retransmissions upper limit that sets in advance, if do not surpass, then returns step 214, otherwise, finish this with the recipient between communicate by letter.
Step 217: judge according to the information of carrying in the affirmation bag of being received whether the application layer data bag is correctly received, if correctly do not received, execution in step 216, otherwise, execution in step 218.
Step 218: this application layer data bag in the delete buffer.
Step 219: if the application layer data bag that is sent needs replying of the other side, then judge whether not receive response packet corresponding to this application layer data bag in the overtime fashion of retransmission timer, if, execution in step 216, otherwise, execution in step 220.
Step 220: send affirmation bag to transmit leg, and from this response packet, obtain the other side's response message, operate accordingly according to described response message corresponding to this response packet.
In this step, the content of the packet that sends to the recipient before the response message that transmit leg is obtained from response packet and the transmit leg is relevant, for example:
Issued the recipient if the inverible transform form of random number r1 or r1 is carried in the application layer data bag in step 203, in this response packet of receiving, to carry with second random number after the r1 encryption, second random number deciphering after with r1 this being encrypted, can obtain being used for the password that follow-up data is encrypted, at this moment, need described second random number is stored as password;
If being carried in the application layer data bag, the information that will authenticate self for the recipient in step 205 issued the recipient, in this response packet of receiving, the authentication result of the other side to self will be carried, transmit leg can judge whether the other side passes through the authentication of self according to this authentication result, if pass through, can continue normally to carry out subsequent data transmission,, then may need to initiate again verification process if do not pass through.
Below just illustrate, in actual applications, may carry out identity between transmit leg and the recipient and nullify, revise authentication information or other control etc., these all need replying of recipient, and the recipient reply difference according to transmit leg institute request content with different.
So far, finish in data transmission procedure the flow process that data receiver is performed.Can send the next one according to the method described above and answer the layer data bag, until sending all data to be sent.
Fig. 3 is the schematic flow sheet of data receive method in the embodiment of the invention.Referring to Fig. 3, this method is carried out by the recipient, and the recipient sets in advance the number of retransmissions upper limit, and carries out Data Receiving according to following steps:
Step 301: receiving plane therefrom obtains the application layer data bag that carries check information to disconnected transport layer protocol packet.
Step 302: judge that local whether storing is used for password that this communication is encrypted, if having, execution in step 303, otherwise, jump to step 307.
Step 303: with the data decryption of password to carrying in the application layer data bag of storage.
Step 304: whether check information entrained in the check results of computing application layer data bag, more described check results and application layer data bag is identical, if check results is identical with check information, and execution in step 305; If check results and check information are inequality, jump to step 306.
Step 305: when check results is identical with check information, judge that the application layer data bag correctly receives, send, jump to step 315 corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag.
Step 306: when check results and check information are inequality, judge that the application layer data bag correctly receives, send, jump to step 315 corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive.
Step 307: whether check information entrained in the check results of computing application layer data bag, more described check results and application layer data bag is identical, if check results is identical with check information, and execution in step 308; If check results and check information are inequality, jump to step 309.
Step 308: when check results is identical with check information, judge that the application layer data bag correctly receives, send, jump to step 310 corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag.
Step 309: when check results and check information are inequality, judge that the application layer data bag correctly receives, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive.
Step 310: judge that whether carrying this application layer data bag of expression in the application layer data bag carries the information of random number, if carry, execution in step 311, otherwise, jump to step 312.
Step 311: from described application layer data bag, obtain first random number, or from described application layer data bag, obtain the inverible transform form of first random number, and the inverible transform form of described first random number is carried out inverse transformation obtain first random number.
As described in step 203, can make an appointment is used for r1 is carried out the mapping algorithm of inverible transform, so, if receive the inverible transform form of r1 in this step, just can carry out inverse transformation to the inverible transform form of r1, thereby obtain r1 according to the mapping algorithm of this agreement.
Step 312: judge whether to carry in the application layer data bag to be used for information that transmit leg is authenticated, if carry, execution in step 313, otherwise, jump to step 315.
Step 313: from the application layer data bag, obtain and be used for information that transmit leg is authenticated.
In this step, accessed information may be the information after r1 encrypts, and can be decrypted described information with r1, obtains being used for the information that the other side is authenticated.
Step 314: transmit leg is authenticated, obtain authentication result.
In this step, the other side's that can preserve in advance authentication information according to self, this authentication information that sends over authenticates the other side in conjunction with the other side.
Step 315: judge whether carry the information that expression need be replied in the application layer data bag, if carry, execution in step 316, otherwise, jump to step 320.
Step 316: send response packet, and described response packet is stored in the buffering area, start retransmission timer corresponding to the application layer data bag.
In this step, the content of carrying in the response packet that is sent and this received the other side's application layer data is surrounded by the pass, can judge before sending response packet:
The random number r1 that this other side who whether receives sends if receive, can generate second random number (below be designated as r2) at random, r2 is stored as password, and r2 is carried in this response packet;
Whether this verifies the other side, if verify, will verify that the result is carried in this response packet, or the like.
Below just illustrate, in actual applications, may carry out identity between transmit leg and the recipient and nullify, revise authentication information or other control etc., these all need to send corresponding response packet to the recipient.
Step 317: judge whether not receive affirmation bag corresponding to this response packet in the overtime fashion of retransmission timer, if, execution in step 318, otherwise, execution in step 319.
Step 318: judge whether the number of times that sends this response packet has surpassed the number of retransmissions upper limit that sets in advance, if do not surpass, then returns step 316, otherwise, execution in step 319.
Step 319: this response packet in the delete buffer.
Step 320: judge whether carry the information that this application layer data bag of expression has been handled by subpackage in the application layer data bag, if carry, execution in step 321, otherwise, the method ends flow process.
Here, need to prove: though after the execution order of the described judgement of this step in flow chart shown in Figure 3 be in step 310~step 319,, in fact after verification is correct, just can carry out the described judgement of this step.As seen, do not have absolute precedence relation between this step and the above-mentioned steps 310~step 319, just describe, and the explanation of this step is placed after step 310~step 319 for the ease of flow process.
Step 321: obtain serial number, total subpackage number and current packet number from the application layer data bag, the application layer data bag that serial number is identical is combined into complete application layer data bag according to the current packet number of its correspondence.
So far, finish in data transmission procedure the flow process that the data receiver is performed.Can receive the next one according to the method described above and answer the layer data bag, until receiving all data to be sent.
Below in conjunction with the accompanying drawings data transmission method of the present invention, data transmission method for uplink and data receive method are had been described in detail, further describe the specific embodiment of the present invention below by a concrete example.
Corresponding to technical solution of the present invention, application layer data pack arrangement as shown in Figure 4 can be set.Referring to Fig. 4, Fig. 4 is the structural representation of application layer data bag in a preferred embodiment of the present invention, and this application layer data bag can be divided into: packet header, professional packet header, data field and bag tail.Wherein:
1) packet header comprises: beginning flag field and data packet length field, and this is the conventional part of packet:
A) beginning flag is the initial symbol of packet, is used to identify the beginning of an application layer data bag.
B) data packet length represent this application layer data bag from packet header to the bag tail total length.
2) professional packet header comprises: request serial number field, flag bit field, protocol version field, the unique identifier field of terminal, bag type field, function field, packet timestamp field and data field length field etc., and optionally: Crypted password field, total Bale No. field, current Bale No. field and return code field etc.Wherein:
C) the request serial number is the described serial number of step 207, and the numbering of expression current data packet is counted since 1 after this numbering adds up, overflows since 1 again; In the affirmation bag and response packet corresponding to certain application layer data bag, the value of request serial number field is identical with the value of this application layer data bag request serial number field; The request serial number of a plurality of bags that obtained after subpackage is handled by same application layer data bag is identical, so that the receiving terminal assembling obtains the application layer data bag of subpackage before handling.
D) flag bit is used to carry flag information, for example: represent whether carry encrypted message in this application layer data bag, whether data segment is encrypted, whether carried out the subpackage processing, whether need the other side to reply, whether have return code, whether data segment has been carried out compression, whether carried authentication information etc.; This flag bit can be set take 1 byte, and represent different flag informations with the different values of each bit.
E) Crypted password is used to carry the encrypted message between the receiving-transmitting sides, and for example: the inverible transform form that transmit leg sends to random number r1 entrained in recipient's the application layer data bag or r1 first just can be carried in this field; The Crypted password field can be used in combination with the flag bit field, that is: be changed to when carrying encrypted message when the flag bit field, carries encrypted message in the Crypted password field.
F) total Bale No. represents that subpackage handles the total subpackage number that obtains, and current Bale No. is represented currently to wrap in subpackage and handle residing numbering in the bag that obtains; Total Bale No. field and current Bale No. field are used in combination with the flag bit field, are changed to this bag when having carried out subpackage and handling when the flag bit field that is:, in that always Bale No. field and current Bale No. field are carried total Bale No. information and current Bale No. information.
G) different editions of protocol version sign agreement number can default setting be 0.
H) the unique identifier of terminal is the unique identifier that is used to distinguish each terminal.
I) bag type has three types corresponding to the present invention: request package, affirmation bag and response packet.
J) function number: be used to represent what operation current application layer data bag is used to carry out.For example: be used for login, nullify, revise password, transfer of data, control etc.
K) return code: be used to carry the execution result of respective application layer data bag, be used in combination with flag bit.For example: when receiving an application layer data bag, when verification is incorrect, can carry the information that expression application layer data bag does not correctly receive in return code field at the affirmation bag of this application layer data bag.
L) the packet timestamp is represented the packing time of current data packet.
M) data field length is represented the data length of data segment in the application layer data bag.
3) data field is a data segment, is Optional Field, is used for the store data content, and the information that transmit leg is authenticated for the recipient that transmit leg sends to the recipient also can place data segment to send.
4) the bag tail comprises: check field and end mark field:
O) check field is used to carry the check information of application layer data bag, and described check information is to carry out the information that verification obtains from packet header to the data at the data segment end of application layer data bag of application layer data bag, can adopt the most frequently used CRC check at present.
P) end mark is the packet end mark, is used to identify the end of an application layer data bag.
Based on application layer data pack arrangement shown in Figure 4, can construct corresponding request package, confirm that bag, response packet are to carry out data transmission method of the present invention.
Table 2 is formed table for the field of the present invention's one preferable logging request bag:
Figure G2008101460469D00131
Table 2
The bag of logging request shown in the table 2 can be used for transmit leg and send random number r1 and authentication information to the requesting party for the first time.Referring to table 2, the inverible transform form of random number r1 and r1 can place the field of Crypted password shown in the table 2, and the flag bit field is changed to expression carries encrypted message in this logging request bag; The bag type field is changed to the request package type; The function field is changed to and logins corresponding value; The authentication information of transmit leg can place the data field, authentication password field as shown in table 2.
Table 3 is formed table for the field of the present invention's one preferable affirmation bag:
Table 3
Confirm shown in the table 2 that bag can be used for the receive direction transmit leg and return affirmation at a certain request package.Referring to table 3, its request serial number keeps consistent with corresponding request package; The bag type field is changed to confirms the bag type; It is consistent with corresponding request package that the function field keeps; The return code field is carried confirmation, and it is the correct reception of 0 expression that this field can be set, and this field is that other value representations correctly receive, and can distinguish different mistakes by different error number.
Table 4 is formed table for the field of the present invention's one preferable response packet:
Figure G2008101460469D00151
Table 4
Response packet shown in the table 4 can be used for the receive direction transmit leg and return replying at a certain logging request bag.Referring to table 4, its request serial number keeps consistent with corresponding request package; The bag type field is changed to the response packet type; It is consistent with corresponding request package that the function field keeps; The return code field is carried execution result, at this example, can be the authentication result to transmit leg; The Crypted password information that is used for this communication that the receive direction transmit leg returns can place the data field, session password field as shown in table 4.
Based on the defined application layer data bag of table 2~table 4, can realize the authentication communication between transmit leg and the recipient.Usually, in authentication communication, the certified side in the communicating pair is a client, and authenticating party is a server end.This authentication communication may further comprise the steps:
The 1st step: client is set up the UDP link, according to table 2, encapsulates the logging request bag, and sends to server end by UDP, simultaneously the packet that is sent is kept in the data buffer zone.
The 2nd step: after server end receives packet, encapsulation sends to this client corresponding to the affirmation bag of this logging request bag, inquire about the correctness of the relevant log-on message of this client simultaneously after, encapsulation sends to client corresponding to the response packet of this logging request bag.
The 3rd step: client is after receiving the affirmation bag, this logging request bag of delete buffer, if in the regular hour, do not receive this affirmation bag, then send the logging request bag in the buffering area once more, if after sending certain number of times, still do not receive this affirmation bag, think that then network is unavailable, need reconnect.
The 4th step: after client was received the response packet of logging request bag, bag was confirmed in encapsulation, sends to server end, resolution data bag and judge return code in the response packet simultaneously, if return code is 0, then expression is logined successfully, if return code is other, then carry out and the corresponding handling process of this return code.
Concrete when implementing technical solution of the present invention, can the retransmission timer length and the number of retransmissions upper limit in the following diverse network be set according to table 5:
Network type Time-out time (unit is second) Retransmit number of times
Default value ??10 ??3
??GPRS ??10 ??5
??ADSL ??5 ??3
Public network ??10 ??3
Local area network (LAN) ??5 ??3
Table 5
Table 6 is formed table for the field of the present invention's one preferable data request packet:
Figure G2008101460469D00171
Table 6
Data request packet shown in the table 6 can be used to be sent carries out data interaction between the both sides.Referring to table 6, for the packet of handling through subpackage, can make its request serial number identical, and total Bale No. field and current packet number field are changed to corresponding value, so that the reorganization that the recipient wraps.The content of data field can be to encrypt data afterwards in the table 6, at this moment, the flag bit field need be changed to the encrypted information of expression data segment.
General data interaction flow between the receiving-transmitting sides can carry out according to following steps:
The 1st step: client is set up UDP link, according to table 6, and the encapsulation of data request package, and send to server end by UDP, simultaneously the data that sent are kept in the data buffer zone.
The 2nd step: after server end received packet, encapsulation directly sent to this client corresponding to the affirmation bag of this data request packet.
The 3rd step: client is after receiving the affirmation bag, this data request packet of delete buffer, if in the regular hour, do not receive this affirmation bag, then send the data request packet in the buffering area once more, if after sending certain number of times, still do not receive this affirmation bag, think that then network is unavailable, need reconnect.
As seen from the above-described embodiment, data transmission method for uplink disclosed in this invention makes that by carry check information in the application layer data bag recipient can be according to the correctness of described check information judgment data reception; And, by starting retransmission timer after in disconnected transport layer protocol packet, sending in that this application layer data bag is carried on, and under the overtime fashion of retransmission timer is not received corresponding to situation this application layer data bag, the correct affirmation bag that receives of expression application layer data bag, retransmit this transport layer protocol packet, make the unreliability of transport layer protocol obtain very big remedying, obtained higher transmission reliability.And, because application layer data bag of the present invention and affirmation bag are by carrying towards disconnected transport layer protocol packet, need not to connect between the data transmit-receive both sides, thereby saved many communication resources that are used for Signalling exchange, maintenance connection, thereby guaranteed higher efficiency of transmission.
The present invention corresponding to the data receive method of above-mentioned data transmission method for uplink after receiving the application layer data bag that carries check information, by calculating the check results of this application layer data bag, and judge by more described check results and described check information be whether identical whether described application layer data bag correctly receives, under correct situation about receiving, return corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag to transmit leg, make transmit leg confirm that its packet that sends is correctly received; Under incorrect situation about receiving, return corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive to transmit leg, make transmit leg can retransmit the described incorrect application layer data bag that receives, thereby improved reliability of data transmission.Similarly, because application layer data bag of the present invention and affirmation bag are by carrying towards disconnected transport layer protocol packet, need not to connect between the data transmit-receive both sides, thereby saved many communication resources that are used for Signalling exchange, maintenance connection, thereby guaranteed higher efficiency of transmission.
As seen, the present invention passes through to introduce verification scheme and overtime retransmission mechanism in application layer, and application layer data is carried on towards disconnected transport layer protocol, under the prerequisite that keeps higher transmission efficient, has obtained the higher data transmission reliability.
In addition, in order to improve safety of data transmission, the present invention can encrypt data in application layer, and will transmit in the transport layer protocol packet through the Data-carrying after encrypting.And, in order to guarantee the transmission security of Crypted password, the present invention has taked during interchange key to send random number by a side between receiving-transmitting sides, the opposing party beams back encryption key with this random number encryption a described side's mode afterwards, and at the newly-established each time communication of receiving-transmitting sides, the mode of in the related application layer data bag of the transfer of data first time, consulting a password.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.All any modifications of being done within the spirit and principles in the present invention, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1, a kind of data transmission method is characterized in that, comprising:
The application layer data that A, transmit leg will carry check information is sealed to install in disconnected transport layer protocol packet and is sent, and described application layer data bag is stored in the buffering area, starts retransmission timer;
B, recipient receive described transport layer protocol packet, therefrom obtain the application layer data bag that carries check information, and judge according to described check information whether the application layer data bag that is received is correct, if correct, send corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag; If incorrect, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive;
C, if transmit leg receive that the recipient returns corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive, or the overtime fashion of described retransmission timer do not receive that the recipient returns corresponding to described application layer data bag, the correct affirmation bag that receives of expression application layer data bag, execution in step D then, otherwise, execution in step E;
This application layer data bag in D, the transmit leg retransmission buffer restarts retransmission timer, and returns step C;
E, transmit leg are with this application layer data bag deletion in the buffering area.
2, a kind of data transmission method for uplink is characterized in that, comprising:
The application layer data that A1, transmit leg will carry check information is sealed to install in disconnected transport layer protocol packet and is sent, and described application layer data bag is stored in the buffering area, starts retransmission timer;
B1, if transmit leg receive that the recipient returns corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive, or the overtime fashion of described retransmission timer do not receive corresponding to described application layer data bag, the correct affirmation bag that receives of expression application layer data bag, execution in step C1 then, otherwise, execution in step D1;
This application layer data bag in C1, the transmit leg retransmission buffer restarts retransmission timer, and returns step B1;
D1, transmit leg are with this application layer data bag deletion in the buffering area.
3, method according to claim 2 is characterized in that, this method further comprises: set in advance the number of retransmissions upper limit;
Further comprised before execution in step C1: transmit leg judges whether the number of times send described application layer data bag has surpassed the described number of retransmissions upper limit, if do not surpass, execution in step C1 then, otherwise, finish with the recipient between communicate by letter.
According to claim 2 or 3 described methods, it is characterized in that 4, described steps A 1 further comprises: when needs the other side replys described application layer data bag, transmit leg will represent that the information that need reply is carried in the described application layer data bag;
When transmit leg receive that the recipient returns corresponding to the response packet of described application layer data bag the time, this method further comprises: transmit leg sends the affirmation bag corresponding to described response packet.
5, method according to claim 4, it is characterized in that, when described application layer data bag is that first time between the receiving-transmitting sides is during transfer of data, described steps A 1 further comprises: transmit leg generates first random number at random, the inverible transform form of first random number or first random number is carried in the described application layer data bag, and will represents that the information that this application layer data bag carries random number is carried in the described application layer data bag;
When transmit leg receive that the recipient returns corresponding to described first time transfer of data the response packet of application layer data bag the time, further comprise: from described response packet, obtain second random number after transmit leg uses described first random number encryption, obtain second random number with second random number deciphering of first random number after, described second random number is stored as password described encryption;
During application layer data bag issuer send to be removed the transfer of data first time, described steps A 1 further comprises: the password with described storage is encrypted the data of carrying in the described application layer data bag, and will represent that the encrypted information of data in the described application layer data bag is carried in the described application layer data bag.
6, method according to claim 5, it is characterized in that, when described application layer data bag is first time between receiving-transmitting sides during transfer of data, described steps A 1 further comprises: transmit leg will be carried in the described application layer data bag for the information that the recipient authenticates self;
When transmit leg receive that the recipient returns corresponding to described first time transfer of data the response packet of application layer data bag the time, further comprise: from described response packet, obtain the authentication result of recipient self.
7, according to claim 2 or 3 described methods, it is characterized in that this method further comprises: set in advance the application layer data packet length upper limit;
Described steps A 1 further comprises: when the length of application layer data bag surpasses on the described application layer data packet length in limited time, transmit leg carries out subpackage according to the described application layer data packet length upper limit to described application layer data bag to be handled and obtains a plurality of new application layer data bags; Described a plurality of new application layer data bags are encapsulated into separately in each transport layer protocol packet, and information, total subpackage number, the current packet number that identical serial number, the described application layer data bag of expression have been handled by subpackage is carried in described each new application layer data bag.
8, a kind of data receive method is characterized in that, comprising:
A, recipient receive come from transmit leg towards disconnected transport layer protocol packet, therefrom obtain the application layer data bag that carries check information;
B, recipient calculate the check results of described application layer data bag, whether more described check results is identical with described check information, if check results is identical with check information, judge that the application layer data bag correctly receives, send corresponding to affirmation bag described application layer data bag, the correct reception of expression application layer data bag; If check results and check information are inequality, judge that the application layer data bag does not correctly receive, send corresponding to affirmation bag described application layer data bag, that expression application layer data bag does not correctly receive.
9, method according to claim 8 is characterized in that, further comprises after step a:
C, recipient judge in the described application layer data bag whether carry the information that expression need be replied, if carry, then send the response packet corresponding to described application layer data bag, and described response packet is stored in the buffering area, start retransmission timer;
D, if do not receive affirmation bag corresponding to described response packet in the overtime fashion of described retransmission timer, execution in step e then, otherwise the recipient is with this response packet deletion in the buffering area;
E, this response packet in recipient's retransmission buffer, and restart retransmission timer.
10, method according to claim 9 is characterized in that, this method further comprises: set in advance the number of retransmissions upper limit;
Before execution in step e, further comprise: judge whether the number of times send described response packet has surpassed the described number of retransmissions upper limit, if do not surpass, then returns step e, otherwise, finish with transmit leg between communicate by letter.
11, method according to claim 10, it is characterized in that, further comprise after step a: the recipient judges whether carry the information that this application layer data bag of expression carries random number in the described application layer data bag that gets access to, if, then from described application layer data bag, obtain first random number, or from described application layer data bag, obtain the inverible transform form of first random number, and the inverible transform form of described first random number is carried out inverse transformation obtain first random number;
Before step c sends response packet corresponding to described application layer data bag, further comprise: the recipient generates second random number at random, described second random number is stored as password, will be carried on by second random number behind first random number encryption in the described response packet;
When the recipient received the application layer data bag except that transfer of data for the first time that comes from transmit leg, this method further comprises: the recipient was with the data decryption of password to carrying in the described application layer data bag of described storage.
12, method according to claim 11, it is characterized in that, the recipient judge carry expression in the described application layer data bag that gets access to this application layer data bag carry the information of random number after, further comprise: the recipient obtains from described application layer data bag and is used for information that transmit leg is authenticated;
Before step c sent response packet corresponding to described application layer data bag, further comprise: the recipient authenticated transmit leg the information that transmit leg authenticates according to described being used for, and authentication result is carried in the described response packet.
13, method according to claim 10 is characterized in that, further comprises after step a:
The recipient judges whether carry the information that the described application layer data bag of expression has been handled by subpackage in the described application layer data bag, if carry, then obtain serial number, total subpackage number and current packet number from described application layer data bag, the application layer data bag that serial number is identical is combined into complete application layer data bag according to the current packet number of its correspondence.
CN200810146046A 2008-08-08 2008-08-08 Data transmitting method, a data sending method and a data receiving method Pending CN101645883A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810146046A CN101645883A (en) 2008-08-08 2008-08-08 Data transmitting method, a data sending method and a data receiving method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810146046A CN101645883A (en) 2008-08-08 2008-08-08 Data transmitting method, a data sending method and a data receiving method

Publications (1)

Publication Number Publication Date
CN101645883A true CN101645883A (en) 2010-02-10

Family

ID=41657603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810146046A Pending CN101645883A (en) 2008-08-08 2008-08-08 Data transmitting method, a data sending method and a data receiving method

Country Status (1)

Country Link
CN (1) CN101645883A (en)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101888544A (en) * 2010-06-30 2010-11-17 杭州海康威视数字技术股份有限公司 Low-bandwidth video data transmission method and hard disk video recorder
CN101951370A (en) * 2010-09-17 2011-01-19 北京神州泰岳软件股份有限公司 Reliable file transmission method based on UDP
CN102158389A (en) * 2010-06-25 2011-08-17 青岛海信传媒网络技术有限公司 Asynchronous data transmission method, device and system
CN102480346A (en) * 2010-11-26 2012-05-30 中国科学院声学研究所 Reliable network data transmission method
CN102739375A (en) * 2011-03-31 2012-10-17 北京新岸线无线技术有限公司 Method and device for retransmission
CN102957730A (en) * 2011-08-29 2013-03-06 腾讯科技(深圳)有限公司 UDP (User Datagram Protocol)-based data transmission method and data transmission system
CN103200213A (en) * 2012-01-09 2013-07-10 北京四维图新科技股份有限公司 Data transmission method of remote information service system and data transmission device of remote information service system
CN103516404A (en) * 2013-08-30 2014-01-15 展讯通信(上海)有限公司 Data transmission method and system, sending end equipment and receiving end equipment
CN103814582A (en) * 2013-11-05 2014-05-21 华为技术有限公司 Data transmission method, data receiving device and data sending device for video service
CN103944820A (en) * 2014-05-15 2014-07-23 东莞市联臣电子科技有限公司 Data communication method, host, slave and communication system
CN104539739A (en) * 2015-01-26 2015-04-22 浙江大学 System, method and device for uploading files
CN104954104A (en) * 2015-06-29 2015-09-30 众研凯博网络科技有限公司 Network data transmission method
CN106254809A (en) * 2016-08-12 2016-12-21 贵州信邦富顿科技有限公司 The audio, video data transmission system of the long-range medical consultation of pharmacy and careful side
CN106533639A (en) * 2016-12-06 2017-03-22 迈锐数据(北京)有限公司 Data retransmission method and device
CN106559739A (en) * 2016-09-28 2017-04-05 深圳成谷科技有限公司 It is suitable to the lightweight data transmission method of Bluetooth Low Energy wireless communication system
CN106725260A (en) * 2016-12-26 2017-05-31 重庆金山医疗器械有限公司 Capsule work system is peeped in a kind of buffer type
CN106817367A (en) * 2017-01-03 2017-06-09 深圳市沃特玛电池有限公司 A kind of data transmission method and system
CN107094144A (en) * 2014-01-29 2017-08-25 上海数字电视国家工程研究中心有限公司 The method for packing and de-encapsulation method of base band frame
CN108279663A (en) * 2018-01-24 2018-07-13 广汽丰田汽车有限公司 The control system and control method of vehicle error signal, storage medium
CN108737026A (en) * 2018-05-08 2018-11-02 深圳市心流科技有限公司 Data transmission method, device and computer readable storage medium
CN108901079A (en) * 2018-06-20 2018-11-27 Oppo(重庆)智能科技有限公司 Time-out time determines method, apparatus, equipment and storage medium
CN109194451A (en) * 2018-08-17 2019-01-11 北汽福田汽车股份有限公司 The data of car-mounted terminal reissue method and car-mounted terminal
CN109587733A (en) * 2019-01-18 2019-04-05 苏州德姆斯信息技术有限公司 Low-consumption wireless communication transmission method
CN111818063A (en) * 2020-07-10 2020-10-23 陕西领航软件技术有限公司 Novel data transmission protocol for construction vehicle positioning equipment
CN111884796A (en) * 2020-06-17 2020-11-03 中国电子科技集团公司第三十研究所 Method and system for carrying information based on random number field
CN112511536A (en) * 2020-11-27 2021-03-16 北京经纬恒润科技股份有限公司 Communication method and communication system
CN112995138A (en) * 2021-02-03 2021-06-18 上海钧正网络科技有限公司 Data communication method and device, electronic equipment and readable storage medium
CN113132065A (en) * 2019-12-30 2021-07-16 西安诺瓦星云科技股份有限公司 Data communication method, device and system, storage medium and video processing equipment
WO2021197133A1 (en) * 2020-03-30 2021-10-07 华为技术有限公司 Method and apparatus for data delivery
CN114697279A (en) * 2022-03-23 2022-07-01 北京航天拓扑高科技有限责任公司 Method for transmitting data files by multi-channel sub-packets
CN116458119A (en) * 2020-11-19 2023-07-18 日本电信电话株式会社 Estimation device, estimation method, and estimation program
CN117042041A (en) * 2023-07-06 2023-11-10 佰路威科技(上海)有限公司 Data transmission method, device, electronic equipment, storage medium and program product

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158389A (en) * 2010-06-25 2011-08-17 青岛海信传媒网络技术有限公司 Asynchronous data transmission method, device and system
CN101888544B (en) * 2010-06-30 2012-05-30 杭州海康威视数字技术股份有限公司 Low-bandwidth video data transmission method and hard disk video recorder
CN101888544A (en) * 2010-06-30 2010-11-17 杭州海康威视数字技术股份有限公司 Low-bandwidth video data transmission method and hard disk video recorder
CN101951370A (en) * 2010-09-17 2011-01-19 北京神州泰岳软件股份有限公司 Reliable file transmission method based on UDP
CN101951370B (en) * 2010-09-17 2013-11-06 北京神州泰岳软件股份有限公司 Reliable file transmission method based on UDP
CN102480346A (en) * 2010-11-26 2012-05-30 中国科学院声学研究所 Reliable network data transmission method
CN102480346B (en) * 2010-11-26 2014-12-10 中国科学院声学研究所 Reliable network data transmission method
CN102739375B (en) * 2011-03-31 2019-04-26 北京新岸线移动多媒体技术有限公司 A kind of method and apparatus for re-transmission
CN102739375A (en) * 2011-03-31 2012-10-17 北京新岸线无线技术有限公司 Method and device for retransmission
CN102957730A (en) * 2011-08-29 2013-03-06 腾讯科技(深圳)有限公司 UDP (User Datagram Protocol)-based data transmission method and data transmission system
CN102957730B (en) * 2011-08-29 2016-12-21 腾讯科技(深圳)有限公司 Data transmission method and system
CN103200213A (en) * 2012-01-09 2013-07-10 北京四维图新科技股份有限公司 Data transmission method of remote information service system and data transmission device of remote information service system
CN103516404A (en) * 2013-08-30 2014-01-15 展讯通信(上海)有限公司 Data transmission method and system, sending end equipment and receiving end equipment
CN103814582B (en) * 2013-11-05 2017-06-20 华为技术有限公司 Video service data transmission and data sending device
CN103814582A (en) * 2013-11-05 2014-05-21 华为技术有限公司 Data transmission method, data receiving device and data sending device for video service
CN107094144A (en) * 2014-01-29 2017-08-25 上海数字电视国家工程研究中心有限公司 The method for packing and de-encapsulation method of base band frame
CN107094144B (en) * 2014-01-29 2021-01-19 上海数字电视国家工程研究中心有限公司 Encapsulation method and de-encapsulation method of baseband frame
CN103944820A (en) * 2014-05-15 2014-07-23 东莞市联臣电子科技有限公司 Data communication method, host, slave and communication system
CN104539739A (en) * 2015-01-26 2015-04-22 浙江大学 System, method and device for uploading files
CN104539739B (en) * 2015-01-26 2019-03-29 浙江大学 A kind of system, method and device that file uploads
CN104954104A (en) * 2015-06-29 2015-09-30 众研凯博网络科技有限公司 Network data transmission method
CN106254809A (en) * 2016-08-12 2016-12-21 贵州信邦富顿科技有限公司 The audio, video data transmission system of the long-range medical consultation of pharmacy and careful side
CN106559739A (en) * 2016-09-28 2017-04-05 深圳成谷科技有限公司 It is suitable to the lightweight data transmission method of Bluetooth Low Energy wireless communication system
CN106559739B (en) * 2016-09-28 2020-03-20 深圳成谷科技有限公司 Lightweight data transmission method suitable for Bluetooth low-power wireless communication system
CN106533639B (en) * 2016-12-06 2019-09-17 迈锐数据(北京)有限公司 A kind of data repeating method and device
CN106533639A (en) * 2016-12-06 2017-03-22 迈锐数据(北京)有限公司 Data retransmission method and device
CN106725260A (en) * 2016-12-26 2017-05-31 重庆金山医疗器械有限公司 Capsule work system is peeped in a kind of buffer type
CN106817367A (en) * 2017-01-03 2017-06-09 深圳市沃特玛电池有限公司 A kind of data transmission method and system
CN108279663A (en) * 2018-01-24 2018-07-13 广汽丰田汽车有限公司 The control system and control method of vehicle error signal, storage medium
CN108279663B (en) * 2018-01-24 2019-12-20 广汽丰田汽车有限公司 Control system and control method for vehicle error signal, and storage medium
CN108737026A (en) * 2018-05-08 2018-11-02 深圳市心流科技有限公司 Data transmission method, device and computer readable storage medium
CN108737026B (en) * 2018-05-08 2020-07-03 深圳市心流科技有限公司 Data transmission method, device and computer readable storage medium
US11368563B2 (en) 2018-05-08 2022-06-21 Shenzhen Mental Flow Technology Co., Ltd. Data transmission method, device and non-transitory computer readable storage medium
CN108901079A (en) * 2018-06-20 2018-11-27 Oppo(重庆)智能科技有限公司 Time-out time determines method, apparatus, equipment and storage medium
CN109194451A (en) * 2018-08-17 2019-01-11 北汽福田汽车股份有限公司 The data of car-mounted terminal reissue method and car-mounted terminal
CN109194451B (en) * 2018-08-17 2020-09-15 北汽福田汽车股份有限公司 Data reissue method of vehicle-mounted terminal and vehicle-mounted terminal
CN109587733A (en) * 2019-01-18 2019-04-05 苏州德姆斯信息技术有限公司 Low-consumption wireless communication transmission method
CN113132065A (en) * 2019-12-30 2021-07-16 西安诺瓦星云科技股份有限公司 Data communication method, device and system, storage medium and video processing equipment
WO2021197133A1 (en) * 2020-03-30 2021-10-07 华为技术有限公司 Method and apparatus for data delivery
CN111884796A (en) * 2020-06-17 2020-11-03 中国电子科技集团公司第三十研究所 Method and system for carrying information based on random number field
CN111884796B (en) * 2020-06-17 2022-03-18 中国电子科技集团公司第三十研究所 Method and system for carrying information based on random number field
CN111818063A (en) * 2020-07-10 2020-10-23 陕西领航软件技术有限公司 Novel data transmission protocol for construction vehicle positioning equipment
CN116458119A (en) * 2020-11-19 2023-07-18 日本电信电话株式会社 Estimation device, estimation method, and estimation program
CN112511536A (en) * 2020-11-27 2021-03-16 北京经纬恒润科技股份有限公司 Communication method and communication system
CN112995138A (en) * 2021-02-03 2021-06-18 上海钧正网络科技有限公司 Data communication method and device, electronic equipment and readable storage medium
CN112995138B (en) * 2021-02-03 2022-12-27 上海钧正网络科技有限公司 Data communication method and device, electronic equipment and readable storage medium
CN114697279A (en) * 2022-03-23 2022-07-01 北京航天拓扑高科技有限责任公司 Method for transmitting data files by multi-channel sub-packets
CN117042041A (en) * 2023-07-06 2023-11-10 佰路威科技(上海)有限公司 Data transmission method, device, electronic equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN101645883A (en) Data transmitting method, a data sending method and a data receiving method
CN108650227B (en) Handshaking method and system based on datagram secure transmission protocol
CN1536847B (en) Method for authority discrimination grouping and effective loading
CN102130768B (en) Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
US8285990B2 (en) Method and system for authentication confirmation using extensible authentication protocol
US7991993B2 (en) Telecommunication system, for example an IP telecommunication system, and equipment units for use in the system
US7325133B2 (en) Mass subscriber management
US7251733B2 (en) Method, system and devices for transferring accounting information
US20020076054A1 (en) Session shared key sharing method, wireless terminal authentication method, wireless terminal, and base station device
US20050033960A1 (en) Message authentication
EP1746801A2 (en) Transmission of packet data over a network with a security protocol
CN101867476B (en) 3G virtual private dialing network user safety authentication method and device thereof
CN102577314A (en) Method and device for securely transmitting data
CN101247407A (en) Network authentication service system and method
CN103765848A (en) Apparatus and methods for media access control replacement
CN102231725B (en) Method, equipment and system for authenticating dynamic host configuration protocol message
CN103053143A (en) Methods and arrangements for secure communication over an IP network
CN113904809B (en) Communication method, device, electronic equipment and storage medium
CN113452660A (en) Communication method of mesh network and cloud server, mesh network system and node device thereof
CN101483863B (en) Instant message transmitting method, system and WAPI terminal
CN106878324A (en) Short message authentication method, short message certification server and terminal
CN105846982B (en) A kind of method of cross-domain transmission
KR101704540B1 (en) A method of managing group keys for sharing data between multiple devices in M2M environment
CN101394281A (en) Wireless mesh network access security authentication method based on WLAN
CN103986716B (en) Establishing method for SSL connection and communication method and device based on SSL connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100210