CN106254392A - Communication means based on the exTLV Message Protocol that dynamically can customize - Google Patents
Communication means based on the exTLV Message Protocol that dynamically can customize Download PDFInfo
- Publication number
- CN106254392A CN106254392A CN201610861399.1A CN201610861399A CN106254392A CN 106254392 A CN106254392 A CN 106254392A CN 201610861399 A CN201610861399 A CN 201610861399A CN 106254392 A CN106254392 A CN 106254392A
- Authority
- CN
- China
- Prior art keywords
- message
- data
- definition
- extlv
- customize
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/06—Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Communication Control (AREA)
Abstract
The present invention relates to a kind of communication means based on the exTLV Message Protocol that dynamically can customize, its technical characterstic is: comprise the following steps: step 1, between client and service end by KEY calculate identifying code method set up secure connection;Step 2, by definition by message picture and text type, message data byte length, message data content and the message inspection message format that constitutes of data four part that above-mentioned three kinds of data are tested, set up between client and service end based on the exTLV Message Protocol that dynamically can customize;Step 3, employing java standard library are issued, and API Function is for realizing transmission message based on the exTLV Message Protocol that dynamically can customize and the funcall receiving message.The present invention can effectively prevent transmitting data and is tampered and has versatility, is got final product the transmission message of safety by secure transport mechanism and agreement and is analyzed message format and every composition meaning.
Description
Technical field
The invention belongs to network transmission technology field, a kind of based on the exTLV message transmissions that dynamically can customize
The communication means of agreement.
Background technology
In the exploitation of current types of applications or equipment, when relating to point-to-point message transmissions, generally use two kinds of reports
Message transmitting method, one is to use this application or the completely self-contained message format of equipment, generally is directed to self information content
Feature, independent design has the set form of certain rule to carry out message transmissions;Another kind is to use basic TLV coding, should
TLV is encoded to the one of BER coding, and full name is Type (type), and Length (length), Value (are worth), and google company is at this
On the basis of extend message name and protobuf data, transmittability is strengthened.
But above two message transmitting method there is problems in that
The first message transmitting method: transmission both sides need to know in advance each content meaning of transmission, in development process
I.e. it is to be appreciated that the composition form of message, not having versatility, explaining message needs secondary development;
The second message transmitting method: be provided with versatility, can obtain information format meaning according to message name,
Obtain data value from protobuf again, but the method be when transmitting the message of same form every time, causes the repetition of data,
The length of the data field protobuf that length a lot of time in message name territory is both greater than actually needed, causes efficiency of transmission
Reduction and the waste of bandwidth.Meanwhile, agreement itself does not possess secure transport mechanism.
Summary of the invention
It is an object of the invention to overcome the deficiencies in the prior art, it is provided that a kind of reasonable in design, highly versatile, safety height
And the communication means based on exTLV (extension TLV) Message Protocol that dynamically can customize that efficiency of transmission is high.
The present invention solves it and technical problem is that and take techniques below scheme to realize:
A kind of communication means based on the exTLV Message Protocol that dynamically can customize, comprises the following steps:
Step 1, the secure connection of integrity verification KEY is used to shake hands transmission means, logical between client and service end
The method crossing KEY calculating identifying code sets up secure connection;
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three
The message format that message inspection data four part that kind of data are tested is constituted, set up between client and service end based on
The exTLV Message Protocol that dynamically can customize;
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message that dynamically can customize
The funcall sending message and reception message of host-host protocol.
And, the concrete steps of described step 1 include:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman (default employing RSA Algorithm), and by asymmetric public key
It is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, the described asymmetric public affairs that will receive
Key is sent to service end after being encrypted;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY, right
Data message transmission carries out integrity verification.
And, the message picture and text type of described step 2 includes: structure definition message, structure definition request message and data
Message.
And, the concrete steps sending message of described step 3 include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and will be all
Field name and type in press-in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as
Comparison;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message fixed
Justice, and be saved in existing structure message definition chain, and send structure definition message;If it is fixed to match existing structure message
Justice, then send datagram according to the definition of this structure message;
(3) in sender verifies, with 32 bit integrities, the check that KEY calculate 32 according to the content of the data message sent
Hold, and invested the last of data message content;
(4), after recipient receives message, by same method, data message content is carried out check content calculating, as
Fruit is inconsistent with the check content received, then require that sender retransmits.
And, the computational methods of the check content of described 32 of (3rd) step sending message of described step 3 are:
It is spliced in actual message content before and after 32 bit integrity checking KEY, the content that composition need to be verified, tests in generation
After card content, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes message picture and text type (type), message data byte length (len) and message number
Partial data according to content (data).
And, the concrete steps receiving message of described step 3 include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure report
In literary composition definition chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then will according to the definition of this structure message
Data message resolves to multiple field name and corresponding field value;If not finding the structure corresponding with described data message
Message defines, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
Advantages of the present invention and good effect be:
1, the present invention uses the secure connection of integrity verification KEY to shake hands transmission means, is counted by KEY in connection procedure
The method calculating identifying code sets up secure transport mechanism;And transferring content is not encrypted by the present invention, it is only necessary to make integrity
Checking, it becomes possible to ensure the integrity of data transmission, can effectively prevent transmitting data and be tampered and need not additional configuration safety
Assembly.
2, the present invention has versatility, it is not necessary to offered password and data structure, by secure transport mechanism and association
View gets final product the transmission message of safety and analyzes message format and every composition meaning.
3, each application or the equipment of the present invention can be according to self needing flexibly customizing structure class message format and data
Message format, the opposing party of communication is according to the most soluble every composition value of message content and meaning.
4, the present invention has extensibility, and the data type in message, size, structure composition can arbitrarily be extended or be made by oneself
Justice.
5, the present invention is for realizing the definition of reusable structure, reduces transmitted data amount, have employed transmission structure and number in agreement
The design of EDI messages mode being separated according to value, makes the present invention will not produce in the message data of repetition from the design of this body structure of agreement
Hold.
6, the present invention is the most applicable for different data types, agent object and underlying network protocols.
7, different application be need not define new host-host protocol and method by the present invention;And it is not necessary for transmitting every time
The change of content defines new transmission structure, provides convenient for application extension or upgrading.
8, the present invention provides unified message description and transmission to the integration of isomeric data, isomerous environment.
9, the developer of the present invention has only to pay close attention to the combination of transmitted of business datum and meaning, it is not necessary to consider transmission
Implementation method.
10, the present invention is in same occasion, can mixed transport mutually between different application or equipment, it is not necessary in advance
Tissue message format.
Accompanying drawing explanation
Fig. 1 is the method flow diagram setting up secure connection between the client of the present invention and service end;
Fig. 2 is the message format schematic diagram based on the exTLV Message Protocol that dynamically can customize of the present invention;
Fig. 3 is the composition form schematic diagram of message data content (data) part of the structure definition message of the present invention;
Fig. 4 is the composition form schematic diagram of message data content (data) part of the data message of the present invention;
Fig. 5 be the present invention structure definition message and data message message inspection data (check) part calculating in
Hold schematic diagram.
Detailed description of the invention
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail:
A kind of communication means based on the exTLV Message Protocol that dynamically can customize, comprises the following steps:
Step 1, the secure connection of integrity verification KEY is used to shake hands transmission means, logical between client and service end
The method crossing KEY calculating identifying code sets up secure connection;
As it is shown in figure 1, described step 1 comprises the following steps:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman (default employing RSA Algorithm), and by asymmetric public key
It is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, the described asymmetric public affairs that will receive
Key is sent to service end after being encrypted;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY, right
Data message transmission carries out integrity verification.
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three
The message format that message inspection data four part that kind of data are tested is constituted, set up between client and service end based on
The exTLV Message Protocol that dynamically can customize;
Every kind of message format based on the exTLV Message Protocol that dynamically can customize, as in figure 2 it is shown, by four parts
Composition:
(1) message picture and text type (type): message picture and text type, 1 byte length, three kinds of possible values are respectively as follows:
" 1 ", " 2 " and " 3 ";
The message picture and text type of described step 2 includes: structure definition message, structure definition request message and data message.
Wherein, " 1 " representative structure definition message;" 2 " representative structure definition request message;" 3 " represent data message;
(2) message data byte length (len): message data byte length, i.e. data partial-length, take 2 bytes;
(3) message data content (data): message data content;
(4) message inspection data (check) above-mentioned three kinds of data tested: numbers all to type, len, data
According to integrity verification code, 32 byte lengths.
In message format, integer length more than double byte all uses low byte suitable in the posterior host byte of front high byte
Sequence.
Separately below structure definition message, structure definition request message and data message are illustrated:
(1) structure definition message:
When in protocol massages, type is 1, data part defines for structure, and composition message format as shown in Figure 3, by such as
Shown in lower, structure number forms with multiple field definition:
1. structure number data No.: representative structure is numbered, for unique numbering identifying every class formation, application or equipment
Each self-defined.Take 2 bytes, content according to the corresponding each field domain of structure number in data message;
2. field type field type: represent field type, 1 byte, the exTLV message transmissions that dynamically can customize
Predefined value in agreement:
The BYTE type of 1: one byte or char type;
The unsigned int of 2: two bytes;
18: two bytes have symbol integer;
The unsigned int of 3: four bytes;
19: four bytes have symbol integer;
The symbol point-type of 4: four bytes;
The unsigned int of 5: eight bytes;
6:ANSI character string;
22:UNICODE character string;
38:utf-8 character string;
127: custom field type;
3. field name byte length name len: field name byte length, i.e. the length of field name part, account for
By 1 byte;
4. field name field name: field name, ANSI character string.
(2) structure definition request message
Structure definition message actively can be sent by data receiver, it is also possible to is sent request, message by receiving direction
Middle type is to be request message when 2, and sender receives this message and resends structure definition message.Structure definition request message
The data part data No. structure number that only two bytes, i.e. demand structure are fixed.
(3) data message
When in protocol massages, type is 3, data part is data message, and composition message format as shown in Figure 4, by such as
Structure number shown in lower forms with multiple field datas:
1. structure number data No.: the structure number of notebook data message, corresponding with structure definition message;
2. the byte length of field data byte length value len: field data, the most followed by field value's
Length;
3. field data field value: field data.
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message that dynamically can customize
The funcall sending message and reception message of host-host protocol.
The work process of described transmission message is: caller has only to a field name, type, length and field value respectively
Press-in sends in stack, calls and sends;
Its concrete steps include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and will be all
Field name and type in press-in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as
Comparison;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message fixed
Justice, and be saved in existing structure message definition chain, and send structure definition message;If it is fixed to match existing structure message
Justice, then send datagram according to the definition of this structure message;
(3) in sender verifies, with 32 bit integrities, the check that KEY calculate 32 according to the content of the data message sent
Hold, and invested the last of data message content;
The check content computational methods of described 32 are:
As it is shown in figure 5, be spliced in actual message content before and after 32 bit integrity checking KEY, it is interior that composition need to be verified
Hold, after producing checking content, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes type, len, data partial data.
(4), after recipient receives message, by same method, data message content is carried out check content calculating, as
Fruit is inconsistent with the check content received, then require that sender retransmits.
The work process of described reception message is: caller only need to call receiver function, and java standard library is i.e. read from network interface
Taking message data, become multiple field name and corresponding value according to the packet parsing received, caller directly passes through field name
Obtain each field value, finally discharge temporal cache.
Its concrete steps include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure report
In literary composition definition chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then will according to the definition of this structure message
Data message resolves to multiple field name and corresponding field value;If not finding the structure corresponding with described data message
Message defines, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
It is emphasized that embodiment of the present invention is illustrative rather than determinate, bag the most of the present invention
Include the embodiment being not limited to described in detailed description of the invention, every by those skilled in the art according to technical scheme
Other embodiments drawn, also belong to the scope of protection of the invention.
Claims (6)
1. a communication means based on the exTLV Message Protocol that dynamically can customize, it is characterised in that: include following step
Rapid:
Step 1, use the secure connection of integrity verification KEY to shake hands transmission means, between client and service end, pass through KEY
The method calculating identifying code sets up secure connection;
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three kinds of numbers
According to test message inspection data four part constitute message format, set up between client and service end based on dynamically
The exTLV Message Protocol that can customize;
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message transmissions that dynamically can customize
The funcall sending message and reception message of agreement.
A kind of communication means based on the exTLV Message Protocol that dynamically can customize the most according to claim 1, its
It is characterised by: the concrete steps of described step 1 include:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman, and asymmetric public key is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, is entered by the described asymmetric public key received
It is sent to service end after row encryption;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission, to transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY
Data message carries out integrity verification.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2
Method, it is characterised in that: the message picture and text type of described step 2 includes: structure definition message, structure definition request message and data
Message.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2
Method, it is characterised in that: the concrete steps sending message of described step 3 include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and by all press-ins
Field name and type in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as ratio
Right;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message definition,
And be saved in existing structure message definition chain, and send structure definition message;If matching the definition of existing structure message,
Then send datagram according to the definition of this structure message;
(3) with 32 bit integrities, sender verifies that KEY calculate the check content of 32 according to the content of the data message sent,
And invested the last of data message content;
(4), after recipient receives message, by same method, data message content carried out check content calculating, if with
The check content received is inconsistent, then require that sender retransmits.
A kind of communication means based on the exTLV Message Protocol that dynamically can customize the most according to claim 4, its
It is characterised by: the computational methods of the check content of described 32 of (3rd) step sending message of described step 3 are:
Being spliced in actual message content before and after 32 bit integrity checking KEY, the content that composition need to be verified, in producing checking
After appearance, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes the complete number of message picture and text type, message data byte length and message data content
According to.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2
Method, it is characterised in that: the concrete steps receiving message of described step 3 include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure message fixed
In justice chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then define data according to this structure message
Packet parsing becomes multiple field name and corresponding field value;If not finding the structure message corresponding with described data message
Definition, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610861399.1A CN106254392B (en) | 2016-09-28 | 2016-09-28 | Communication method based on dynamically customizable exT L V message transmission protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610861399.1A CN106254392B (en) | 2016-09-28 | 2016-09-28 | Communication method based on dynamically customizable exT L V message transmission protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106254392A true CN106254392A (en) | 2016-12-21 |
CN106254392B CN106254392B (en) | 2020-07-31 |
Family
ID=57611751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610861399.1A Active CN106254392B (en) | 2016-09-28 | 2016-09-28 | Communication method based on dynamically customizable exT L V message transmission protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106254392B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109561106A (en) * | 2018-12-29 | 2019-04-02 | 北京工业大学 | A kind of marine communication message real time parsing filter method |
CN109617886A (en) * | 2018-12-21 | 2019-04-12 | 广州市宏大欣电子科技有限公司 | Client data encryption method and service end data encryption method based on TCP communication |
CN113225320A (en) * | 2021-04-21 | 2021-08-06 | 南京理工大学 | Network message analysis method for keeping user configurable message format secret |
CN113329064A (en) * | 2021-05-13 | 2021-08-31 | 河南中州智慧水利研究院有限公司 | Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933479A (en) * | 2005-09-16 | 2007-03-21 | 华为技术有限公司 | Method for transmitting data in communication system and system thereof |
CN101188561A (en) * | 2007-12-20 | 2008-05-28 | 北京大学 | Communication method and system for universal service data based on self-defined template |
CN101599890A (en) * | 2008-06-06 | 2009-12-09 | 中兴通讯股份有限公司 | Data transmission system in a kind of communication system method of unifying |
US8228872B2 (en) * | 2009-01-07 | 2012-07-24 | Lg Electronics Inc. | Method for performing zone switching in broadband wireless access system |
CN102624741A (en) * | 2012-03-30 | 2012-08-01 | 奇智软件(北京)有限公司 | TLV (Threshold Limit Value) based data transmission method and system thereof |
-
2016
- 2016-09-28 CN CN201610861399.1A patent/CN106254392B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933479A (en) * | 2005-09-16 | 2007-03-21 | 华为技术有限公司 | Method for transmitting data in communication system and system thereof |
CN101188561A (en) * | 2007-12-20 | 2008-05-28 | 北京大学 | Communication method and system for universal service data based on self-defined template |
CN101599890A (en) * | 2008-06-06 | 2009-12-09 | 中兴通讯股份有限公司 | Data transmission system in a kind of communication system method of unifying |
US8228872B2 (en) * | 2009-01-07 | 2012-07-24 | Lg Electronics Inc. | Method for performing zone switching in broadband wireless access system |
CN102624741A (en) * | 2012-03-30 | 2012-08-01 | 奇智软件(北京)有限公司 | TLV (Threshold Limit Value) based data transmission method and system thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617886A (en) * | 2018-12-21 | 2019-04-12 | 广州市宏大欣电子科技有限公司 | Client data encryption method and service end data encryption method based on TCP communication |
CN109617886B (en) * | 2018-12-21 | 2021-07-27 | 广东宏大欣电子科技有限公司 | Client data encryption method and server data encryption method based on TCP communication |
CN109561106A (en) * | 2018-12-29 | 2019-04-02 | 北京工业大学 | A kind of marine communication message real time parsing filter method |
CN109561106B (en) * | 2018-12-29 | 2021-06-04 | 北京工业大学 | Ship communication message real-time analysis and filtering method |
CN113225320A (en) * | 2021-04-21 | 2021-08-06 | 南京理工大学 | Network message analysis method for keeping user configurable message format secret |
CN113329064A (en) * | 2021-05-13 | 2021-08-31 | 河南中州智慧水利研究院有限公司 | Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control |
CN113329064B (en) * | 2021-05-13 | 2022-11-25 | 河南中州智慧水利研究院有限公司 | Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control |
Also Published As
Publication number | Publication date |
---|---|
CN106254392B (en) | 2020-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106254392A (en) | Communication means based on the exTLV Message Protocol that dynamically can customize | |
Castiglione et al. | An asynchronous covert channel using spam | |
CN103701598B (en) | It is a kind of that endorsement method and digital signature device are checked based on SM2 signature algorithms | |
CN108521331A (en) | Hidden information based on source address sends system and sending method | |
HU223910B1 (en) | Method of transmitting information data from a sender to a reciever via a transcoder, method of transcoding information data, method of receiving transcoded information data, sender, receiver and transcoder | |
US20110320359A1 (en) | secure communication method and device based on application layer for mobile financial service | |
JP6289680B2 (en) | Packet transmission device, packet reception device, packet transmission program, and packet reception program | |
CN111275404B (en) | Block chain-based review method, device, equipment and medium | |
CN103108037B (en) | A kind of communication means, Web server and Web communication system | |
CN107979613A (en) | A kind of method and system of guarantee JMS message safety certifications | |
CN110380842A (en) | CAN bus message endorsement method, device and system suitable for wisdom net connection automobile | |
CN101167331B (en) | Method, system and device for transferring network event log protocol message | |
CN107104919A (en) | The processing method of firewall box, SCTP SCTP packet | |
KR20120063387A (en) | Device and method for generating sms message | |
CN116389051A (en) | Lightweight data hidden transmission method based on block chain | |
CN108270563A (en) | A kind of method for interchanging data and system based on SM2 Encryption Algorithm | |
CN111835519A (en) | Covert communication method based on public block chain | |
CN115694791A (en) | QKD-based distribution network and method | |
FI113924B (en) | Procedure, arrangement and apparatus for demonstrating the authenticity of data traffic | |
CN111193586B (en) | Information processing method, packet transport network device and quantum key device | |
CN111800384A (en) | Financial service application management method and device based on block chain | |
Suryavanshi et al. | An improved cryptographic algorithm using UNICODE and universal colors | |
CN104320778A (en) | Integrity protection method for long data stream in wireless sensor network | |
CN114598508B (en) | Hidden information transmission method and device based on Ethernet transaction | |
Andersson et al. | Very Low Bandwidth (Marine) Web Surfing A Fault-Tolerant Content Streaming Web Browsing Solution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |