CN106254392A - Communication means based on the exTLV Message Protocol that dynamically can customize - Google Patents

Communication means based on the exTLV Message Protocol that dynamically can customize Download PDF

Info

Publication number
CN106254392A
CN106254392A CN201610861399.1A CN201610861399A CN106254392A CN 106254392 A CN106254392 A CN 106254392A CN 201610861399 A CN201610861399 A CN 201610861399A CN 106254392 A CN106254392 A CN 106254392A
Authority
CN
China
Prior art keywords
message
data
definition
extlv
customize
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610861399.1A
Other languages
Chinese (zh)
Other versions
CN106254392B (en
Inventor
侯俊芳
陆中威
孙涛
姚嵩
丁玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Original Assignee
TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE filed Critical TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Priority to CN201610861399.1A priority Critical patent/CN106254392B/en
Publication of CN106254392A publication Critical patent/CN106254392A/en
Application granted granted Critical
Publication of CN106254392B publication Critical patent/CN106254392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Communication Control (AREA)

Abstract

The present invention relates to a kind of communication means based on the exTLV Message Protocol that dynamically can customize, its technical characterstic is: comprise the following steps: step 1, between client and service end by KEY calculate identifying code method set up secure connection;Step 2, by definition by message picture and text type, message data byte length, message data content and the message inspection message format that constitutes of data four part that above-mentioned three kinds of data are tested, set up between client and service end based on the exTLV Message Protocol that dynamically can customize;Step 3, employing java standard library are issued, and API Function is for realizing transmission message based on the exTLV Message Protocol that dynamically can customize and the funcall receiving message.The present invention can effectively prevent transmitting data and is tampered and has versatility, is got final product the transmission message of safety by secure transport mechanism and agreement and is analyzed message format and every composition meaning.

Description

Communication means based on the exTLV Message Protocol that dynamically can customize
Technical field
The invention belongs to network transmission technology field, a kind of based on the exTLV message transmissions that dynamically can customize The communication means of agreement.
Background technology
In the exploitation of current types of applications or equipment, when relating to point-to-point message transmissions, generally use two kinds of reports Message transmitting method, one is to use this application or the completely self-contained message format of equipment, generally is directed to self information content Feature, independent design has the set form of certain rule to carry out message transmissions;Another kind is to use basic TLV coding, should TLV is encoded to the one of BER coding, and full name is Type (type), and Length (length), Value (are worth), and google company is at this On the basis of extend message name and protobuf data, transmittability is strengthened.
But above two message transmitting method there is problems in that
The first message transmitting method: transmission both sides need to know in advance each content meaning of transmission, in development process I.e. it is to be appreciated that the composition form of message, not having versatility, explaining message needs secondary development;
The second message transmitting method: be provided with versatility, can obtain information format meaning according to message name, Obtain data value from protobuf again, but the method be when transmitting the message of same form every time, causes the repetition of data, The length of the data field protobuf that length a lot of time in message name territory is both greater than actually needed, causes efficiency of transmission Reduction and the waste of bandwidth.Meanwhile, agreement itself does not possess secure transport mechanism.
Summary of the invention
It is an object of the invention to overcome the deficiencies in the prior art, it is provided that a kind of reasonable in design, highly versatile, safety height And the communication means based on exTLV (extension TLV) Message Protocol that dynamically can customize that efficiency of transmission is high.
The present invention solves it and technical problem is that and take techniques below scheme to realize:
A kind of communication means based on the exTLV Message Protocol that dynamically can customize, comprises the following steps:
Step 1, the secure connection of integrity verification KEY is used to shake hands transmission means, logical between client and service end The method crossing KEY calculating identifying code sets up secure connection;
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three The message format that message inspection data four part that kind of data are tested is constituted, set up between client and service end based on The exTLV Message Protocol that dynamically can customize;
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message that dynamically can customize The funcall sending message and reception message of host-host protocol.
And, the concrete steps of described step 1 include:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman (default employing RSA Algorithm), and by asymmetric public key It is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, the described asymmetric public affairs that will receive Key is sent to service end after being encrypted;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY, right Data message transmission carries out integrity verification.
And, the message picture and text type of described step 2 includes: structure definition message, structure definition request message and data Message.
And, the concrete steps sending message of described step 3 include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and will be all Field name and type in press-in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as Comparison;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message fixed Justice, and be saved in existing structure message definition chain, and send structure definition message;If it is fixed to match existing structure message Justice, then send datagram according to the definition of this structure message;
(3) in sender verifies, with 32 bit integrities, the check that KEY calculate 32 according to the content of the data message sent Hold, and invested the last of data message content;
(4), after recipient receives message, by same method, data message content is carried out check content calculating, as Fruit is inconsistent with the check content received, then require that sender retransmits.
And, the computational methods of the check content of described 32 of (3rd) step sending message of described step 3 are:
It is spliced in actual message content before and after 32 bit integrity checking KEY, the content that composition need to be verified, tests in generation After card content, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes message picture and text type (type), message data byte length (len) and message number Partial data according to content (data).
And, the concrete steps receiving message of described step 3 include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure report In literary composition definition chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then will according to the definition of this structure message Data message resolves to multiple field name and corresponding field value;If not finding the structure corresponding with described data message Message defines, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
Advantages of the present invention and good effect be:
1, the present invention uses the secure connection of integrity verification KEY to shake hands transmission means, is counted by KEY in connection procedure The method calculating identifying code sets up secure transport mechanism;And transferring content is not encrypted by the present invention, it is only necessary to make integrity Checking, it becomes possible to ensure the integrity of data transmission, can effectively prevent transmitting data and be tampered and need not additional configuration safety Assembly.
2, the present invention has versatility, it is not necessary to offered password and data structure, by secure transport mechanism and association View gets final product the transmission message of safety and analyzes message format and every composition meaning.
3, each application or the equipment of the present invention can be according to self needing flexibly customizing structure class message format and data Message format, the opposing party of communication is according to the most soluble every composition value of message content and meaning.
4, the present invention has extensibility, and the data type in message, size, structure composition can arbitrarily be extended or be made by oneself Justice.
5, the present invention is for realizing the definition of reusable structure, reduces transmitted data amount, have employed transmission structure and number in agreement The design of EDI messages mode being separated according to value, makes the present invention will not produce in the message data of repetition from the design of this body structure of agreement Hold.
6, the present invention is the most applicable for different data types, agent object and underlying network protocols.
7, different application be need not define new host-host protocol and method by the present invention;And it is not necessary for transmitting every time The change of content defines new transmission structure, provides convenient for application extension or upgrading.
8, the present invention provides unified message description and transmission to the integration of isomeric data, isomerous environment.
9, the developer of the present invention has only to pay close attention to the combination of transmitted of business datum and meaning, it is not necessary to consider transmission Implementation method.
10, the present invention is in same occasion, can mixed transport mutually between different application or equipment, it is not necessary in advance Tissue message format.
Accompanying drawing explanation
Fig. 1 is the method flow diagram setting up secure connection between the client of the present invention and service end;
Fig. 2 is the message format schematic diagram based on the exTLV Message Protocol that dynamically can customize of the present invention;
Fig. 3 is the composition form schematic diagram of message data content (data) part of the structure definition message of the present invention;
Fig. 4 is the composition form schematic diagram of message data content (data) part of the data message of the present invention;
Fig. 5 be the present invention structure definition message and data message message inspection data (check) part calculating in Hold schematic diagram.
Detailed description of the invention
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail:
A kind of communication means based on the exTLV Message Protocol that dynamically can customize, comprises the following steps:
Step 1, the secure connection of integrity verification KEY is used to shake hands transmission means, logical between client and service end The method crossing KEY calculating identifying code sets up secure connection;
As it is shown in figure 1, described step 1 comprises the following steps:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman (default employing RSA Algorithm), and by asymmetric public key It is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, the described asymmetric public affairs that will receive Key is sent to service end after being encrypted;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY, right Data message transmission carries out integrity verification.
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three The message format that message inspection data four part that kind of data are tested is constituted, set up between client and service end based on The exTLV Message Protocol that dynamically can customize;
Every kind of message format based on the exTLV Message Protocol that dynamically can customize, as in figure 2 it is shown, by four parts Composition:
(1) message picture and text type (type): message picture and text type, 1 byte length, three kinds of possible values are respectively as follows: " 1 ", " 2 " and " 3 ";
The message picture and text type of described step 2 includes: structure definition message, structure definition request message and data message.
Wherein, " 1 " representative structure definition message;" 2 " representative structure definition request message;" 3 " represent data message;
(2) message data byte length (len): message data byte length, i.e. data partial-length, take 2 bytes;
(3) message data content (data): message data content;
(4) message inspection data (check) above-mentioned three kinds of data tested: numbers all to type, len, data According to integrity verification code, 32 byte lengths.
In message format, integer length more than double byte all uses low byte suitable in the posterior host byte of front high byte Sequence.
Separately below structure definition message, structure definition request message and data message are illustrated:
(1) structure definition message:
When in protocol massages, type is 1, data part defines for structure, and composition message format as shown in Figure 3, by such as Shown in lower, structure number forms with multiple field definition:
1. structure number data No.: representative structure is numbered, for unique numbering identifying every class formation, application or equipment Each self-defined.Take 2 bytes, content according to the corresponding each field domain of structure number in data message;
2. field type field type: represent field type, 1 byte, the exTLV message transmissions that dynamically can customize Predefined value in agreement:
The BYTE type of 1: one byte or char type;
The unsigned int of 2: two bytes;
18: two bytes have symbol integer;
The unsigned int of 3: four bytes;
19: four bytes have symbol integer;
The symbol point-type of 4: four bytes;
The unsigned int of 5: eight bytes;
6:ANSI character string;
22:UNICODE character string;
38:utf-8 character string;
127: custom field type;
3. field name byte length name len: field name byte length, i.e. the length of field name part, account for By 1 byte;
4. field name field name: field name, ANSI character string.
(2) structure definition request message
Structure definition message actively can be sent by data receiver, it is also possible to is sent request, message by receiving direction Middle type is to be request message when 2, and sender receives this message and resends structure definition message.Structure definition request message The data part data No. structure number that only two bytes, i.e. demand structure are fixed.
(3) data message
When in protocol massages, type is 3, data part is data message, and composition message format as shown in Figure 4, by such as Structure number shown in lower forms with multiple field datas:
1. structure number data No.: the structure number of notebook data message, corresponding with structure definition message;
2. the byte length of field data byte length value len: field data, the most followed by field value's Length;
3. field data field value: field data.
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message that dynamically can customize The funcall sending message and reception message of host-host protocol.
The work process of described transmission message is: caller has only to a field name, type, length and field value respectively Press-in sends in stack, calls and sends;
Its concrete steps include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and will be all Field name and type in press-in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as Comparison;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message fixed Justice, and be saved in existing structure message definition chain, and send structure definition message;If it is fixed to match existing structure message Justice, then send datagram according to the definition of this structure message;
(3) in sender verifies, with 32 bit integrities, the check that KEY calculate 32 according to the content of the data message sent Hold, and invested the last of data message content;
The check content computational methods of described 32 are:
As it is shown in figure 5, be spliced in actual message content before and after 32 bit integrity checking KEY, it is interior that composition need to be verified Hold, after producing checking content, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes type, len, data partial data.
(4), after recipient receives message, by same method, data message content is carried out check content calculating, as Fruit is inconsistent with the check content received, then require that sender retransmits.
The work process of described reception message is: caller only need to call receiver function, and java standard library is i.e. read from network interface Taking message data, become multiple field name and corresponding value according to the packet parsing received, caller directly passes through field name Obtain each field value, finally discharge temporal cache.
Its concrete steps include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure report In literary composition definition chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then will according to the definition of this structure message Data message resolves to multiple field name and corresponding field value;If not finding the structure corresponding with described data message Message defines, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
It is emphasized that embodiment of the present invention is illustrative rather than determinate, bag the most of the present invention Include the embodiment being not limited to described in detailed description of the invention, every by those skilled in the art according to technical scheme Other embodiments drawn, also belong to the scope of protection of the invention.

Claims (6)

1. a communication means based on the exTLV Message Protocol that dynamically can customize, it is characterised in that: include following step Rapid:
Step 1, use the secure connection of integrity verification KEY to shake hands transmission means, between client and service end, pass through KEY The method calculating identifying code sets up secure connection;
Step 2, by definition by message picture and text type, message data byte length, message data content and to above-mentioned three kinds of numbers According to test message inspection data four part constitute message format, set up between client and service end based on dynamically The exTLV Message Protocol that can customize;
Step 3, employing java standard library are issued, and API Function is for realizing based on the exTLV message transmissions that dynamically can customize The funcall sending message and reception message of agreement.
A kind of communication means based on the exTLV Message Protocol that dynamically can customize the most according to claim 1, its It is characterised by: the concrete steps of described step 1 include:
(1) between client with service end, set up TCP to be connected;
(2) service end produces double secret key by rivest, shamir, adelman, and asymmetric public key is sent to client;
(3) client produces random 32 character strings, as integrity verification KEY, is entered by the described asymmetric public key received It is sent to service end after row encryption;
(4), after 32 bit integrity checking KEY after service end receives encryption, it is decrypted with the private key produced;
(5) client carries out subsequent data transmission, to transmission with service end both sides according to 32 the most synchronize bit integrity checking KEY Data message carries out integrity verification.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2 Method, it is characterised in that: the message picture and text type of described step 2 includes: structure definition message, structure definition request message and data Message.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2 Method, it is characterised in that: the concrete steps sending message of described step 3 include:
(1) caller has only to field name, type, length and field value are respectively pressed in transmission stack, and by all press-ins Field name and type in stack alphabetically arrange;
(2) the structure message currently preserved in the field name in all press-in stacks and type and press-in stack is defined as ratio Right;If not matching the definition of existing structure message, then according to current press-in stack field information, produce new structure message definition, And be saved in existing structure message definition chain, and send structure definition message;If matching the definition of existing structure message, Then send datagram according to the definition of this structure message;
(3) with 32 bit integrities, sender verifies that KEY calculate the check content of 32 according to the content of the data message sent, And invested the last of data message content;
(4), after recipient receives message, by same method, data message content carried out check content calculating, if with The check content received is inconsistent, then require that sender retransmits.
A kind of communication means based on the exTLV Message Protocol that dynamically can customize the most according to claim 4, its It is characterised by: the computational methods of the check content of described 32 of (3rd) step sending message of described step 3 are:
Being spliced in actual message content before and after 32 bit integrity checking KEY, the content that composition need to be verified, in producing checking After appearance, it is carried out MD5 calculating, it is thus achieved that after 32 character strings, be converted to capitalization;
Wherein, actual message content includes the complete number of message picture and text type, message data byte length and message data content According to.
A kind of communication party based on the exTLV Message Protocol that dynamically can customize the most according to claim 1 and 2 Method, it is characterised in that: the concrete steps receiving message of described step 3 include:
(1) caller receives a complete message, if this message is structure defines message, is then saved in existing structure message fixed In justice chain;If this message is data message, then search the structure message definition currently preserved in press-in stack;
(2) if finding the structure message definition corresponding with described data message, then define data according to this structure message Packet parsing becomes multiple field name and corresponding field value;If not finding the structure message corresponding with described data message Definition, then send structure definition request message, wait to be returned;
(3) analysis result of data message is saved in caching, reads field value for caller;
(4) caller directly obtains each field value by field name, finally discharges temporal cache.
CN201610861399.1A 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol Active CN106254392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610861399.1A CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610861399.1A CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Publications (2)

Publication Number Publication Date
CN106254392A true CN106254392A (en) 2016-12-21
CN106254392B CN106254392B (en) 2020-07-31

Family

ID=57611751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610861399.1A Active CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Country Status (1)

Country Link
CN (1) CN106254392B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109561106A (en) * 2018-12-29 2019-04-02 北京工业大学 A kind of marine communication message real time parsing filter method
CN109617886A (en) * 2018-12-21 2019-04-12 广州市宏大欣电子科技有限公司 Client data encryption method and service end data encryption method based on TCP communication
CN113225320A (en) * 2021-04-21 2021-08-06 南京理工大学 Network message analysis method for keeping user configurable message format secret
CN113329064A (en) * 2021-05-13 2021-08-31 河南中州智慧水利研究院有限公司 Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933479A (en) * 2005-09-16 2007-03-21 华为技术有限公司 Method for transmitting data in communication system and system thereof
CN101188561A (en) * 2007-12-20 2008-05-28 北京大学 Communication method and system for universal service data based on self-defined template
CN101599890A (en) * 2008-06-06 2009-12-09 中兴通讯股份有限公司 Data transmission system in a kind of communication system method of unifying
US8228872B2 (en) * 2009-01-07 2012-07-24 Lg Electronics Inc. Method for performing zone switching in broadband wireless access system
CN102624741A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 TLV (Threshold Limit Value) based data transmission method and system thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933479A (en) * 2005-09-16 2007-03-21 华为技术有限公司 Method for transmitting data in communication system and system thereof
CN101188561A (en) * 2007-12-20 2008-05-28 北京大学 Communication method and system for universal service data based on self-defined template
CN101599890A (en) * 2008-06-06 2009-12-09 中兴通讯股份有限公司 Data transmission system in a kind of communication system method of unifying
US8228872B2 (en) * 2009-01-07 2012-07-24 Lg Electronics Inc. Method for performing zone switching in broadband wireless access system
CN102624741A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 TLV (Threshold Limit Value) based data transmission method and system thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617886A (en) * 2018-12-21 2019-04-12 广州市宏大欣电子科技有限公司 Client data encryption method and service end data encryption method based on TCP communication
CN109617886B (en) * 2018-12-21 2021-07-27 广东宏大欣电子科技有限公司 Client data encryption method and server data encryption method based on TCP communication
CN109561106A (en) * 2018-12-29 2019-04-02 北京工业大学 A kind of marine communication message real time parsing filter method
CN109561106B (en) * 2018-12-29 2021-06-04 北京工业大学 Ship communication message real-time analysis and filtering method
CN113225320A (en) * 2021-04-21 2021-08-06 南京理工大学 Network message analysis method for keeping user configurable message format secret
CN113329064A (en) * 2021-05-13 2021-08-31 河南中州智慧水利研究院有限公司 Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control
CN113329064B (en) * 2021-05-13 2022-11-25 河南中州智慧水利研究院有限公司 Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control

Also Published As

Publication number Publication date
CN106254392B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN106254392A (en) Communication means based on the exTLV Message Protocol that dynamically can customize
Castiglione et al. An asynchronous covert channel using spam
CN103701598B (en) It is a kind of that endorsement method and digital signature device are checked based on SM2 signature algorithms
CN108521331A (en) Hidden information based on source address sends system and sending method
HU223910B1 (en) Method of transmitting information data from a sender to a reciever via a transcoder, method of transcoding information data, method of receiving transcoded information data, sender, receiver and transcoder
US20110320359A1 (en) secure communication method and device based on application layer for mobile financial service
JP6289680B2 (en) Packet transmission device, packet reception device, packet transmission program, and packet reception program
CN111275404B (en) Block chain-based review method, device, equipment and medium
CN103108037B (en) A kind of communication means, Web server and Web communication system
CN107979613A (en) A kind of method and system of guarantee JMS message safety certifications
CN110380842A (en) CAN bus message endorsement method, device and system suitable for wisdom net connection automobile
CN101167331B (en) Method, system and device for transferring network event log protocol message
CN107104919A (en) The processing method of firewall box, SCTP SCTP packet
KR20120063387A (en) Device and method for generating sms message
CN116389051A (en) Lightweight data hidden transmission method based on block chain
CN108270563A (en) A kind of method for interchanging data and system based on SM2 Encryption Algorithm
CN111835519A (en) Covert communication method based on public block chain
CN115694791A (en) QKD-based distribution network and method
FI113924B (en) Procedure, arrangement and apparatus for demonstrating the authenticity of data traffic
CN111193586B (en) Information processing method, packet transport network device and quantum key device
CN111800384A (en) Financial service application management method and device based on block chain
Suryavanshi et al. An improved cryptographic algorithm using UNICODE and universal colors
CN104320778A (en) Integrity protection method for long data stream in wireless sensor network
CN114598508B (en) Hidden information transmission method and device based on Ethernet transaction
Andersson et al. Very Low Bandwidth (Marine) Web Surfing A Fault-Tolerant Content Streaming Web Browsing Solution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant