CN117176830A - Adaptive conversion method of extensible multi-format protocol password application data - Google Patents

Adaptive conversion method of extensible multi-format protocol password application data Download PDF

Info

Publication number
CN117176830A
CN117176830A CN202311452456.7A CN202311452456A CN117176830A CN 117176830 A CN117176830 A CN 117176830A CN 202311452456 A CN202311452456 A CN 202311452456A CN 117176830 A CN117176830 A CN 117176830A
Authority
CN
China
Prior art keywords
protocol
format
data
converter
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311452456.7A
Other languages
Chinese (zh)
Other versions
CN117176830B (en
Inventor
侯纪祥
张海峰
刘会议
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanwei Xin'an Technology Co ltd
Original Assignee
Sanwei Xin'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanwei Xin'an Technology Co ltd filed Critical Sanwei Xin'an Technology Co ltd
Priority to CN202311452456.7A priority Critical patent/CN117176830B/en
Publication of CN117176830A publication Critical patent/CN117176830A/en
Application granted granted Critical
Publication of CN117176830B publication Critical patent/CN117176830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Communication Control (AREA)

Abstract

The invention discloses an adaptation conversion method of extensible multi-format protocol password application data, which comprises the following steps: the analysis module inputs or updates protocol analysis rules and deploys the protocol analysis rules to the converter chain and the adapter chain; each node of the adapter chain and the converter chain is uniquely loaded with a protocol analysis rule, node by node is identified and adapted with a protocol analysis rule corresponding to an unknown format protocol, the unknown format protocol is identified and analyzed by utilizing the protocol analysis rule, and recoded into a target format protocol; and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the converter chain, and recoding the bottom protocol data structure into the customized format protocol according to the customized format protocol requirement parameter by utilizing the protocol analysis rule. The invention updates the protocol analysis rules on the adapter chain and the converter chain through the protocol analysis module, completes the adaptation and conversion between the multi-format protocols, and improves the compatibility of the system password application.

Description

Adaptive conversion method of extensible multi-format protocol password application data
Technical Field
The invention relates to the technical field of information security of password application and equipment, in particular to an adaptation conversion method of extensible multi-format protocol password application data.
Background
Along with the rapid development of the information age, the protection of information security and privacy is more and more emphasized, cryptography plays an important role in the fields of the Internet, government networks and the like, the application of cryptography is gradually increased, and the combination of algorithms and protocols is also more and more abundant. At this time, the correctness of the interactive information between the cryptographic applications becomes critical.
Although international and national regulations regulate some general protocols from the aspect of regulation, the combination of technologies which are often rapidly developed and algorithms at the front edge cannot be exerted after being bound by standards; some historical applications or reasons of unreliability, make the application impractical to implement according to industry standards. Both of these reasons have led to the advent of proprietary protocols, including keys, certificates (chains), signatures, ciphertexts, digital envelopes, etc., with more or less nonstandard structures.
The existence of the nonstandard structure causes great difficulty for access and adaptation of the password application, especially when a plurality of applications with private protocols are simultaneously docked, a long time is needed for inputting manpower and material resources to reform related applications, however, the reform and compatibility can introduce risks in development, such as compatibility of historical functions, invasion of main business logic, performance reduction, business complexity increase and the like.
Further innovations and improvements in software technology and even architecture are needed to address the problems caused by the various format adaptations and conversions.
The existing solution is to add a configuration file for format analysis based on system construction, each option corresponds to analysis of a data structure, and each user with a self-defined structure needs to configure a specific configuration option. The technical scheme has the following defects: (1) When new format adaptation occurs, the user needs to be subjected to overall upgrade of the service; (2) the business invasiveness to the system is relatively large; (3) have an effect on the stability of the system; (4) inability to adapt two or more formats;
the existing solution scheme II is to add judgment and adaptation of other formats on the basis of system construction. The format judgment is performed by using the noodle type judgment of if else. The technical scheme has the following defects as well: (1) When new format adaptation occurs, the user needs to be subjected to overall upgrade of the service; (2) very invasive to the system's traffic; (3) have an effect on the stability of the system; (4) has a large impact on service performance; (5) not facilitating maintenance of the code; (6) the business complexity is greatly increased.
Therefore, how to provide an adaptive conversion method for extensible multi-format protocol cryptographic application data with strong compatibility and small influence on system service is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
Aiming at the current research situation and the existing problems, the invention provides an extensible multi-format protocol password application data adaptation and conversion method, protocol analysis rules on an adapter chain and a converter chain are updated through a protocol analysis module, adaptation and conversion among multi-format protocols are completed, and compatibility of system password application is improved.
The invention provides an adaptation conversion method of extensible multi-format protocol password application data, which is based on a system architecture comprising an analysis module, a converter chain and an adapter chain; the method comprises the following steps:
inputting or updating protocol analysis rules to the analysis module, deploying the protocol analysis rules to the converter chain and the adapter chain, wherein different format protocols uniquely correspond to one protocol analysis rule;
each adapter node of the adapter chain uniquely loads a protocol analysis rule, receives an unknown format protocol, identifies and adapts the protocol analysis rule corresponding to the unknown format protocol node by node, acquires the adapter node where the adapter node is located, identifies and analyzes the unknown format protocol by utilizing the protocol analysis rule at the current adapter node, and recodes the unknown format protocol into a target format protocol;
each converter node of the converter chain is uniquely loaded with a protocol analysis rule, receives the customized format protocol demand parameter and the bottom layer protocol data structure, searches the protocol analysis rule meeting the requirement of the bottom layer protocol data structure in the converter chain, acquires the converter node where the converter node is located, and recodes the bottom layer protocol data structure into the customized format protocol according to the customized format protocol demand parameter by utilizing the protocol analysis rule at the current converter node.
Preferably, the protocol parsing rule includes a plurality of expandable coding format arrays, and specifically includes one or more of the following expandable coding formats in combination:
protocol format array: identifying a protocol of current data which needs to be decoded currently;
structural parameter bit length array: a unique identification mark for identifying the current protocol, including the total length of the data bit, the data bit conversion value or the data bit conversion value range;
key parameter information array: information of object oriented properties in a protocol data structure includes location, effective data length, or overall data length.
Preferably, the coding format array comprises numbers, letters and/or words.
Preferably, the scalable coding format array includes:
expanding a plurality of coding format arrays in a single protocol analysis rule; and/or
Multiple array data contents are expanded in a single encoding format array.
Preferably, the step of receiving the custom format protocol requirements parameter and the underlying protocol data structure performed by the converter chain includes:
receiving a custom format protocol requirement parameter and a known fixed format protocol name;
acquiring a fixed format protocol from a cryptographic entity according to the known fixed format protocol name;
and taking the fixed format protocol as a bottom protocol data structure, and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the converter chain.
Preferably, the step of searching the converter chain for the protocol parsing rule meeting the requirement of the underlying protocol data structure, performed by the converter chain, includes:
storing the data corresponding to the < converter name and the protocol parsing rule > in a Map table in a form of < key and value >, wherein the converter name comprises a fixed format protocol name which is parsed and converted by a current converter node, and the fixed format protocol is used as a bottom protocol data structure;
and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the Map table.
Preferably, the step of recoding the underlying protocol data structure into a custom format protocol according to the custom format protocol requirement parameter using the protocol parsing rule includes:
analyzing the bottom layer protocol data structure by utilizing the protocol analysis rule to acquire data bits to be modified, modification parameters and coding representation formats specified in the customized format protocol demand parameters;
inserting or replacing the corresponding data bit of the parsed bottom layer protocol data structure with the modification parameter to complete attribute recombination and obtain a data string;
the data string is reorganized and encoded according to the encoding representation format required by the protocol parsing rules.
Preferably, the cryptographic entity on which the multi-format protocol is based includes, but is not limited to: the system comprises a cipher machine, an encryption machine, an SSL VPN gateway, an IPSec VPN gateway, a KMS, a signature verification server and a financial data cipher machine.
Compared with the prior art, the invention has the following beneficial effects:
the invention effectively solves the problems of poor compatibility, business invasion to main business, performance reduction, business complexity improvement and the like in the process of adapting to various nonstandard protocols when the password is applied.
The invention can avoid the great adjustment of codes or applications in the cryptographic entities when the cryptographic entities are converted and docked. When nonstandard protocol formats or specifications appear, only the protocols are converted into the formats recognized by the program after being interpreted, so that the coupling between the password entities is greatly reduced.
When a new protocol format appears, only the protocol analysis rule in the analysis module needs to be updated, so that systematic code modification of an adaptation process and a conversion process is avoided, convenience is provided for the butt joint of multi-protocol cipher entities, the working time of expanding the format and the protocol is greatly saved, and the upgrading times of the cipher entities for adapting various protocols are reduced.
In the process of mutual conversion, the unique format judgment is adopted before conversion and the conversion is directly attempted, so that the influence on the performance is very little, and a great amount of performance loss is not caused.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is apparent that the drawings in the following description are only embodiments of the present invention, and that other drawings may be obtained from the provided drawings without inventive labor for those skilled in the art.
Fig. 1 is a timing chart of an adaptive conversion method of extensible multi-format protocol cryptographic application data according to an embodiment of the present invention;
FIG. 2 is a system architecture diagram of a parsing module, a converter chain, and an adapter chain provided by an embodiment of the present invention;
FIG. 3 is a workflow diagram of an adapter node provided by an embodiment of the present invention;
FIG. 4 is a logic diagram of an implementation of an adapter chain provided by an embodiment of the present invention;
FIG. 5 is a workflow diagram of an adapter chain provided by an embodiment of the present invention;
FIG. 6 is a flowchart of the operation of a converter node provided by an embodiment of the invention;
FIG. 7 is a logic diagram of an implementation of a converter chain provided by an embodiment of the present invention;
fig. 8 is a flowchart of the operation of a converter chain provided by an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides an adaptation conversion method of extensible multi-format protocol password application data, which is based on a system architecture comprising an analysis module, a converter chain and an adapter chain; the adapter chain is constructed based on a plurality of adapter modules and responsibility chain modules, and each adapter node corresponds to one adapter module; the converter chain is constructed by a plurality of converter modules and responsibility chain modules, and each converter node corresponds to one converter module.
The adapter module and the converter module are upper level logic units of the parsing module.
The responsibility chain module is a concatenation of single-step logic for the adapter module and the converter module.
The adapter chain is formed by connecting each single-step module in a responsibility chain mode, abstracting two upper-layer methods, realizing the two upper-layer methods by each single-step module, adding the single-step modules into the responsibility chain, circularly using a judgment rule to judge a unique protocol, and carrying out adaptation operation after confirming the protocol.
The converter chain stores each single-step module, acquires the single-protocol module through parameters, and converts the corresponding protocol if the single-step module exists.
As shown in fig. 1-2, the method of the present embodiment includes the following steps:
inputting or updating protocol analysis rules to the analysis module, deploying the protocol analysis rules to the converter chain and the adapter chain, wherein different format protocols uniquely correspond to one protocol analysis rule;
each adapter node of the adapter chain uniquely loads a protocol analysis rule, receives an unknown format protocol, recognizes and adapts the protocol analysis rule corresponding to the unknown format protocol node by node, acquires the adapter node where the adapter node is located, recognizes and analyzes the unknown format protocol by utilizing the protocol analysis rule at the current adapter node, and recodes the unknown format protocol into a target format protocol;
each converter node of the converter chain is uniquely loaded with a protocol analysis rule, receives the customized format protocol demand parameters and the underlying protocol data structure, searches the protocol analysis rule meeting the requirements of the underlying protocol data structure in the converter chain, acquires the converter node where the protocol analysis rule is located, and recodes the underlying protocol data structure into the customized format protocol according to the customized format protocol demand parameters by utilizing the protocol analysis rule at the current converter node.
In one embodiment, the system architecture is initialized before the protocol adaptation or the protocol conversion is performed, and the specific initialization process is as follows:
the analysis module inputs or updates the protocol analysis rules, deploys the protocol analysis rules to the converter chain and the adapter chain, and the converter chain and the adapter chain execute logic code filling on the protocol analysis rules to obtain complete logic codes of protocol adaptation and protocol conversion.
In one embodiment, the scalable coding format array comprises:
expanding a plurality of coding format arrays in a single protocol analysis rule; and/or
Multiple array data contents are expanded in a single encoding format array.
The concrete explanation is as follows:
the protocol analysis module is designed to complete the identification and conversion of the self-defined protocol without changing the code, and the module enables the tool to update the protocol analysis rule array expression of a certain protocol to a relevant file only when a new expansion protocol format of the certain protocol appears on the basis of the protocol covered by the existing protocol analysis rule in the use process, if the current code can only analyze the enumeration value of A, and when the A needs to expand a certain data bit, the A protocol analysis rule code needs to be expanded. When a protocol format which cannot be resolved by the current code appears, namely, the protocol format belongs to a protocol which is not covered by the existing protocol resolution rule, a new code resolution rule needs to be updated, for example: the current code can only analyze A, B, C three enumerated values, and when D appears, the D protocol analysis rule code needs to be expanded. The updating process only needs to update the protocol analysis module program.
In one embodiment, the protocol parsing rules are expressed in a specialized formula that contains protocol format, main structure bit length, key parameter information, and a judgment uniquely identifying the protocol, where the protocol uses simplified numbers, letters, or words to represent different meanings and information, which are extensible, in order to achieve complete parsing of the protocol.
The protocol parsing rule includes a plurality of scalable coding format arrays, specifically including one or more combinations of the following scalable coding formats:
protocol format array: identifying a protocol of current data which needs to be decoded currently;
structural parameter bit length array: a unique identification mark for identifying the current protocol, including the total length of the data bit, the data bit conversion value or the data bit conversion value range;
key parameter information array: information of object oriented properties in a protocol data structure includes location, effective data length, or overall data length.
Protocol parsing rules are illustrated as follows:
the following description and examples are not in order or ordered, but are merely illustrative (each component has an independent and uniquely expressed meaning, no order requirement):
SM2 public key:
{([HEX]),([len:132],[BITS-0-4:L-256]),([BITS-0-4-4],[X-36-32-64],[Y-100-32-64])};
SM2 private key:
{([HEX]),([len:68],[BITS-0-4:L-256]),[D-36-32-64]};
RSA public key:
{([HEX]),([len:516],[BITS-0-4:L-2048=<>=1024]),([M-4-256-256],[E-260-256-256])};
RSA private key:
{([HEX]),([len:1412],[BITS-0-4:L-2048=<>=1024]),([M-4-256-256],[E-260-256-256],[D-516-256-256],[PRIME-772-256-256],[PEXP-1028-256-256],[COEF-1284-128-128])}。
introduction and description of structure:
(1) Taking the first array as an encoding format array as an example, a protocol that current data currently needs to be decoded is identified.
[ Base64, HEX ] identifies that the protocol requires first solving Base64 and then HEX encoding to obtain the final structure array;
[ HEX ] identifies that the protocol requires first decoding HEX code to obtain the final structure array;
[] If the space is empty, the structure array can be obtained without any decoding.
(2) Taking the unique identification of the second array to identify the data as an example, a protocol may be uniquely determined by the array identification.
[ len:132] represents that the total length of data of the protocol is 132;
[ BITS-0-4:L-256] indicates that the bit 0-4 of the protocol takes the small end conversion value and then is 256;
[ BITS-0-4:L-1024= < > = 2048] means that the 0 th bit to the 4 th bit of the protocol takes the small end conversion value and then is between 1024 and 2048, and is a closed interval.
(3) Taking the third and fourth arrays as examples, the current object-oriented attribute position in the structure array, the effective data length and the overall data length are shown.
[ X-36-32-64] means that the X data of the SM2 key starts from the 36 th bit of the array, the valid data is 32 bits, and the total data length is 64;
y-100-32-64 indicates that the Y data of the SM2 key starts from the 100 th bit of the array, the valid data is 32 bits, and the total data length is 64 bits.
(4) If there are multiple data lengths, the array is increased according to the physical condition until the required data is expressed.
As shown in fig. 3-5, the specific implementation process of the protocol adaptation is as follows:
the user inputs a protocol in an unknown format to a system architecture entry, the system acquires an adapter name, wherein the adapter name comprises a protocol name which is recognized and analyzed by a current adapter node, a protocol analysis rule corresponding to the protocol in the unknown format is recognized and adapted node by node, the adapter node where the adapter node is positioned is acquired, the protocol in the unknown format is analyzed by the current adapter node through the protocol analysis rule, recoded into the protocol in the target format according to the preset target protocol configuration, and the recoded protocol is returned to the user.
As shown in fig. 6-8, the protocol conversion is implemented by:
the user inputs the custom format protocol requirement parameter and the underlying protocol data structure into the system architecture entry, wherein the underlying protocol data structure is a base protocol for customization, for example, the user requirement is further personalized customization based on a certain protocol format of the SM2 public key. Searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in a converter chain, acquiring a converter node where the protocol analysis rule is located, recoding the bottom protocol data structure into a customized format protocol according to the customized format protocol requirement parameter by using the protocol analysis rule in the current converter node, and returning the recoded protocol to a user.
In this embodiment, the step of the converter chain for receiving the custom format protocol requirement parameter and the underlying protocol data structure includes:
receiving a custom format protocol requirement parameter and a known fixed format protocol name;
acquiring a fixed format protocol from the cryptographic entity according to the known fixed format protocol name;
and taking the fixed format protocol as a bottom protocol data structure, and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in a converter chain.
In this embodiment, the step of searching, by the converter chain, for a protocol parsing rule that meets the requirement of the underlying protocol data structure in the converter chain includes:
storing the data corresponding to the < converter name and the protocol analysis rule > in a Map table in a form of < key and value >, wherein the converter name comprises a fixed format protocol name which is analyzed and converted by the current converter node, and the fixed format protocol is used as a bottom protocol data structure;
and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the Map table.
In this embodiment, the step of recoding the underlying protocol data structure into the custom format protocol according to the custom format protocol requirement parameter using the protocol parsing rule includes:
analyzing the bottom layer protocol data structure by utilizing a protocol analysis rule to obtain data bits to be modified, modification parameters and a coding representation format specified in the customized format protocol demand parameters;
inserting or replacing corresponding data bits of the parsed bottom layer protocol data structure with modification parameters to complete attribute recombination and obtain a data string;
the data string is reorganized and encoded according to the encoding representation format required by the protocol parsing rules.
It should be noted that, the conversion process is to reversely encode the data of the underlying protocol data structure according to the protocol parsing rule. The following examples illustrate:
the custom format requirement x starts at bit 4 of the underlying protocol data structure and is 256 in length, the x attribute will be placed between bits 4-230 during conversion. If x in the required format is 128 bits and the length is 128 bits, x is placed between 128-256 bits during conversion, and after the reorganization attribute is finished, the string of data is reorganized and encoded according to the coding representation format required by the rule.
The present invention may be used for bridging between cryptographic devices and cryptographic entities including, but not limited to, cryptographic machines, encryptors, SSL VPN gateways, IPSec VPN gateways, KMSs, signature verification servers, financial data cryptographic machines, and the like.
By converting data of different specifications and formats of different cryptographic entities into specifications and formats recognizable by the cryptographic device; the fixed specification and format output by the cryptographic device may also be converted to the specification and format required by the cryptographic entity.
The above describes in detail an adaptation conversion method of extensible multi-format protocol cryptographic application data, and specific examples are applied to illustrate the principles and embodiments of the present invention, where the above description of the embodiments is only for helping to understand the method and core ideas of the present invention; meanwhile, as those skilled in the art will vary in the specific embodiments and application scope according to the idea of the present invention, the present disclosure should not be construed as limiting the present invention in summary.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Claims (8)

1. An adaptive conversion method of extensible multi-format protocol cryptographic application data is based on a system architecture comprising an parsing module, a converter chain and an adapter chain; the method is characterized in that: the method comprises the following steps:
inputting or updating protocol analysis rules to the analysis module, deploying the protocol analysis rules to the converter chain and the adapter chain, wherein different format protocols uniquely correspond to one protocol analysis rule;
each adapter node of the adapter chain uniquely loads a protocol analysis rule, receives an unknown format protocol, identifies and adapts the protocol analysis rule corresponding to the unknown format protocol node by node, acquires the adapter node where the adapter node is located, identifies and analyzes the unknown format protocol by utilizing the protocol analysis rule at the current adapter node, and recodes the unknown format protocol into a target format protocol;
each converter node of the converter chain is uniquely loaded with a protocol analysis rule, receives the customized format protocol demand parameter and the bottom layer protocol data structure, searches the protocol analysis rule meeting the requirement of the bottom layer protocol data structure in the converter chain, acquires the converter node where the converter node is located, and recodes the bottom layer protocol data structure into the customized format protocol according to the customized format protocol demand parameter by utilizing the protocol analysis rule at the current converter node.
2. The method for adapting and converting extensible multi-format protocol cryptogram application data according to claim 1, wherein the protocol parsing rule comprises a plurality of extensible coding format arrays, and specifically comprises one or more of the following combinations of extensible coding formats:
protocol format array: identifying a protocol of current data which needs to be decoded currently;
structural parameter bit length array: a unique identification mark for identifying the current protocol, including the total length of the data bit, the data bit conversion value or the data bit conversion value range;
key parameter information array: information of object oriented properties in a protocol data structure includes location, effective data length, or overall data length.
3. The method of claim 2, wherein the encoding format array comprises numbers, letters and/or words.
4. The method for adaptive conversion of extensible multi-format protocol cryptographic application data of claim 1, wherein the extensible encoding format array comprises:
expanding a plurality of coding format arrays in a single protocol analysis rule; and/or the number of the groups of groups,
multiple array data contents are expanded in a single encoding format array.
5. The method of claim 1, wherein the step of receiving custom format protocol requirements parameters and underlying protocol data structures performed by the converter chain comprises:
receiving a custom format protocol requirement parameter and a known fixed format protocol name;
acquiring a fixed format protocol from a cryptographic entity according to the known fixed format protocol name;
and taking the fixed format protocol as a bottom protocol data structure, and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the converter chain.
6. The method for adaptive conversion of extensible multi-format protocol cryptographic application data according to claim 1, wherein the step of the converter chain performing a search for protocol parsing rules satisfying the requirements of the underlying protocol data structure in the converter chain comprises:
storing the data corresponding to the < converter name and the protocol parsing rule > in a Map table in a form of < key and value >, wherein the converter name comprises a fixed format protocol name which is parsed and converted by a current converter node, and the fixed format protocol is used as a bottom protocol data structure;
and searching a protocol analysis rule meeting the requirement of the bottom protocol data structure in the Map table.
7. The method for adapting and converting extensible multi-format protocol cryptographic application data according to claim 1, wherein said step of recoding said underlying protocol data structure into a custom format protocol according to said custom format protocol requirement parameter using said protocol parsing rule comprises:
analyzing the bottom layer protocol data structure by utilizing the protocol analysis rule to acquire data bits to be modified, modification parameters and coding representation formats specified in the customized format protocol demand parameters;
inserting or replacing the corresponding data bit of the parsed bottom layer protocol data structure with the modification parameter to complete attribute recombination and obtain a data string;
the data string is reorganized and encoded according to the encoding representation format required by the protocol parsing rules.
8. A method of adapting conversion of extensible multi-format protocol cryptographic application data according to claim 1, wherein the cryptographic entities on which the multi-format protocol is based include, but are not limited to: the system comprises a cipher machine, an encryption machine, an SSL VPN gateway, an IPSec VPN gateway, a KMS, a signature verification server and a financial data cipher machine.
CN202311452456.7A 2023-11-03 2023-11-03 Adaptive conversion method of extensible multi-format protocol password application data Active CN117176830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311452456.7A CN117176830B (en) 2023-11-03 2023-11-03 Adaptive conversion method of extensible multi-format protocol password application data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311452456.7A CN117176830B (en) 2023-11-03 2023-11-03 Adaptive conversion method of extensible multi-format protocol password application data

Publications (2)

Publication Number Publication Date
CN117176830A true CN117176830A (en) 2023-12-05
CN117176830B CN117176830B (en) 2024-01-26

Family

ID=88930294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311452456.7A Active CN117176830B (en) 2023-11-03 2023-11-03 Adaptive conversion method of extensible multi-format protocol password application data

Country Status (1)

Country Link
CN (1) CN117176830B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000332847A (en) * 1999-05-20 2000-11-30 Nec Corp Protocol processing unit
CN102231675A (en) * 2011-06-23 2011-11-02 中国电子科技集团公司第三十四研究所 Protocol adaptation network element and using method thereof in communication sub-network
CN102802139A (en) * 2012-07-10 2012-11-28 无锡航天飞邻测控技术有限公司 Gateway data adapting system and method of Internet of Things
CN104598425A (en) * 2013-10-31 2015-05-06 中国石油天然气集团公司 General multiprocessor parallel calculation method and system
CN105245521A (en) * 2015-10-14 2016-01-13 海能达通信股份有限公司 Protocol format conversion method and device and interface platform
US20160119261A1 (en) * 2013-12-27 2016-04-28 Entefy Inc. Apparatus and method for multi-format and multi-protocol group messaging
CN112511416A (en) * 2020-11-23 2021-03-16 四川长虹电器股份有限公司 Rule-based data communication protocol conversion system, decoding method and encoding method
CN113938537A (en) * 2021-10-09 2022-01-14 北京天地和兴科技有限公司 Method for expanding protocol in industrial control network based on protocol tree identification and deep analysis
CN114205423A (en) * 2022-02-17 2022-03-18 联信弘方(北京)科技股份有限公司 Method, device, equipment and medium for adapting private protocol based on IPMI (intelligent platform management interface) protocol
CN114564430A (en) * 2022-02-24 2022-05-31 杭州华澜微电子股份有限公司 Conversion device, conversion equipment and conversion method
CN116055368A (en) * 2023-01-12 2023-05-02 广州助蜂网络科技有限公司 Method and device for communication by using custom protocol

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000332847A (en) * 1999-05-20 2000-11-30 Nec Corp Protocol processing unit
CN102231675A (en) * 2011-06-23 2011-11-02 中国电子科技集团公司第三十四研究所 Protocol adaptation network element and using method thereof in communication sub-network
CN102802139A (en) * 2012-07-10 2012-11-28 无锡航天飞邻测控技术有限公司 Gateway data adapting system and method of Internet of Things
CN104598425A (en) * 2013-10-31 2015-05-06 中国石油天然气集团公司 General multiprocessor parallel calculation method and system
US20160119261A1 (en) * 2013-12-27 2016-04-28 Entefy Inc. Apparatus and method for multi-format and multi-protocol group messaging
CN105245521A (en) * 2015-10-14 2016-01-13 海能达通信股份有限公司 Protocol format conversion method and device and interface platform
CN112511416A (en) * 2020-11-23 2021-03-16 四川长虹电器股份有限公司 Rule-based data communication protocol conversion system, decoding method and encoding method
CN113938537A (en) * 2021-10-09 2022-01-14 北京天地和兴科技有限公司 Method for expanding protocol in industrial control network based on protocol tree identification and deep analysis
CN114205423A (en) * 2022-02-17 2022-03-18 联信弘方(北京)科技股份有限公司 Method, device, equipment and medium for adapting private protocol based on IPMI (intelligent platform management interface) protocol
CN114564430A (en) * 2022-02-24 2022-05-31 杭州华澜微电子股份有限公司 Conversion device, conversion equipment and conversion method
CN116055368A (en) * 2023-01-12 2023-05-02 广州助蜂网络科技有限公司 Method and device for communication by using custom protocol

Also Published As

Publication number Publication date
CN117176830B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
US7043686B1 (en) Data compression apparatus, database system, data communication system, data compression method, storage medium and program transmission apparatus
CN112511416A (en) Rule-based data communication protocol conversion system, decoding method and encoding method
US20080189545A1 (en) Method and system for certificate revocation list pre-compression encoding
CN113194126B (en) Transverse federal learning model construction method based on blockchain
CN110602252B (en) Block chain enhanced open Internet of things access architecture
CN105141681B (en) The synchronous method and device of RPKI files
CN111738359A (en) Two-party decision tree training method and system
CN108038184A (en) A kind of date storage method and system based on block chain, a kind of intelligent block chain
CN104852813B (en) The on-demand loading method and system of TR069 Parameter nodes in family gateway equipment
CN103152401B (en) Mobile terminal and carry out the method, system and the cloud server that log in by it
CN111597527A (en) Intelligent contract system based on redis protocol
CN112989018A (en) File automatic open identification method and system based on semantic analysis
CN111507083A (en) Text analysis method, device, equipment and storage medium
CN104618919A (en) Method for testing sensing node identifier resolution consistency of sensor network
CN117176830B (en) Adaptive conversion method of extensible multi-format protocol password application data
WO2014040488A1 (en) Method and device for guaranteeing consistency of planning data
CN106789416A (en) The recognition methods of industrial control system specialized protocol and system
CN110598007B (en) Bill file processing method, device, medium and electronic equipment
CN110276665A (en) Electricity power engineering purchase of goods and materials demand declaration method based on big data
CN108494613B (en) System and method for testing interconnection and intercommunication among police digital cluster systems
CN111159999B (en) Method and device for filling word slot, electronic equipment and storage medium
CN115842861A (en) Edge connection device adaptation method, device and computer readable storage medium
CN113904961B (en) User behavior identification method, system, equipment and storage medium
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
CN112230889A (en) Method for making software development coding specification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant