CN106254392B - Communication method based on dynamically customizable exT L V message transmission protocol - Google Patents

Communication method based on dynamically customizable exT L V message transmission protocol Download PDF

Info

Publication number
CN106254392B
CN106254392B CN201610861399.1A CN201610861399A CN106254392B CN 106254392 B CN106254392 B CN 106254392B CN 201610861399 A CN201610861399 A CN 201610861399A CN 106254392 B CN106254392 B CN 106254392B
Authority
CN
China
Prior art keywords
message
data
definition
content
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610861399.1A
Other languages
Chinese (zh)
Other versions
CN106254392A (en
Inventor
侯俊芳
陆中威
孙涛
姚嵩
丁玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Original Assignee
TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE filed Critical TIANJIN LIGHT INDUSTRY VOCATIONAL TECHNICAL COLLEGE
Priority to CN201610861399.1A priority Critical patent/CN106254392B/en
Publication of CN106254392A publication Critical patent/CN106254392A/en
Application granted granted Critical
Publication of CN106254392B publication Critical patent/CN106254392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Communication Control (AREA)

Abstract

The invention relates to a communication method based on a dynamic self-defined exT L V message transmission protocol, which is technically characterized by comprising the following steps of 1, establishing a secure connection between a client and a server through a KEY verification code calculation method, 2, establishing a dynamic self-defined exT L V message transmission protocol between the client and the server through defining a message format consisting of four parts of message image-text types, message data byte lengths, message data contents and message inspection data for inspecting the three data, and 3, adopting a standard library for issuing, and calling an API (application programming interface) function for realizing the function call of sending and receiving messages based on the dynamic self-defined exT L V message transmission protocol.

Description

Communication method based on dynamically customizable exT L V message transmission protocol
Technical Field
The invention belongs to the technical field of network transmission, and particularly relates to a communication method based on a dynamic self-definable exT L V message transmission protocol.
Background
In the development of various current applications or devices, when point-to-point message transmission is involved, two message transmission methods are usually adopted, one is to adopt a completely independent message format of the application or device, generally, a fixed format with a certain rule is independently designed for message transmission according to the characteristics of self information content, the other is to adopt a basic T L V code, the T L V code is one of BER codes, which is called Type (Type), L ength (length) and Value (Value), and the *** company expands message name and protobuf data on the basis of the above, so as to strengthen the transmission capability.
However, the two message transmission methods have the following problems:
the first message transmission method comprises the following steps: the two transmission parties need to know the meaning of each content transmitted in advance, the composition format of the message needs to be known in the development process, the universality is not realized, and the secondary development is needed for message interpretation;
the second message transmission method comprises the following steps: the method has universality, can obtain the information format significance according to the message name and then obtain the data value from the protobuf, but the method causes data repetition when transmitting the message with the same format every time, and the length of the message name domain is much longer than that of the actually required data domain protobuf, thereby causing the reduction of transmission efficiency and the waste of bandwidth. Meanwhile, the protocol itself does not have a secure transport mechanism.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a communication method based on a dynamic customizable exT L V (extended T L V) message transmission protocol, which has the advantages of reasonable design, strong universality, high safety and high transmission efficiency.
The technical problem to be solved by the invention is realized by adopting the following technical scheme:
a communication method based on a dynamically customizable exT L V message transmission protocol comprises the following steps:
step 1, establishing a secure connection between a client and a server by a KEY calculation verification code method by adopting a secure connection handshake transmission mode of integrity verification KEY;
step 2, establishing a exT L V message transmission protocol which is based on dynamic self-definition and between the client and the server by defining a message format which is composed of four parts of a message image-text type, a message data byte length, a message data content and message inspection data for inspecting the three data;
and 3, issuing by adopting a standard library, and calling an API (application program interface) function to realize function calling of sending and receiving messages based on a dynamic self-defined exT L V message transmission protocol.
Further, the specific steps of step 1 include:
(1) establishing TCP connection between a client and a server;
(2) the server side generates a key pair through an asymmetric encryption algorithm (the RSA algorithm is adopted as default) and sends an asymmetric public key to the client side;
(3) the client generates a random 32-bit string as an integrity verification KEY, encrypts the received asymmetric public KEY and sends the encrypted asymmetric public KEY to the server;
(4) after receiving the encrypted 32-bit integrity verification KEY, the server decrypts the encrypted 32-bit integrity verification KEY by using a generated private KEY;
(5) and the client and the server perform subsequent data transmission according to the synchronized 32-bit integrity verification KEY, and perform integrity verification on the transmitted data message.
Moreover, the message graphics context type of step 2 includes: a structure definition message, a structure definition request message and a data message.
Moreover, the specific step of sending the packet in step 3 includes:
(1) the caller only needs to press the field name, type, length and field value into the sending stack respectively, and arranges all the field names and types pressed into the stack in alphabetical order;
(2) comparing the name and type of all the fields pressed into the stack with the currently stored structural message definition pressed into the stack; if the existing structure message definition is not matched, generating a new structure message definition according to the current push stack field information, storing the new structure message definition in an existing structure message definition chain, and sending a structure definition message; if the existing structure message definition is matched, sending a data message according to the structure message definition;
(3) the sender calculates the 32-bit check content according to the content of the sent data message and the 32-bit integrity verification KEY and attaches the check content to the end of the content of the data message;
(4) after receiving the message, the receiver calculates the check content of the data message by the same method, and if the check content is not consistent with the received check content, the receiver requests the sender to retransmit the data message.
Moreover, the method for calculating the 32-bit check content in the step (3) of sending the packet in the step 3 includes:
splicing the 32-bit integrity verification KEY into the actual message content to form the content to be verified, performing MD5 calculation on the verification content after the verification content is generated, and converting the 32-bit integrity verification KEY into capitalization after a 32-bit string is obtained;
the actual message content includes the complete data of the message image-text type (type), the message data byte length (len) and the message data content (data).
Moreover, the specific step of receiving the packet in step 3 includes:
(1) the caller receives a complete message, if the message is a structure definition message, the message is stored in the existing structure message definition chain; if the message is a data message, searching a currently stored structural message definition in a push stack;
(2) if the structure message definition corresponding to the data message is found, analyzing the data message into a plurality of field names and corresponding field values according to the structure message definition; if the structure message definition corresponding to the data message is not found, sending a structure definition request message, and waiting for returning;
(3) storing the analysis result of the data message into a cache for a caller to read a field value;
(4) the caller directly obtains each field value through the field name, and finally releases the temporary cache.
The invention has the advantages and positive effects that:
1. the invention adopts a safe connection handshake transmission mode of integrity verification KEY, and establishes a safe transmission mechanism by a method of calculating a verification code by the KEY in the connection process; the invention can ensure the integrity of data transmission without encrypting the transmission content and only needing integrity verification, can effectively prevent the transmission data from being falsified and does not need to additionally configure a security component.
2. The invention has universality, does not need to negotiate a password and a data structure in advance, can safely transmit the message and analyze the message format and each component significance through a safe transmission mechanism and a protocol.
3. Each application or equipment of the invention can flexibly define the structure type message format and the data message format according to the self requirement, and the other party of communication can explain the composition value and the meaning of each item according to the message content.
4. The invention has expandability, and can freely expand or define the data type, size and structural composition in the message.
5. In order to realize the definition of a reusable structure and reduce the data transmission quantity, the invention adopts a message design mode of separating a transmission structure from a data value in a protocol, so that the invention can not generate repeated message data contents from the structural design of the protocol.
6. The present invention is applicable to different data types, subject objects and underlying network protocols.
7. The invention does not need to define new transmission protocols and methods for different applications; and a new transmission structure does not need to be defined for each change of transmission content, and convenience is provided for application expansion or upgrading.
8. The invention provides uniform message description and transmission for the integration of heterogeneous data and heterogeneous environment.
9. The developer of the invention only needs to pay attention to the combined transmission and significance of the service data, and does not need to consider a transmission implementation method.
10. The invention can realize the mixed transmission among different applications or devices in the same occasion without organizing the message format in advance.
Drawings
FIG. 1 is a flow chart of a method for establishing a secure connection between a client and a server in accordance with the present invention;
FIG. 2 is a schematic diagram of a message format based on a dynamically customizable exT L V message transmission protocol according to the present invention;
FIG. 3 is a schematic diagram of the format of the message data content (data) portion of the structure definition message of the present invention;
FIG. 4 is a schematic diagram of the format of the message data content (data) portion of the data message of the present invention;
fig. 5 is a diagram illustrating the computation of the structure definition packet and the packet check data (check) portion of the data packet in accordance with the present invention.
Detailed Description
The embodiments of the invention will be described in further detail below with reference to the accompanying drawings:
a communication method based on a dynamically customizable exT L V message transmission protocol comprises the following steps:
step 1, establishing a secure connection between a client and a server by a KEY calculation verification code method by adopting a secure connection handshake transmission mode of integrity verification KEY;
as shown in fig. 1, the step 1 includes the following steps:
(1) establishing TCP connection between a client and a server;
(2) the server side generates a key pair through an asymmetric encryption algorithm (the RSA algorithm is adopted as default) and sends an asymmetric public key to the client side;
(3) the client generates a random 32-bit string as an integrity verification KEY, encrypts the received asymmetric public KEY and sends the encrypted asymmetric public KEY to the server;
(4) after receiving the encrypted 32-bit integrity verification KEY, the server decrypts the encrypted 32-bit integrity verification KEY by using a generated private KEY;
(5) and the client and the server perform subsequent data transmission according to the synchronized 32-bit integrity verification KEY, and perform integrity verification on the transmitted data message.
Step 2, establishing a exT L V message transmission protocol which is based on dynamic self-definition and between the client and the server by defining a message format which is composed of four parts of a message image-text type, a message data byte length, a message data content and message inspection data for inspecting the three data;
each message format based on the dynamically customizable exT L V message transmission protocol, as shown in fig. 2, is composed of four parts:
(1) the type of the message image and text is the type of the message image and text, the length of 1 byte, and three possible values are respectively: "1", "2" and "3";
the message image-text type of the step 2 comprises: a structure definition message, a structure definition request message and a data message.
Wherein, 1 represents a structure definition message; "2" represents a structure definition request message; "3" represents a data message;
(2) message data byte length (len) which is the length of message data byte, namely the length of data part, and occupies 2 bytes;
(3) message data content (data) that is message data content;
(4) the message check data (check) for checking the three data is 32 bytes long for the integrity verification codes of all the data of type, len and data.
The integer length of more than two bytes in the message format adopts the host byte sequence with the low byte at the front and the high byte at the back.
The following describes the structure definition packet, the structure definition request packet, and the data packet, respectively:
(1) structure definition messages:
when the type in the protocol message is 1, the data part is defined by a structure, forms a message format as shown in fig. 3, and consists of a structure number and a plurality of field definitions as shown in the following:
① structure number data No. representing structure number, which is used to uniquely identify the number of each kind of structure, and the application or device is defined separately, occupies 2 bytes, and the data message corresponds to the content of each field domain according to the structure number;
② field type represents field type, 1 byte, dynamically self-definable value already predefined in exT L V message transmission protocol:
1: a BYTE type BYTE or char;
2: unsigned integer of two bytes;
18: signed integer of two bytes;
3: unsigned integer of four bytes;
19: signed integer of four bytes;
4: four byte symbol patterns;
5: unsigned integer of eight bytes;
6: an ANSI string;
22: a UNICODE string;
38: an utf-8 string;
127: self-defining the field type;
③ field name byte length name len, the field name byte length, i.e. the length of the field name part, occupies 1 byte;
④ field name.
(2) Structure definition request message
The structure definition message can be actively sent by a data sending party, and can also be sent to send a request by a receiving party, the message is the request message when the type is 2, and the sending party receives the message and resends the structure definition message. The data part of the structure definition request message only has two bytes, namely the data No. structure number required to be determined by the structure.
(3) Data message
When the type in the protocol message is 3, the data part is a data message, which forms a message format as shown in fig. 4, and consists of a structure number and a plurality of field data as shown in the following:
① structure number data No. the structure number of the data message corresponds to the structure definition message;
② field data byte length value len, the byte length of field data, i.e. the length immediately following field value;
③ field value field data.
And 3, issuing by adopting a standard library, and calling an API (application program interface) function to realize function calling of sending and receiving messages based on a dynamic self-defined exT L V message transmission protocol.
The working process of sending the message is as follows: the caller only needs to press the field name, type, length and field value into the sending stack respectively, and then the calling is carried out;
the method comprises the following specific steps:
(1) the caller only needs to press the field name, type, length and field value into the sending stack respectively, and arranges all the field names and types pressed into the stack in alphabetical order;
(2) comparing the name and type of all the fields pressed into the stack with the currently stored structural message definition pressed into the stack; if the existing structure message definition is not matched, generating a new structure message definition according to the current push stack field information, storing the new structure message definition in an existing structure message definition chain, and sending a structure definition message; if the existing structure message definition is matched, sending a data message according to the structure message definition;
(3) the sender calculates the 32-bit check content according to the content of the sent data message and the 32-bit integrity verification KEY and attaches the check content to the end of the content of the data message;
the 32-bit check content calculation method comprises the following steps:
as shown in fig. 5, the 32-bit integrity verification KEY is spliced into the actual message content to form the content to be verified, and MD5 calculation is performed on the verification content after the verification content is generated, so as to obtain a 32-bit string and convert the 32-bit string into capitalization;
the actual message content includes type, len, and data complete data.
(4) After receiving the message, the receiver calculates the check content of the data message by the same method, and if the check content is not consistent with the received check content, the receiver requests the sender to retransmit the data message.
The working process of receiving the message is as follows: the caller only needs to call the receiving function, the standard library reads the message data from the network interface, analyzes the received message into a plurality of field names and corresponding values, the caller directly obtains each field value through the field name, and finally releases the temporary cache.
The method comprises the following specific steps:
(1) the caller receives a complete message, if the message is a structure definition message, the message is stored in the existing structure message definition chain; if the message is a data message, searching a currently stored structural message definition in a push stack;
(2) if the structure message definition corresponding to the data message is found, analyzing the data message into a plurality of field names and corresponding field values according to the structure message definition; if the structure message definition corresponding to the data message is not found, sending a structure definition request message, and waiting for returning;
(3) storing the analysis result of the data message into a cache for a caller to read a field value;
(4) the caller directly obtains each field value through the field name, and finally releases the temporary cache.
It should be emphasized that the embodiments described herein are illustrative rather than restrictive, and thus the present invention is not limited to the embodiments described in the detailed description, but also includes other embodiments that can be derived from the technical solutions of the present invention by those skilled in the art.

Claims (4)

1. A communication method based on a dynamic self-defined expansion T L V message transmission protocol is characterized by comprising the following steps:
step 1, establishing a secure connection between a client and a server by a KEY calculation verification code method by adopting a secure connection handshake transmission mode of integrity verification KEY;
step 2, establishing a dynamic self-defined expansion T L V-based message transmission protocol between the client and the server by defining a message format consisting of four parts of message image-text type, message data byte length, message data content and message inspection data for inspecting the three data of the message image-text type, the message data byte length and the message data content;
step 3, issuing by adopting a standard library, and calling an API function to realize function calling of sending and receiving messages based on a dynamic self-defined expansion T L V message transmission protocol;
the specific steps of sending the message in the step 3 include:
(1) the caller only needs to press the field name, type, length and field value into the sending stack respectively, and arranges all the field names and types pressed into the stack in alphabetical order;
(2) comparing the name and type of all the fields pressed into the stack with the currently stored structural message definition pressed into the stack; if the existing structure message definition is not matched, generating a new structure message definition according to the current push stack field information, storing the new structure message definition in an existing structure message definition chain, and sending a structure definition message; if the existing structure message definition is matched, sending a data message according to the structure message definition;
(3) the sender calculates the 32-bit check content according to the content of the sent data message and the 32-bit integrity verification KEY and attaches the check content to the end of the content of the data message;
(4) after receiving the message, the receiver calculates the check content of the data message by the same method, and if the check content is not consistent with the received check content, the receiver requests the sender to retransmit the data message;
the specific steps of the step 1 comprise:
(1) establishing TCP connection between a client and a server;
(2) the server side generates a key pair through an asymmetric encryption algorithm and sends an asymmetric public key to the client side;
(3) the client generates a random 32-bit string as an integrity verification KEY, encrypts the received asymmetric public KEY and sends the encrypted asymmetric public KEY to the server;
(4) after receiving the encrypted 32-bit integrity verification KEY, the server decrypts the encrypted 32-bit integrity verification KEY by using a generated private KEY;
(5) and the client and the server perform subsequent data transmission according to the synchronized 32-bit integrity verification KEY, and perform integrity verification on the transmitted data message.
2. The communication method according to claim 1, wherein the message graphics context types of step 2 include a structure definition message, a structure definition request message and a data message.
3. The communication method according to claim 1, wherein the calculation method of the 32-bit check content in the (3) th step of sending the message in the step 3 comprises:
splicing the 32-bit integrity verification KEY into the actual message content to form the content to be verified, performing MD5 calculation on the verification content after the verification content is generated, and converting the 32-bit integrity verification KEY into capitalization after a 32-bit string is obtained;
the actual message content comprises the message image-text type, the message data byte length and the complete data of the message data content.
4. The communication method based on the dynamically customizable extended T L V message transmission protocol according to claim 1, wherein the specific step of receiving the message in the step 3 includes:
(1) the caller receives a complete message, if the message is a structure definition message, the message is stored in the existing structure message definition chain; if the message is a data message, searching a currently stored structural message definition in a push stack;
(2) if the structure message definition corresponding to the data message is found, analyzing the data message into a plurality of field names and corresponding field values according to the structure message definition; if the structure message definition corresponding to the data message is not found, sending a structure definition request message, and waiting for returning;
(3) storing the analysis result of the data message into a cache for a caller to read a field value;
(4) the caller directly obtains each field value through the field name, and finally releases the temporary cache.
CN201610861399.1A 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol Active CN106254392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610861399.1A CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610861399.1A CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Publications (2)

Publication Number Publication Date
CN106254392A CN106254392A (en) 2016-12-21
CN106254392B true CN106254392B (en) 2020-07-31

Family

ID=57611751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610861399.1A Active CN106254392B (en) 2016-09-28 2016-09-28 Communication method based on dynamically customizable exT L V message transmission protocol

Country Status (1)

Country Link
CN (1) CN106254392B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617886B (en) * 2018-12-21 2021-07-27 广东宏大欣电子科技有限公司 Client data encryption method and server data encryption method based on TCP communication
CN109561106B (en) * 2018-12-29 2021-06-04 北京工业大学 Ship communication message real-time analysis and filtering method
CN113225320A (en) * 2021-04-21 2021-08-06 南京理工大学 Network message analysis method for keeping user configurable message format secret
CN113329064B (en) * 2021-05-13 2022-11-25 河南中州智慧水利研究院有限公司 Communication method of Internet of things interaction protocol based on water conservancy data acquisition and control

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933479A (en) * 2005-09-16 2007-03-21 华为技术有限公司 Method for transmitting data in communication system and system thereof
CN100586109C (en) * 2007-12-20 2010-01-27 北京大学 Communication method and system for universal service data based on self-defined template
CN101599890B (en) * 2008-06-06 2011-12-07 中兴通讯股份有限公司 System and method for transmitting data in communication system
KR101595025B1 (en) * 2009-01-07 2016-02-26 엘지전자 주식회사 Method of Zone Switch in a Broadband Wireless Access System
CN102624741A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 TLV (Threshold Limit Value) based data transmission method and system thereof

Also Published As

Publication number Publication date
CN106254392A (en) 2016-12-21

Similar Documents

Publication Publication Date Title
CN106254392B (en) Communication method based on dynamically customizable exT L V message transmission protocol
WO2018177124A1 (en) Service processing method and device, data sharing system and storage medium
CN100586109C (en) Communication method and system for universal service data based on self-defined template
JP5499019B2 (en) File folder transmission over the network
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN108965484A (en) A kind of transmission method of internet of things data, system and terminal
CN111614683B (en) Data processing method, device and system and network card
CN105592121B (en) A kind of RDP data acquisition devices and method
CN107294704B (en) Password generation method, password execution method and terminal
CN102333042A (en) Method, security gateway and system for preventing data leakage
CN101167331B (en) Method, system and device for transferring network event log protocol message
CN109831404B (en) Instant communication system and method compatible with multiple terminals
JP5961471B2 (en) Output comparison method in multiple information systems
CN117201601A (en) Internet of things equipment access method, device, equipment and storage medium
CN105072020B (en) method and system for processing instant communication message
CN115361455B (en) Data transmission storage method and device and computer equipment
CN101465738A (en) Real time monitoring method and system for document transmission
CN115086428B (en) Network request sending method and device and electronic equipment
CN112532603B (en) Cross-domain file exchange leading-in device and method based on exchange authorization file
CN111314203B (en) Communication method, device, medium and electronic equipment
CN102946596A (en) Method and system for preventing resending of short message based on digital signature technology
CN112948277A (en) Fuzzy test case generation system and method based on coupling self-encoder
CN108243172B (en) Method and system for sending verification information
CN109981291A (en) A kind of mixing packet signature method
Zhang et al. Efficient Bloom filter for network protocols using AES instruction set

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant