CN110225046A - Data transmission method, device, electronic equipment and storage medium - Google Patents

Data transmission method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110225046A
CN110225046A CN201910525456.2A CN201910525456A CN110225046A CN 110225046 A CN110225046 A CN 110225046A CN 201910525456 A CN201910525456 A CN 201910525456A CN 110225046 A CN110225046 A CN 110225046A
Authority
CN
China
Prior art keywords
message
data
information
equipment
message header
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910525456.2A
Other languages
Chinese (zh)
Inventor
马振国
潘磊
张明君
吴扬
郭佳
李国宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING XINGDAHAO INFORMATION TECHNOLOGY Co Ltd
Beijing Dahao Technology Co Ltd
Original Assignee
BEIJING XINGDAHAO INFORMATION TECHNOLOGY Co Ltd
Beijing Dahao Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING XINGDAHAO INFORMATION TECHNOLOGY Co Ltd, Beijing Dahao Technology Co Ltd filed Critical BEIJING XINGDAHAO INFORMATION TECHNOLOGY Co Ltd
Priority to CN201910525456.2A priority Critical patent/CN110225046A/en
Publication of CN110225046A publication Critical patent/CN110225046A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Data transmission method, device, electronic equipment and storage medium, it encapsulates data as message transmission, message includes message header and message body, include message header check information and message body check information in message header, first message header is verified after receiving message header, if message header examines errorless verification message body again, otherwise no longer verification message body, it can find the mistake in data transmission in time in this way, be conducive to take timely measure, avoid various contingency questions caused by data transmission fault.Equipment is verified twice by certification and registration and can just be connected into local area network and carry out data transmission, and verification process needs equipment to treat encryption information to be encrypted, the accuracy of certification has been effectively ensured, the equipment for not having permission is strictly prevented to be connected into local area network.

Description

Data transmission method, device, electronic equipment and storage medium
Technical field
This application involves intelligent Manufacturing Technology fields, more particularly to intelligent sewing device or the number of intelligent Weaving device According to transmission method, device, electronic equipment and storage medium.
Background technique
With the development of intelligence manufacture the relevant technologies, sewing production equipment (sewing machine, embroidery machine etc.) or weaving are given birth to It produces equipment (horizontal loom, glove knitting machine, hosiery machine etc.) and forms local area network, the production method that production equipment is managed is got over by server Come more universal.Server is managed collectively production equipment, and instruction can be assigned to production equipment, monitors different productions in real time The state of equipment is reasonably distributed or is dispatched to the production capacity of production equipment.Server can replace worker to production equipment Routine Management is carried out, worker only needs the insurmountable problem of processing server.Number of workers needed for factory greatly reduces in this way, Effectively reduce production cost.
Compared with home-use or routine office work local area network, the local area network of production equipment composition has visibly different spy Point.First is that production equipment is located at workshop, the integrated environment of workshop is unfavorable for local area network and builds, and disturbing factor is extremely more, it is difficult to ensure that The problems such as stability of LAN data transmission, network interruption, data packetloss, is difficult to avoid that.For sewing production equipment or spinning The workshop above problem where knitting production equipment is more prominent.Second is that a large amount of production equipment concentrates on the little region of area, Some of production equipments are likely to be located at range that local area network signal can cover but do not have the permission for being connected into local area network.Clothes The local area network of the request be connected into to(for) production equipment of business device must be verified strictly, otherwise will lead to and do not have the production equipment of permission very It is connected into local area network to rogue device, seriously affects the stable and safe of local area network.
Data transmission method provided by the present application encapsulates data as message, the setting message header verification letter in message header Breath and message body check information, first verify message header, and message header verification is errorless again to verify message body, in this way may be used To find the problems in data transmission in time.In addition, production equipment will verifying can be connected into office twice by certification and registration Domain net has fully ensured that the equipment for not having permission can not be connected into local area network.
Summary of the invention
The application provides a kind of data transmission method, device, electronic equipment and storage medium, can find that data pass in time It is the problems in defeated, and strictly prevent the equipment for not having permission to be connected into local area network and carry out data transmission.
In a first aspect, the application provides a kind of data transmission method, comprising:
It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes mark letter Breath, message attributes information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header school It tests errorless, then verifies the message body further according to the message body check information;If the message header verification is wrong, no longer root The message body is verified according to the message body check information.
Further, the message attributes information includes message length information and message type information.
Further, the data transmission method further include:
Data equipment to be transmitted is authenticated;
Examination allows the registration information errorless by the registration information of the data to be transmitted equipment of the certification The data to be transmitted equipment carry out data transmission.
It is further, described that data equipment to be transmitted is authenticated, comprising:
After receiving the request that the data to be transmitted equipment carries out data transmission, the transmission of Xiang Suoshu data to be transmitted equipment is recognized Information is demonstrate,proved, the authentication information includes the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if described Encryption information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
Second aspect, the application provide a kind of data transmission device, including data transmitter-receiver set, the data transmitter-receiver set It is sent for encapsulating data for message, the message includes message header and message body, and the message header includes identification information, disappears Cease attribute information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header school It tests errorless, then verifies the message body further according to the message body check information;If the message header verification is wrong, no longer root The message body is verified according to the message body check information.
Further, the data transmission device further includes certification register device, and the certification register device is for treating Transmission data equipment is authenticated;Examination by the registration information of the data to be transmitted equipment of the certification, allows institute The errorless data to be transmitted equipment of registration information is stated to carry out data transmission.
Further, the card register device includes authentication device, and the authentication device is described to be transmitted for receiving After the request that data equipment carries out data transmission, Xiang Suoshu data to be transmitted equipment sends authentication information, the authentication information packet Include the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if described Encryption information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
The third aspect, the application provide a kind of electronic equipment, including processor and memory;The memory is for storing Computer instruction;The processor is for executing the computer instruction stored in the memory, so that the electronic equipment Execute the described in any item data transmission methods of above-mentioned first aspect.
Fourth aspect, the application provide a kind of computer readable storage medium, the computer-readable recording medium storage There is computer program, the computer program is performed realization such as the described in any item transmission side datas of above-mentioned first aspect Method.
Data transmission method, device, electronic equipment and storage medium provided by the present application encapsulate data as message hair It send, message includes message header and message body, includes message header check information and message body check information in message header, receives message First message header is verified after head, if message header examines errorless verification message body again, otherwise no longer verification message body, in this way may be used To find the mistake in data transmission in time, is conducive to take timely measure, avoid various subsequent caused by data transmission fault Problem.Equipment is verified twice by certification and registration and can just be connected into local area network and carry out data transmission, and verification process needs equipment pair Confidential information to be added is encrypted, and the accuracy of certification has been effectively ensured, the equipment for not having permission is strictly prevented to be connected into local area network.
Detailed description of the invention
Illustrate the application or technical solution in the prior art in order to clearer, to description the application or prior art institute The attached drawing that need to be used simply is introduced.To those skilled in the art, without any creative labor, It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of data transmission method in the embodiment of the present application one.
Fig. 2 is the flow chart of the method authenticated in the embodiment of the present application two to data equipment to be transmitted.
The configuration diagram of data transmission device in Fig. 3 the embodiment of the present application two.
The hardware structural diagram of electronic equipment in Fig. 4 the embodiment of the present application three.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the technology of the application Scheme carries out clear, complete description.Obviously, described embodiment be the application a part and not all embodiment. Based on the embodiment in the application, those skilled in the art are obtained every other without making creative work The range that the application protects after authorization all should belong in embodiment.
Term " first ", " second ", " third " in following claims, specification and Figure of description etc. (if present) is to be used to distinguish similar objects, and be not construed as describing specifically sequence or precedence, above-mentioned " the One ", " second ", " third " etc. can be interchanged when not influencing semantic accuracy.In addition, the terms "include", "comprise", " having " and similar any deformation, semanteme be it is non-exclusive, for example, the process, method comprising a series of steps or units, System, product or equipment, semanteme those of are not limited to clearly to list step or unit, can also include unclear Other step or units listing or intrinsic for these process, methods, product or equipment.
Technical scheme is suitable for by sewing production equipment (sewing machine, embroidery machine etc.) or textile manufacturing equipment The local area network or similar system of (horizontal loom, glove knitting machine, hosiery machine etc.) and server composition.In the case where not causing ambiguity, Production equipment is referred to as equipment.Server refers to the high-performance computer that can be managed by network to multiple devices. After equipment is connected into local area network, it will necessarily be communicated with server or by server with other equipment, transmit data.To protect Normal communication is demonstrate,proved, needs to preset communication protocol, to realize that certification also needs to preset encryption rule, above-mentioned communication protocols View, encryption rule etc. are only open to the equipment for having the right to be connected into local area network.
Embodiment one:
Fig. 1 is the flow chart of one data transmission method of the embodiment of the present application, and data transmission method includes following steps.
S101, data equipment to be transmitted is authenticated;Examination has passed through the registration letter of the data to be transmitted equipment of certification Breath, the data to be transmitted equipment for allowing registration information errorless carry out data transmission.
This step can be considered as a previous step.Certain equipment is not yet connected into local area network, cannot mutually pass with server Transmission of data, but the equipment wishes to be connected into local area network, then the equipment is known as data to be transmitted equipment.Basic association based on local area network View, such as ICP/IP protocol, data to be transmitted equipment can send to server and request, such as TCP request, expression are wished to be connected into The intention of local area network.After server receives above-mentioned request, data equipment to be transmitted is authenticated according to certification rule.Certification can To be considered as whether server examination data to be transmitted equipment has the qualification for being connected into local area network, a specific authentication method is visible The description of embodiment two.
After data to be transmitted equipment is by certification, it is also necessary to send registration letter according to the pact orientation server of communication protocol Breath.Information relevant to local area network, such as IP address, subnet mask, the default gateway of equipment etc. are generally comprised in registration information, It further include information of equipment itself, such as a certain parameter of device name, equipment etc..Note of the server to data equipment to be transmitted Volume information is checked, if registration information is errorless, the success of data to be transmitted facility registration.Registration can be considered as server and recognize On the basis of card, the specifying information of data to be transmitted equipment is obtained, it is final to confirm data to be transmitted equipment as LAN node Qualification.After succeeding in registration, data to be transmitted equipment could normally be connected into local area network, become a node in local area network, can To be communicated according to communication protocol with server or by server with other equipment, transmit data.
The result of certification and registration can be fed back to data to be transmitted equipment by server.It has not yet registered successfully to be transmitted Data equipment can only request to be authenticated or registered to server, and server is not responding to any other data of the equipment and passes Defeated request, the equipment can not carry out normal data transmission and communication with server.It can be effectively prevented in this way and do not have networking The equipment of qualification is connected into local area network, fully ensures that the stability and safety of local area network operation.
S102, encapsulate data as message transmission, message includes message header and message body, message header include identification information, Message attributes information, message header check information and message body check information.
Data transmission procedure, the node that data are sent in local area network will need the data transmitted to be encapsulated as message transmission, disappear Breath can be considered as the basic unit carried out data transmission between different nodes in local area network.Message includes message header and message body, is disappeared Breath body is the data for really needing transmission in local area network between different nodes, and message header has the effects that identify message, verification message, For guaranteeing the correct transmission of message, but the data of message header itself are not required for receiving the node of data.
The format of message header can be provided in usual communication protocol, after the format of message header is fixed, according to the data lattice of setting Formula or data length read the data in message header, can obtain all information of message header.One typical message header, packet Include identification information, message attributes information, message header check information and message body check information.Identification information is to disappear for identification The mark for ceasing head, is normally at the initial position of message header.Identification information generally uses the character string of certain length, above-mentioned character String, without other semantemes in communication protocol, is not easy and other data obfuscations in message in this way other than as identification information.
Message attributes information generally includes message length information and message type information.Message length information is for recording (if the data length that communication protocol defines message header is constant, the data length of message header is not necessarily to the data length of message body Re-record) or message header and message body data length summation.Message type information is for recording according to preset point The type for the message that class method provides.By identification information and message length information, message body data can be accurately identified.It determines Message type information is convenient for the subsequent processing to data in message.
Message header check information and message body check information generally use check code, such as CRC (Cyclic Redundancy Check, cyclic redundancy check) code.Message header check information is used to verify the data of message header, and Message body check information is for verifying the data of message body.
S103, after receiving message header, according to message header check information verification message head;If message header verification is errorless, then According to message body check information verification message body;If message header verification is wrong, do not disappear further according to the verification of message body check information Cease body.
The encapsulating structure of message, usual message header is before message body.Message header is generally first sent when sending message to send out again Send message body.Corresponding, it is typically also first to receive the message that the node that data are received in local area network, which receives a piece of news, Message header.After identifying message header by identification information, school is carried out according to data of the message header check information to message header first It tests.The data check of a kind of situation, message header is errorless, then then carries out further according to data of the message body check information to message body Verification.If the data check of message header is errorless and the data check of message body is also errorless, normal to handle message body data;And If the data check of message header is errorless but the data check of message body is wrong, according to the rule process of agreement.Another feelings The data check of condition, message header is wrong, then does not verify further according to data of the message body check information to message body, directly press Rule process as agreed.Since the integrated environment of workshop is complicated, disturbing factor is extremely more, is difficult accurate judgement data transmission procedure In which specific data there is mistake, the node that usually all agreement receives data will verify wrong message and all abandon, notice The node for sending data retransmits message.
The step S101 of the present embodiment, data to be transmitted equipment, which needs to verify twice by certification and registration, can just be connected into office Domain net carries out data transmission, and the equipment for not having permission is strictly prevented to be connected into local area network.Step S102 and S103 can be sent out in time Mistake in existing data transmission, is conducive to take timely measure, avoids various contingency questions caused by data transmission fault.
Embodiment two:
Fig. 2 is the flow chart for the method that the embodiment of the present application two authenticates data equipment to be transmitted, to number to be transmitted It include following steps according to the method that equipment is authenticated.
S201, it after receiving the request that data to be transmitted equipment carries out data transmission, sends and authenticates to data to be transmitted equipment Information, authentication information include the confidential information to be added for no less than setting data volume.
Data to be transmitted equipment described in one step S101 of embodiment sends to server and requests, such as TCP request, table Up to the intention for wishing to be connected into local area network, above-mentioned request or similar request can be considered as data to be transmitted equipment and carry out data transmission Request.Any equipment can issue the request carried out data transmission to server, and before certification and registration, server can not Whether the equipment that confirmation issues the request carried out data transmission has the qualification for being connected into local area network.Receive asking of carrying out data transmission After asking, server sends authentication information to the equipment for issuing the request, and the format of authentication information provides in communication protocol, authenticates It will include the confidential information to be added for no less than setting data volume in information.Confidential information to be added is usually character string to be encrypted, setting Data volume is generally no less than 8 bytes.
Server and have the right the equipment known communication protocols for being connected into local area network and preset encryption rule.It has the right to connect The equipment for entering local area network can correctly encrypt confidential information to be added according to the encryption rule of setting, will treat encryption information and encrypt to be formed Encryption information according to format as defined in communication protocol reply server.And the equipment for having no right to be connected into local area network is unaware of encryption rule Then, be difficult to treat encryption information and correctly encrypt, in addition due to be unaware of communication protocol and can not authentication information to server just Really response.
If confidential information to be added is too simple, the equipment for having no right to be connected into local area network is replied also at random has certain probability lucky It is consistent with correct encrypted result.In addition, with network attack, the development of technologies such as crack, rogue device (such as hacker uses Data theft equipment, network attack equipment etc.) ability of correct encryption information is obtained under the premise of being unaware of encryption rule Also increasingly stronger.In order to guarantee the reliability of certification, reduces obtain correctly adding under the premise of being unaware of encryption rule as far as possible The probability of confidential information, it is desirable that the data volume of confidential information to be added is sufficiently large, cannot be less than the lowest threshold of setting.
The encryption information for the treatment of that S202, examination data to be transmitted equipment return encrypts the encryption information to be formed, if encryption letter Breath meets the encryption rule of setting, then data to be transmitted equipment passes through certification.
The authentication information that server issues, data to be transmitted equipment is according to preset encryption rule in authentication information Confidential information to be added encrypted, by include treat encryption information encrypt the encryption information to be formed return information return service Device.The return information of data to be transmitted equipment should meet format specified in communication protocol, and otherwise server can not be by the reply Information is identified as the reply to authentication information, it is likely that directly abandons using the return information as error message.
Meet in communication protocol before prescribed form in return information of the data to be transmitted equipment to server authentication information It puts, server checks the encryption information in return information.If encryption information meets the encryption rule of setting, data to be transmitted Equipment can treat encryption information and correctly encrypt, then data to be transmitted equipment is by certification, and otherwise data to be transmitted equipment is obstructed Cross certification.
The method that the present embodiment authenticates data equipment to be transmitted greatly reduces the equipment for having no right to be connected into local area network By the probability of certification, the accuracy of authentication result is effectively ensured, to ensure the stability and safety of local area network operation Property.
Embodiment three:
Fig. 3 is the configuration diagram of two data transmission device of the embodiment of the present application.Data transmission device 30, including data are received Transmitting apparatus 31 and certification register device 32.Data transmitter-receiver set 31 is sent for encapsulating data for message, and message includes message Head and message body, message header include identification information, message attributes information, message header check information and message body check information; After receiving message header, according to message header check information verification message head;If message header verification is errorless, verified further according to message body Information checking message body;If message header verification is wrong, not further according to message body check information verification message body.
Specifically, data transmitter-receiver set 31 includes sub-device data sending device 311 and data sink 312.Data Sending device 311 is sent for encapsulating data for message, and message includes message header and message body, and message header includes mark letter Breath, message attributes information, message header check information and message body check information.Data sink 312 is for receiving message After head, according to message header check information verification message head;If message header verification is errorless, verified further according to message body check information Message body;If message header verification is wrong, not further according to message body check information verification message body.
Certification register device 32 is for authenticating data equipment to be transmitted;Examination has passed through the data to be transmitted of certification The registration information of equipment, the data to be transmitted equipment for allowing the registration information errorless carry out data transmission.
Specifically, certification register device 32 includes sub-device authentication device 321 and register device 322.Authentication device 321 is used Authenticate in data equipment to be transmitted, specific authentication method: receive that data to be transmitted equipment carries out data transmission asks After asking, authentication information is sent to data to be transmitted equipment, authentication information includes the confidential information to be added for no less than setting data volume;It looks into The encryption information for the treatment of for testing the return of data to be transmitted equipment encrypts the encryption information to be formed, if encryption information meets the encryption of setting Rule, then data to be transmitted equipment passes through certification.Register device 322 is used to check the data to be transmitted equipment for having passed through certification Registration information, the data to be transmitted equipment for allowing the registration information errorless carry out data transmission.
The specific implementation of device described in the present embodiment can be found in content described in embodiment one or embodiment two, The realization principle and technical effect are similar, and details are not described herein again for the present embodiment.
Device described in the present embodiment, it is thus understood that the functional module structure mainly realized by modes such as computer programs Frame.The division of the present embodiment described device is corresponding with method and step described in embodiment one or embodiment two, only a kind of Logical function partition, there may be another division manner in actual implementation, for example, multiple devices can be combined or integrated into it is another A device or some devices can be ignored or not execute.
The embodiment of physical unit as the carrying entity of device described in the present embodiment has diversity, Ke Yisuo Some devices are distributed in a physical unit, can also be distributed on different physical units with one or several devices.Carrying dress The physical unit set can be electrically connected by modes such as cable, wireless networks, not necessarily have direct physical contact or machinery even Connect relationship.
In the application, mutual data transmission is needed between server and equipment, requires to be arranged on server and equipment Data transmitter-receiver set 31.Server is responsible for the management of local area network, and certification register device 32 is generally located on server.
Example IV:
Fig. 4 is the hardware structural diagram of three electronic equipment of the embodiment of the present application.As shown in figure 4, the electronic equipment 40 wraps It includes: at least one processor 41 and memory 42.Optionally, which further includes bus 43, processor 41 and storage Device 42 is connected by bus 43.
In the operational process of electronic equipment, memory 42 is stored with computer instruction, at least one processor 41 executes The computer instruction that the memory 42 stores, so that electronic equipment 40 is executed as described in embodiment one or embodiment two Method.
The specific implementation procedure of electronic equipment 40 can be found in embodiment one or embodiment two, realization principle and technology effect Seemingly, details are not described herein again for the present embodiment for fruit.
In the present embodiment, it should be appreciated that processor can be central processing unit (English: Central Processing Unit, referred to as: CPU), it can also be other general processors, digital signal processor (English: Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application Specific Integrated Circuit, referred to as: ASIC) etc..General processor can be microprocessor or other conventional processors.Execute memory The computer instruction of 52 storages, directly can execute completion by hardware processor, or by the hardware and software mould in processor Block combination executes completion.
Memory may include high speed RAM memory, it is also possible to and it further include non-volatile memories NVM, for example, at least one Magnetic disk storage.
Bus can be industry standard architecture (Industry Standard Architecture, ISA) bus, outer Portion's apparatus interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..Bus can be divided into address bus, data/address bus, control Bus etc..For convenient for indicating, the bus in illustrations is not limited only to a bus or a type of bus.
Embodiment five:
The application also provides a kind of computer readable storage medium, and calculating is stored in the computer readable storage medium Machine program, the computer program are performed, and realize the method as described in embodiment one or embodiment two.
Above-mentioned computer readable storage medium can by any kind of volatibility or non-volatile memory device or it Combination realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, fast Flash memory, disk or CD etc..Readable storage medium storing program for executing can be general or special purpose computer or similar electronic equipment can Any usable medium of access.
Computer readable storage medium is coupled to processor, to enable a processor to read letter from above-mentioned medium Breath, and matter write-in information can be given an account of upwards.Certainly, above-mentioned medium is also possible to the component part of processor.Processor and can Read storage medium can be located at specific integrated circuit (Application Specific Integrated Circuits, referred to as: ASIC in).Certainly, processor and readable storage medium storing program for executing can also be used as discrete assembly and be present in electronic equipment.
If technical scheme realize in the form of software and as product when selling or using, can store and counting In calculation machine read/write memory medium.Based on this understanding, all or part of the technical solution of the application can be produced with software The form of product embodies, which is stored in a storage medium, including computer program or some instructions. The computer software product makes computer equipment (can be personal computer, server, the network equipment or similar electronics Equipment) execute all or part of the steps of the embodiment of the present application one or two the method for embodiment.Storage medium above-mentioned can To be USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various media that can store program code such as magnetic or disk.
It will be understood by those skilled in the art that realizing that all or part of the steps described in embodiment one or embodiment two can To be completed by hardware relevant to program instruction.Program above-mentioned can store in computer-readable storage medium, The program is performed, and executes the step of all or part described in embodiment one or embodiment two.Storage medium above-mentioned Including the various media that can store program code such as ROM, RAM, magnetic or disk.
Finally it should be noted that each embodiment of the application is only to illustrate the technical solution of the application, rather than it is carried out Limitation.Although each embodiment is described in detail the application, it will be appreciated by those skilled in the art that it still can be with Modify to technical solution documented by each embodiment of the application, or some or all of the technical features are carried out etc. With replacement, these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution Range.

Claims (9)

1. data transmission method, which is characterized in that the described method includes:
It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes identification information, disappears Cease attribute information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header verifies nothing Accidentally, then the message body is verified further according to the message body check information;If the message header verification is wrong, not further according to institute It states message body check information and verifies the message body.
2. the method according to claim 1, wherein the message attributes information include message length information and Message type information.
3. the method according to claim 1, wherein the data transmission method further include:
Data equipment to be transmitted is authenticated;
Examination allows the institute that the registration information is errorless by the registration information of the data to be transmitted equipment of the certification Data to be transmitted equipment is stated to carry out data transmission.
4. according to the method described in claim 3, it is characterized in that, described authenticate data equipment to be transmitted, comprising:
After receiving the request that the data to be transmitted equipment carries out data transmission, Xiang Suoshu data to be transmitted equipment sends certification letter Breath, the authentication information include the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if the encryption Information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
5. data transmission device, which is characterized in that described device includes: data transmitter-receiver set, and the data transmitter-receiver set is used for It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes identification information, message category Property information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header verifies nothing Accidentally, then the message body is verified further according to the message body check information;If the message header verification is wrong, not further according to institute It states message body check information and verifies the message body.
6. device according to claim 5, which is characterized in that the data transmission device further includes certification register device, The certification register device is for authenticating data equipment to be transmitted;Examination passes through the number to be transmitted of the certification According to the registration information of equipment, the data to be transmitted equipment for allowing the registration information errorless carries out data transmission.
7. device according to claim 6, which is characterized in that the card register device includes authentication device, the certification Device is for after receiving the request that the data to be transmitted equipment carries out data transmission, the transmission of Xiang Suoshu data to be transmitted equipment to be recognized Information is demonstrate,proved, the authentication information includes the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if the encryption Information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
8. electronic equipment, which is characterized in that the electronic equipment includes processor and memory, and the memory is based on storing The instruction of calculation machine, the processor is for executing the computer instruction stored in the memory so that the electronic equipment executes The described in any item data transmission methods of claim 1-4.
9. computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the computer journey Sequence, which is performed, realizes data transmission method according to any one of claims 1-4.
CN201910525456.2A 2019-06-18 2019-06-18 Data transmission method, device, electronic equipment and storage medium Pending CN110225046A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910525456.2A CN110225046A (en) 2019-06-18 2019-06-18 Data transmission method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910525456.2A CN110225046A (en) 2019-06-18 2019-06-18 Data transmission method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110225046A true CN110225046A (en) 2019-09-10

Family

ID=67817690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910525456.2A Pending CN110225046A (en) 2019-06-18 2019-06-18 Data transmission method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110225046A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111722940A (en) * 2020-05-22 2020-09-29 百富计算机技术(深圳)有限公司 Message transmission method, terminal equipment and transmission system based on asynchronous serial port
CN113301130A (en) * 2021-05-11 2021-08-24 深圳市星火数控技术有限公司 Communication method and device of sewing equipment controller, terminal equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1988703A (en) * 2006-12-01 2007-06-27 深圳市飞天网景通讯有限公司 Method for realizing information interactive operation based on shootable mobile terminal
CN103237293A (en) * 2012-11-19 2013-08-07 北京新岸线移动多媒体技术有限公司 Method and device for sending and receiving messages
CN104426992A (en) * 2013-09-10 2015-03-18 中国科学院沈阳自动化研究所 Information transmission method based on material transmission system
WO2016198015A1 (en) * 2015-11-02 2016-12-15 中兴通讯股份有限公司 Packet transmission method, apparatus, and system
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109088874A (en) * 2018-08-21 2018-12-25 北京睦合达信息技术股份有限公司 A kind of data transmission method and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1988703A (en) * 2006-12-01 2007-06-27 深圳市飞天网景通讯有限公司 Method for realizing information interactive operation based on shootable mobile terminal
CN103237293A (en) * 2012-11-19 2013-08-07 北京新岸线移动多媒体技术有限公司 Method and device for sending and receiving messages
CN104426992A (en) * 2013-09-10 2015-03-18 中国科学院沈阳自动化研究所 Information transmission method based on material transmission system
WO2016198015A1 (en) * 2015-11-02 2016-12-15 中兴通讯股份有限公司 Packet transmission method, apparatus, and system
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109088874A (en) * 2018-08-21 2018-12-25 北京睦合达信息技术股份有限公司 A kind of data transmission method and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111722940A (en) * 2020-05-22 2020-09-29 百富计算机技术(深圳)有限公司 Message transmission method, terminal equipment and transmission system based on asynchronous serial port
CN111722940B (en) * 2020-05-22 2024-04-16 百富计算机技术(深圳)有限公司 Message transmission method, terminal equipment and transmission system based on asynchronous serial port
CN113301130A (en) * 2021-05-11 2021-08-24 深圳市星火数控技术有限公司 Communication method and device of sewing equipment controller, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
US7673334B2 (en) Communication system and security assurance device
US11743721B2 (en) Protection of a communication channel between a security module and an NFC circuit
RU2451398C2 (en) Methods for authenticating, encrypting and decoding client terminal identifier and apparatus for realising said methods
CN105282157B (en) A kind of secure communication control method
CN108512846A (en) Mutual authentication method and device between a kind of terminal and server
CN106302346A (en) The safety certifying method of API Calls, device, system
CN104584507B (en) It is authenticated by the first equipment of switching station pair
CN106452782A (en) Method and system for producing a secure communication channel for terminals
CN106888084A (en) A kind of quantum fort machine system and its authentication method
CN108667780A (en) A kind of identity authentication method, system and server and terminal
US20220150260A1 (en) Hardware Detection Method and Apparatus, Device, and Storage Medium
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN101075869B (en) Method for realizing network certification
CN106603487A (en) Method for safe improvement of TLS protocol processing based on CPU space-time isolation mechanism
US20080244716A1 (en) Telecommunication system, telecommunication method, terminal thereof, and remote access server thereof
CN106657032A (en) System and method for realizing identity identification and data authentication based on security medium confidential short message
CN110225046A (en) Data transmission method, device, electronic equipment and storage medium
CN105429991A (en) Efficient data transmission method for mobile terminal
KR101051420B1 (en) Secure one time password generating apparatus and method
CN107623665A (en) A kind of authentication method, equipment and system
WO2016058306A1 (en) Optical module authentication method and apparatus
CN108024243A (en) A kind of eSIM is caught in Network Communication method and its system
CN106712939A (en) Offline key transmission method and device
CN105610872B (en) Internet-of-things terminal encryption method and internet-of-things terminal encryption device
CN106790279A (en) A kind of mutual authentication method and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190910

RJ01 Rejection of invention patent application after publication