CN110225046A - Data transmission method, device, electronic equipment and storage medium - Google Patents
Data transmission method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110225046A CN110225046A CN201910525456.2A CN201910525456A CN110225046A CN 110225046 A CN110225046 A CN 110225046A CN 201910525456 A CN201910525456 A CN 201910525456A CN 110225046 A CN110225046 A CN 110225046A
- Authority
- CN
- China
- Prior art keywords
- message
- data
- information
- equipment
- message header
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Data transmission method, device, electronic equipment and storage medium, it encapsulates data as message transmission, message includes message header and message body, include message header check information and message body check information in message header, first message header is verified after receiving message header, if message header examines errorless verification message body again, otherwise no longer verification message body, it can find the mistake in data transmission in time in this way, be conducive to take timely measure, avoid various contingency questions caused by data transmission fault.Equipment is verified twice by certification and registration and can just be connected into local area network and carry out data transmission, and verification process needs equipment to treat encryption information to be encrypted, the accuracy of certification has been effectively ensured, the equipment for not having permission is strictly prevented to be connected into local area network.
Description
Technical field
This application involves intelligent Manufacturing Technology fields, more particularly to intelligent sewing device or the number of intelligent Weaving device
According to transmission method, device, electronic equipment and storage medium.
Background technique
With the development of intelligence manufacture the relevant technologies, sewing production equipment (sewing machine, embroidery machine etc.) or weaving are given birth to
It produces equipment (horizontal loom, glove knitting machine, hosiery machine etc.) and forms local area network, the production method that production equipment is managed is got over by server
Come more universal.Server is managed collectively production equipment, and instruction can be assigned to production equipment, monitors different productions in real time
The state of equipment is reasonably distributed or is dispatched to the production capacity of production equipment.Server can replace worker to production equipment
Routine Management is carried out, worker only needs the insurmountable problem of processing server.Number of workers needed for factory greatly reduces in this way,
Effectively reduce production cost.
Compared with home-use or routine office work local area network, the local area network of production equipment composition has visibly different spy
Point.First is that production equipment is located at workshop, the integrated environment of workshop is unfavorable for local area network and builds, and disturbing factor is extremely more, it is difficult to ensure that
The problems such as stability of LAN data transmission, network interruption, data packetloss, is difficult to avoid that.For sewing production equipment or spinning
The workshop above problem where knitting production equipment is more prominent.Second is that a large amount of production equipment concentrates on the little region of area,
Some of production equipments are likely to be located at range that local area network signal can cover but do not have the permission for being connected into local area network.Clothes
The local area network of the request be connected into to(for) production equipment of business device must be verified strictly, otherwise will lead to and do not have the production equipment of permission very
It is connected into local area network to rogue device, seriously affects the stable and safe of local area network.
Data transmission method provided by the present application encapsulates data as message, the setting message header verification letter in message header
Breath and message body check information, first verify message header, and message header verification is errorless again to verify message body, in this way may be used
To find the problems in data transmission in time.In addition, production equipment will verifying can be connected into office twice by certification and registration
Domain net has fully ensured that the equipment for not having permission can not be connected into local area network.
Summary of the invention
The application provides a kind of data transmission method, device, electronic equipment and storage medium, can find that data pass in time
It is the problems in defeated, and strictly prevent the equipment for not having permission to be connected into local area network and carry out data transmission.
In a first aspect, the application provides a kind of data transmission method, comprising:
It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes mark letter
Breath, message attributes information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header school
It tests errorless, then verifies the message body further according to the message body check information;If the message header verification is wrong, no longer root
The message body is verified according to the message body check information.
Further, the message attributes information includes message length information and message type information.
Further, the data transmission method further include:
Data equipment to be transmitted is authenticated;
Examination allows the registration information errorless by the registration information of the data to be transmitted equipment of the certification
The data to be transmitted equipment carry out data transmission.
It is further, described that data equipment to be transmitted is authenticated, comprising:
After receiving the request that the data to be transmitted equipment carries out data transmission, the transmission of Xiang Suoshu data to be transmitted equipment is recognized
Information is demonstrate,proved, the authentication information includes the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if described
Encryption information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
Second aspect, the application provide a kind of data transmission device, including data transmitter-receiver set, the data transmitter-receiver set
It is sent for encapsulating data for message, the message includes message header and message body, and the message header includes identification information, disappears
Cease attribute information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header school
It tests errorless, then verifies the message body further according to the message body check information;If the message header verification is wrong, no longer root
The message body is verified according to the message body check information.
Further, the data transmission device further includes certification register device, and the certification register device is for treating
Transmission data equipment is authenticated;Examination by the registration information of the data to be transmitted equipment of the certification, allows institute
The errorless data to be transmitted equipment of registration information is stated to carry out data transmission.
Further, the card register device includes authentication device, and the authentication device is described to be transmitted for receiving
After the request that data equipment carries out data transmission, Xiang Suoshu data to be transmitted equipment sends authentication information, the authentication information packet
Include the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if described
Encryption information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
The third aspect, the application provide a kind of electronic equipment, including processor and memory;The memory is for storing
Computer instruction;The processor is for executing the computer instruction stored in the memory, so that the electronic equipment
Execute the described in any item data transmission methods of above-mentioned first aspect.
Fourth aspect, the application provide a kind of computer readable storage medium, the computer-readable recording medium storage
There is computer program, the computer program is performed realization such as the described in any item transmission side datas of above-mentioned first aspect
Method.
Data transmission method, device, electronic equipment and storage medium provided by the present application encapsulate data as message hair
It send, message includes message header and message body, includes message header check information and message body check information in message header, receives message
First message header is verified after head, if message header examines errorless verification message body again, otherwise no longer verification message body, in this way may be used
To find the mistake in data transmission in time, is conducive to take timely measure, avoid various subsequent caused by data transmission fault
Problem.Equipment is verified twice by certification and registration and can just be connected into local area network and carry out data transmission, and verification process needs equipment pair
Confidential information to be added is encrypted, and the accuracy of certification has been effectively ensured, the equipment for not having permission is strictly prevented to be connected into local area network.
Detailed description of the invention
Illustrate the application or technical solution in the prior art in order to clearer, to description the application or prior art institute
The attached drawing that need to be used simply is introduced.To those skilled in the art, without any creative labor,
It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of data transmission method in the embodiment of the present application one.
Fig. 2 is the flow chart of the method authenticated in the embodiment of the present application two to data equipment to be transmitted.
The configuration diagram of data transmission device in Fig. 3 the embodiment of the present application two.
The hardware structural diagram of electronic equipment in Fig. 4 the embodiment of the present application three.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the technology of the application
Scheme carries out clear, complete description.Obviously, described embodiment be the application a part and not all embodiment.
Based on the embodiment in the application, those skilled in the art are obtained every other without making creative work
The range that the application protects after authorization all should belong in embodiment.
Term " first ", " second ", " third " in following claims, specification and Figure of description etc.
(if present) is to be used to distinguish similar objects, and be not construed as describing specifically sequence or precedence, above-mentioned " the
One ", " second ", " third " etc. can be interchanged when not influencing semantic accuracy.In addition, the terms "include", "comprise",
" having " and similar any deformation, semanteme be it is non-exclusive, for example, the process, method comprising a series of steps or units,
System, product or equipment, semanteme those of are not limited to clearly to list step or unit, can also include unclear
Other step or units listing or intrinsic for these process, methods, product or equipment.
Technical scheme is suitable for by sewing production equipment (sewing machine, embroidery machine etc.) or textile manufacturing equipment
The local area network or similar system of (horizontal loom, glove knitting machine, hosiery machine etc.) and server composition.In the case where not causing ambiguity,
Production equipment is referred to as equipment.Server refers to the high-performance computer that can be managed by network to multiple devices.
After equipment is connected into local area network, it will necessarily be communicated with server or by server with other equipment, transmit data.To protect
Normal communication is demonstrate,proved, needs to preset communication protocol, to realize that certification also needs to preset encryption rule, above-mentioned communication protocols
View, encryption rule etc. are only open to the equipment for having the right to be connected into local area network.
Embodiment one:
Fig. 1 is the flow chart of one data transmission method of the embodiment of the present application, and data transmission method includes following steps.
S101, data equipment to be transmitted is authenticated;Examination has passed through the registration letter of the data to be transmitted equipment of certification
Breath, the data to be transmitted equipment for allowing registration information errorless carry out data transmission.
This step can be considered as a previous step.Certain equipment is not yet connected into local area network, cannot mutually pass with server
Transmission of data, but the equipment wishes to be connected into local area network, then the equipment is known as data to be transmitted equipment.Basic association based on local area network
View, such as ICP/IP protocol, data to be transmitted equipment can send to server and request, such as TCP request, expression are wished to be connected into
The intention of local area network.After server receives above-mentioned request, data equipment to be transmitted is authenticated according to certification rule.Certification can
To be considered as whether server examination data to be transmitted equipment has the qualification for being connected into local area network, a specific authentication method is visible
The description of embodiment two.
After data to be transmitted equipment is by certification, it is also necessary to send registration letter according to the pact orientation server of communication protocol
Breath.Information relevant to local area network, such as IP address, subnet mask, the default gateway of equipment etc. are generally comprised in registration information,
It further include information of equipment itself, such as a certain parameter of device name, equipment etc..Note of the server to data equipment to be transmitted
Volume information is checked, if registration information is errorless, the success of data to be transmitted facility registration.Registration can be considered as server and recognize
On the basis of card, the specifying information of data to be transmitted equipment is obtained, it is final to confirm data to be transmitted equipment as LAN node
Qualification.After succeeding in registration, data to be transmitted equipment could normally be connected into local area network, become a node in local area network, can
To be communicated according to communication protocol with server or by server with other equipment, transmit data.
The result of certification and registration can be fed back to data to be transmitted equipment by server.It has not yet registered successfully to be transmitted
Data equipment can only request to be authenticated or registered to server, and server is not responding to any other data of the equipment and passes
Defeated request, the equipment can not carry out normal data transmission and communication with server.It can be effectively prevented in this way and do not have networking
The equipment of qualification is connected into local area network, fully ensures that the stability and safety of local area network operation.
S102, encapsulate data as message transmission, message includes message header and message body, message header include identification information,
Message attributes information, message header check information and message body check information.
Data transmission procedure, the node that data are sent in local area network will need the data transmitted to be encapsulated as message transmission, disappear
Breath can be considered as the basic unit carried out data transmission between different nodes in local area network.Message includes message header and message body, is disappeared
Breath body is the data for really needing transmission in local area network between different nodes, and message header has the effects that identify message, verification message,
For guaranteeing the correct transmission of message, but the data of message header itself are not required for receiving the node of data.
The format of message header can be provided in usual communication protocol, after the format of message header is fixed, according to the data lattice of setting
Formula or data length read the data in message header, can obtain all information of message header.One typical message header, packet
Include identification information, message attributes information, message header check information and message body check information.Identification information is to disappear for identification
The mark for ceasing head, is normally at the initial position of message header.Identification information generally uses the character string of certain length, above-mentioned character
String, without other semantemes in communication protocol, is not easy and other data obfuscations in message in this way other than as identification information.
Message attributes information generally includes message length information and message type information.Message length information is for recording
(if the data length that communication protocol defines message header is constant, the data length of message header is not necessarily to the data length of message body
Re-record) or message header and message body data length summation.Message type information is for recording according to preset point
The type for the message that class method provides.By identification information and message length information, message body data can be accurately identified.It determines
Message type information is convenient for the subsequent processing to data in message.
Message header check information and message body check information generally use check code, such as CRC (Cyclic
Redundancy Check, cyclic redundancy check) code.Message header check information is used to verify the data of message header, and
Message body check information is for verifying the data of message body.
S103, after receiving message header, according to message header check information verification message head;If message header verification is errorless, then
According to message body check information verification message body;If message header verification is wrong, do not disappear further according to the verification of message body check information
Cease body.
The encapsulating structure of message, usual message header is before message body.Message header is generally first sent when sending message to send out again
Send message body.Corresponding, it is typically also first to receive the message that the node that data are received in local area network, which receives a piece of news,
Message header.After identifying message header by identification information, school is carried out according to data of the message header check information to message header first
It tests.The data check of a kind of situation, message header is errorless, then then carries out further according to data of the message body check information to message body
Verification.If the data check of message header is errorless and the data check of message body is also errorless, normal to handle message body data;And
If the data check of message header is errorless but the data check of message body is wrong, according to the rule process of agreement.Another feelings
The data check of condition, message header is wrong, then does not verify further according to data of the message body check information to message body, directly press
Rule process as agreed.Since the integrated environment of workshop is complicated, disturbing factor is extremely more, is difficult accurate judgement data transmission procedure
In which specific data there is mistake, the node that usually all agreement receives data will verify wrong message and all abandon, notice
The node for sending data retransmits message.
The step S101 of the present embodiment, data to be transmitted equipment, which needs to verify twice by certification and registration, can just be connected into office
Domain net carries out data transmission, and the equipment for not having permission is strictly prevented to be connected into local area network.Step S102 and S103 can be sent out in time
Mistake in existing data transmission, is conducive to take timely measure, avoids various contingency questions caused by data transmission fault.
Embodiment two:
Fig. 2 is the flow chart for the method that the embodiment of the present application two authenticates data equipment to be transmitted, to number to be transmitted
It include following steps according to the method that equipment is authenticated.
S201, it after receiving the request that data to be transmitted equipment carries out data transmission, sends and authenticates to data to be transmitted equipment
Information, authentication information include the confidential information to be added for no less than setting data volume.
Data to be transmitted equipment described in one step S101 of embodiment sends to server and requests, such as TCP request, table
Up to the intention for wishing to be connected into local area network, above-mentioned request or similar request can be considered as data to be transmitted equipment and carry out data transmission
Request.Any equipment can issue the request carried out data transmission to server, and before certification and registration, server can not
Whether the equipment that confirmation issues the request carried out data transmission has the qualification for being connected into local area network.Receive asking of carrying out data transmission
After asking, server sends authentication information to the equipment for issuing the request, and the format of authentication information provides in communication protocol, authenticates
It will include the confidential information to be added for no less than setting data volume in information.Confidential information to be added is usually character string to be encrypted, setting
Data volume is generally no less than 8 bytes.
Server and have the right the equipment known communication protocols for being connected into local area network and preset encryption rule.It has the right to connect
The equipment for entering local area network can correctly encrypt confidential information to be added according to the encryption rule of setting, will treat encryption information and encrypt to be formed
Encryption information according to format as defined in communication protocol reply server.And the equipment for having no right to be connected into local area network is unaware of encryption rule
Then, be difficult to treat encryption information and correctly encrypt, in addition due to be unaware of communication protocol and can not authentication information to server just
Really response.
If confidential information to be added is too simple, the equipment for having no right to be connected into local area network is replied also at random has certain probability lucky
It is consistent with correct encrypted result.In addition, with network attack, the development of technologies such as crack, rogue device (such as hacker uses
Data theft equipment, network attack equipment etc.) ability of correct encryption information is obtained under the premise of being unaware of encryption rule
Also increasingly stronger.In order to guarantee the reliability of certification, reduces obtain correctly adding under the premise of being unaware of encryption rule as far as possible
The probability of confidential information, it is desirable that the data volume of confidential information to be added is sufficiently large, cannot be less than the lowest threshold of setting.
The encryption information for the treatment of that S202, examination data to be transmitted equipment return encrypts the encryption information to be formed, if encryption letter
Breath meets the encryption rule of setting, then data to be transmitted equipment passes through certification.
The authentication information that server issues, data to be transmitted equipment is according to preset encryption rule in authentication information
Confidential information to be added encrypted, by include treat encryption information encrypt the encryption information to be formed return information return service
Device.The return information of data to be transmitted equipment should meet format specified in communication protocol, and otherwise server can not be by the reply
Information is identified as the reply to authentication information, it is likely that directly abandons using the return information as error message.
Meet in communication protocol before prescribed form in return information of the data to be transmitted equipment to server authentication information
It puts, server checks the encryption information in return information.If encryption information meets the encryption rule of setting, data to be transmitted
Equipment can treat encryption information and correctly encrypt, then data to be transmitted equipment is by certification, and otherwise data to be transmitted equipment is obstructed
Cross certification.
The method that the present embodiment authenticates data equipment to be transmitted greatly reduces the equipment for having no right to be connected into local area network
By the probability of certification, the accuracy of authentication result is effectively ensured, to ensure the stability and safety of local area network operation
Property.
Embodiment three:
Fig. 3 is the configuration diagram of two data transmission device of the embodiment of the present application.Data transmission device 30, including data are received
Transmitting apparatus 31 and certification register device 32.Data transmitter-receiver set 31 is sent for encapsulating data for message, and message includes message
Head and message body, message header include identification information, message attributes information, message header check information and message body check information;
After receiving message header, according to message header check information verification message head;If message header verification is errorless, verified further according to message body
Information checking message body;If message header verification is wrong, not further according to message body check information verification message body.
Specifically, data transmitter-receiver set 31 includes sub-device data sending device 311 and data sink 312.Data
Sending device 311 is sent for encapsulating data for message, and message includes message header and message body, and message header includes mark letter
Breath, message attributes information, message header check information and message body check information.Data sink 312 is for receiving message
After head, according to message header check information verification message head;If message header verification is errorless, verified further according to message body check information
Message body;If message header verification is wrong, not further according to message body check information verification message body.
Certification register device 32 is for authenticating data equipment to be transmitted;Examination has passed through the data to be transmitted of certification
The registration information of equipment, the data to be transmitted equipment for allowing the registration information errorless carry out data transmission.
Specifically, certification register device 32 includes sub-device authentication device 321 and register device 322.Authentication device 321 is used
Authenticate in data equipment to be transmitted, specific authentication method: receive that data to be transmitted equipment carries out data transmission asks
After asking, authentication information is sent to data to be transmitted equipment, authentication information includes the confidential information to be added for no less than setting data volume;It looks into
The encryption information for the treatment of for testing the return of data to be transmitted equipment encrypts the encryption information to be formed, if encryption information meets the encryption of setting
Rule, then data to be transmitted equipment passes through certification.Register device 322 is used to check the data to be transmitted equipment for having passed through certification
Registration information, the data to be transmitted equipment for allowing the registration information errorless carry out data transmission.
The specific implementation of device described in the present embodiment can be found in content described in embodiment one or embodiment two,
The realization principle and technical effect are similar, and details are not described herein again for the present embodiment.
Device described in the present embodiment, it is thus understood that the functional module structure mainly realized by modes such as computer programs
Frame.The division of the present embodiment described device is corresponding with method and step described in embodiment one or embodiment two, only a kind of
Logical function partition, there may be another division manner in actual implementation, for example, multiple devices can be combined or integrated into it is another
A device or some devices can be ignored or not execute.
The embodiment of physical unit as the carrying entity of device described in the present embodiment has diversity, Ke Yisuo
Some devices are distributed in a physical unit, can also be distributed on different physical units with one or several devices.Carrying dress
The physical unit set can be electrically connected by modes such as cable, wireless networks, not necessarily have direct physical contact or machinery even
Connect relationship.
In the application, mutual data transmission is needed between server and equipment, requires to be arranged on server and equipment
Data transmitter-receiver set 31.Server is responsible for the management of local area network, and certification register device 32 is generally located on server.
Example IV:
Fig. 4 is the hardware structural diagram of three electronic equipment of the embodiment of the present application.As shown in figure 4, the electronic equipment 40 wraps
It includes: at least one processor 41 and memory 42.Optionally, which further includes bus 43, processor 41 and storage
Device 42 is connected by bus 43.
In the operational process of electronic equipment, memory 42 is stored with computer instruction, at least one processor 41 executes
The computer instruction that the memory 42 stores, so that electronic equipment 40 is executed as described in embodiment one or embodiment two
Method.
The specific implementation procedure of electronic equipment 40 can be found in embodiment one or embodiment two, realization principle and technology effect
Seemingly, details are not described herein again for the present embodiment for fruit.
In the present embodiment, it should be appreciated that processor can be central processing unit (English: Central Processing
Unit, referred to as: CPU), it can also be other general processors, digital signal processor (English: Digital Signal
Processor, referred to as: DSP), specific integrated circuit (English: Application Specific Integrated
Circuit, referred to as: ASIC) etc..General processor can be microprocessor or other conventional processors.Execute memory
The computer instruction of 52 storages, directly can execute completion by hardware processor, or by the hardware and software mould in processor
Block combination executes completion.
Memory may include high speed RAM memory, it is also possible to and it further include non-volatile memories NVM, for example, at least one
Magnetic disk storage.
Bus can be industry standard architecture (Industry Standard Architecture, ISA) bus, outer
Portion's apparatus interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended
Industry Standard Architecture, EISA) bus etc..Bus can be divided into address bus, data/address bus, control
Bus etc..For convenient for indicating, the bus in illustrations is not limited only to a bus or a type of bus.
Embodiment five:
The application also provides a kind of computer readable storage medium, and calculating is stored in the computer readable storage medium
Machine program, the computer program are performed, and realize the method as described in embodiment one or embodiment two.
Above-mentioned computer readable storage medium can by any kind of volatibility or non-volatile memory device or it
Combination realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, fast
Flash memory, disk or CD etc..Readable storage medium storing program for executing can be general or special purpose computer or similar electronic equipment can
Any usable medium of access.
Computer readable storage medium is coupled to processor, to enable a processor to read letter from above-mentioned medium
Breath, and matter write-in information can be given an account of upwards.Certainly, above-mentioned medium is also possible to the component part of processor.Processor and can
Read storage medium can be located at specific integrated circuit (Application Specific Integrated Circuits, referred to as:
ASIC in).Certainly, processor and readable storage medium storing program for executing can also be used as discrete assembly and be present in electronic equipment.
If technical scheme realize in the form of software and as product when selling or using, can store and counting
In calculation machine read/write memory medium.Based on this understanding, all or part of the technical solution of the application can be produced with software
The form of product embodies, which is stored in a storage medium, including computer program or some instructions.
The computer software product makes computer equipment (can be personal computer, server, the network equipment or similar electronics
Equipment) execute all or part of the steps of the embodiment of the present application one or two the method for embodiment.Storage medium above-mentioned can
To be USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random
Access Memory), the various media that can store program code such as magnetic or disk.
It will be understood by those skilled in the art that realizing that all or part of the steps described in embodiment one or embodiment two can
To be completed by hardware relevant to program instruction.Program above-mentioned can store in computer-readable storage medium,
The program is performed, and executes the step of all or part described in embodiment one or embodiment two.Storage medium above-mentioned
Including the various media that can store program code such as ROM, RAM, magnetic or disk.
Finally it should be noted that each embodiment of the application is only to illustrate the technical solution of the application, rather than it is carried out
Limitation.Although each embodiment is described in detail the application, it will be appreciated by those skilled in the art that it still can be with
Modify to technical solution documented by each embodiment of the application, or some or all of the technical features are carried out etc.
With replacement, these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution
Range.
Claims (9)
1. data transmission method, which is characterized in that the described method includes:
It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes identification information, disappears
Cease attribute information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header verifies nothing
Accidentally, then the message body is verified further according to the message body check information;If the message header verification is wrong, not further according to institute
It states message body check information and verifies the message body.
2. the method according to claim 1, wherein the message attributes information include message length information and
Message type information.
3. the method according to claim 1, wherein the data transmission method further include:
Data equipment to be transmitted is authenticated;
Examination allows the institute that the registration information is errorless by the registration information of the data to be transmitted equipment of the certification
Data to be transmitted equipment is stated to carry out data transmission.
4. according to the method described in claim 3, it is characterized in that, described authenticate data equipment to be transmitted, comprising:
After receiving the request that the data to be transmitted equipment carries out data transmission, Xiang Suoshu data to be transmitted equipment sends certification letter
Breath, the authentication information include the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if the encryption
Information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
5. data transmission device, which is characterized in that described device includes: data transmitter-receiver set, and the data transmitter-receiver set is used for
It encapsulates data and is sent for message, the message includes message header and message body, and the message header includes identification information, message category
Property information, message header check information and message body check information;
After receiving the message header, the message header is verified according to the message header check information;If the message header verifies nothing
Accidentally, then the message body is verified further according to the message body check information;If the message header verification is wrong, not further according to institute
It states message body check information and verifies the message body.
6. device according to claim 5, which is characterized in that the data transmission device further includes certification register device,
The certification register device is for authenticating data equipment to be transmitted;Examination passes through the number to be transmitted of the certification
According to the registration information of equipment, the data to be transmitted equipment for allowing the registration information errorless carries out data transmission.
7. device according to claim 6, which is characterized in that the card register device includes authentication device, the certification
Device is for after receiving the request that the data to be transmitted equipment carries out data transmission, the transmission of Xiang Suoshu data to be transmitted equipment to be recognized
Information is demonstrate,proved, the authentication information includes the confidential information to be added for no less than setting data volume;
That checks the data to be transmitted equipment return encrypts the encryption information to be formed to the confidential information to be added, if the encryption
Information meets the encryption rule of setting, then the data to be transmitted equipment passes through the certification.
8. electronic equipment, which is characterized in that the electronic equipment includes processor and memory, and the memory is based on storing
The instruction of calculation machine, the processor is for executing the computer instruction stored in the memory so that the electronic equipment executes
The described in any item data transmission methods of claim 1-4.
9. computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the computer journey
Sequence, which is performed, realizes data transmission method according to any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910525456.2A CN110225046A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910525456.2A CN110225046A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110225046A true CN110225046A (en) | 2019-09-10 |
Family
ID=67817690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910525456.2A Pending CN110225046A (en) | 2019-06-18 | 2019-06-18 | Data transmission method, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225046A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111722940A (en) * | 2020-05-22 | 2020-09-29 | 百富计算机技术(深圳)有限公司 | Message transmission method, terminal equipment and transmission system based on asynchronous serial port |
CN113301130A (en) * | 2021-05-11 | 2021-08-24 | 深圳市星火数控技术有限公司 | Communication method and device of sewing equipment controller, terminal equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1988703A (en) * | 2006-12-01 | 2007-06-27 | 深圳市飞天网景通讯有限公司 | Method for realizing information interactive operation based on shootable mobile terminal |
CN103237293A (en) * | 2012-11-19 | 2013-08-07 | 北京新岸线移动多媒体技术有限公司 | Method and device for sending and receiving messages |
CN104426992A (en) * | 2013-09-10 | 2015-03-18 | 中国科学院沈阳自动化研究所 | Information transmission method based on material transmission system |
WO2016198015A1 (en) * | 2015-11-02 | 2016-12-15 | 中兴通讯股份有限公司 | Packet transmission method, apparatus, and system |
CN108989325A (en) * | 2018-08-03 | 2018-12-11 | 华数传媒网络有限公司 | Encryption communication method, apparatus and system |
CN109088874A (en) * | 2018-08-21 | 2018-12-25 | 北京睦合达信息技术股份有限公司 | A kind of data transmission method and equipment |
-
2019
- 2019-06-18 CN CN201910525456.2A patent/CN110225046A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1988703A (en) * | 2006-12-01 | 2007-06-27 | 深圳市飞天网景通讯有限公司 | Method for realizing information interactive operation based on shootable mobile terminal |
CN103237293A (en) * | 2012-11-19 | 2013-08-07 | 北京新岸线移动多媒体技术有限公司 | Method and device for sending and receiving messages |
CN104426992A (en) * | 2013-09-10 | 2015-03-18 | 中国科学院沈阳自动化研究所 | Information transmission method based on material transmission system |
WO2016198015A1 (en) * | 2015-11-02 | 2016-12-15 | 中兴通讯股份有限公司 | Packet transmission method, apparatus, and system |
CN108989325A (en) * | 2018-08-03 | 2018-12-11 | 华数传媒网络有限公司 | Encryption communication method, apparatus and system |
CN109088874A (en) * | 2018-08-21 | 2018-12-25 | 北京睦合达信息技术股份有限公司 | A kind of data transmission method and equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111722940A (en) * | 2020-05-22 | 2020-09-29 | 百富计算机技术(深圳)有限公司 | Message transmission method, terminal equipment and transmission system based on asynchronous serial port |
CN111722940B (en) * | 2020-05-22 | 2024-04-16 | 百富计算机技术(深圳)有限公司 | Message transmission method, terminal equipment and transmission system based on asynchronous serial port |
CN113301130A (en) * | 2021-05-11 | 2021-08-24 | 深圳市星火数控技术有限公司 | Communication method and device of sewing equipment controller, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7673334B2 (en) | Communication system and security assurance device | |
US11743721B2 (en) | Protection of a communication channel between a security module and an NFC circuit | |
RU2451398C2 (en) | Methods for authenticating, encrypting and decoding client terminal identifier and apparatus for realising said methods | |
CN105282157B (en) | A kind of secure communication control method | |
CN108512846A (en) | Mutual authentication method and device between a kind of terminal and server | |
CN106302346A (en) | The safety certifying method of API Calls, device, system | |
CN104584507B (en) | It is authenticated by the first equipment of switching station pair | |
CN106452782A (en) | Method and system for producing a secure communication channel for terminals | |
CN106888084A (en) | A kind of quantum fort machine system and its authentication method | |
CN108667780A (en) | A kind of identity authentication method, system and server and terminal | |
US20220150260A1 (en) | Hardware Detection Method and Apparatus, Device, and Storage Medium | |
CN108429820A (en) | A kind of communication means of internet of things application layer, system and terminal device | |
CN101075869B (en) | Method for realizing network certification | |
CN106603487A (en) | Method for safe improvement of TLS protocol processing based on CPU space-time isolation mechanism | |
US20080244716A1 (en) | Telecommunication system, telecommunication method, terminal thereof, and remote access server thereof | |
CN106657032A (en) | System and method for realizing identity identification and data authentication based on security medium confidential short message | |
CN110225046A (en) | Data transmission method, device, electronic equipment and storage medium | |
CN105429991A (en) | Efficient data transmission method for mobile terminal | |
KR101051420B1 (en) | Secure one time password generating apparatus and method | |
CN107623665A (en) | A kind of authentication method, equipment and system | |
WO2016058306A1 (en) | Optical module authentication method and apparatus | |
CN108024243A (en) | A kind of eSIM is caught in Network Communication method and its system | |
CN106712939A (en) | Offline key transmission method and device | |
CN105610872B (en) | Internet-of-things terminal encryption method and internet-of-things terminal encryption device | |
CN106790279A (en) | A kind of mutual authentication method and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |
|
RJ01 | Rejection of invention patent application after publication |