Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realization method for reasonable construction and correct parse of communication data package based on alarm system

An implementation method and an alarm system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as unsound communication protocols, difficulty in realizing correct data encapsulation and analysis, and easy leakage of data transparent transmission, etc., to achieve The effect of increasing time complexity and improving transmission speed

Inactive Publication Date: 2013-05-08
成都理想科技开发有限公司
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security products, as an effective means of protecting user property security, have gradually developed into a research direction in the field of computer network security. In traditional security products, the standards are different and the communication protocols are not perfect (Luo Wanjie, Alarm Information Compatible Research 2008 ) The correct encapsulation and analysis of data is difficult to achieve, and the transparent transmission of data is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method for reasonable construction and correct parse of communication data package based on alarm system
  • Realization method for reasonable construction and correct parse of communication data package based on alarm system
  • Realization method for reasonable construction and correct parse of communication data package based on alarm system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0039] ILD encoding refers to encoding Key, Length, Cmd, and Value to form a bit stream data packet; decoding is the inverse process of encoding, which is to parse and restore the original data from the bit stream buffer. Specific examples are as follows:

[0040] 1 Packet format:

[0041] Baotou (Headkey)

Packet length (Len)

Command (Cmd)

content

Byte 1~2

Byte 3~6

Byte 7~8

byte 9 ... byte n

[0042] in:

[0043] Baotou (Headkey): fixed to 0x3995

[0044] Packet length (Len): the length of the entire data packet header, 2+4+2+content length

[0045] Command (Cmd): used to indicate the type of content contained in the packet

[0046] Content: the actual data content

[0047] 2 center login:

[0048] It is used for each center to connect to the designated server and obtain the information of the equipment under the jurisdiction of the center from the server.

[0049] Center→Server: Cmd=10001

[0050]

[0051]

[0052] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security of computer networks, in particular to a realization method for reasonable construction and correct parse of a communication data package based on an alarm system. Fixed-length data package header identification is used as data package feature identification, the length of a fixed-length data package is set at the rear of the data package header identification, the system can parse the finial size of the package according to the length of the data package after receiving data and then parse out the whole data package, and the size of the whole package can be known without traversing to the end of the package. A coding scheme of abstract syntax markup is used for coding to divide the data into the operation type of Cmd and the operation content of Value, wherein Key corresponds to the header of data package, Length corresponds to the data length, Cmd and Value both correspond to the data, Key, Length, Cmd and Value are coded through the coding and the decoding rule to form a bit stream data package, and the data content is encrypted and decrypted through a special encryption protocol. The security and the transmission speed are obviously promoted.

Description

technical field [0001] The invention relates to a method for realizing rational construction and correct parsing of network data packets, especially a method for realizing reasonable construction and correct parsing of communication data packets based on an alarm system. Background technique [0002] With the rapid development of computer networks and the widening of application fields, people pay more and more attention to the safety of thousands of households. Security products, as an effective means of protecting users’ property security, have gradually developed into a research direction in the field of computer network security. In traditional security products, the standards are different and the communication protocols are not perfect (Luo Wanjie, Alarm Information Compatible Research 2008 ) The correct encapsulation and analysis of data is difficult to achieve, and the transparent transmission of data is easily leaked. [0003] In this study, it is extremely importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04L1/00
Inventor 羊贵祥高开文谢武松谭前学
Owner 成都理想科技开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products