[go: up one dir, main page]

CN116312098A - Method and device for checking distributed information - Google Patents

Method and device for checking distributed information Download PDF

Info

Publication number
CN116312098A
CN116312098A CN202211092265.XA CN202211092265A CN116312098A CN 116312098 A CN116312098 A CN 116312098A CN 202211092265 A CN202211092265 A CN 202211092265A CN 116312098 A CN116312098 A CN 116312098A
Authority
CN
China
Prior art keywords
event
information
code
sender
definition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211092265.XA
Other languages
Chinese (zh)
Other versions
CN116312098B (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Navi Beidou Information Technology Co ltd
Shaanxi Weixing Zhihang Technology Co ltd
Original Assignee
Shaanxi Navi Beidou Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Navi Beidou Information Technology Co ltd filed Critical Shaanxi Navi Beidou Information Technology Co ltd
Priority to CN202211092265.XA priority Critical patent/CN116312098B/en
Publication of CN116312098A publication Critical patent/CN116312098A/en
Application granted granted Critical
Publication of CN116312098B publication Critical patent/CN116312098B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B9/00Simulators for teaching or training purposes
    • G09B9/003Simulators for teaching or training purposes for military purposes and tactics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)

Abstract

The present disclosure provides a method and apparatus for inspecting distributed information. The method comprises the following steps: acquiring target configuration file information; checking whether the information byte length is equal to the configuration file definition byte length; checking the sender code to determine if the sender is a protocol definition user when the information byte length is equal to the profile definition byte length; when the sender is a protocol definition user, checking a system code check code, and determining whether a system for sending the target configuration file is a simulation test system or not; when the system sending the target configuration file is a simulation test system, checking the event code to determine whether the event is a protocol definition event; when the event is a protocol definition event, examining the sub-event code to determine whether the sub-event is a protocol definition sub-event; when the sub-event is a protocol defined sub-event, then a channel is distributed for the sender. The method can solve the problem that the distributed information of the simulation test system used in military training cannot be checked.

Description

分发信息的查验方法和装置Inspection method and device for distributing information

技术领域technical field

本公开涉及军事模拟训练技术领域,具体涉及一种分发信息的查验方法和装置。The present disclosure relates to the technical field of military simulation training, in particular to a method and device for checking distribution information.

背景技术Background technique

数据链用于作战,它带来的最大变化就是集体感知、共享数据的实时化。简单来说,它是链接交换和分发系统,能以统一的格式标准和约定,实时、自动、保密地传输各种战术数据,形成实时、准确、完整的作战态势图,使指挥员无论处于哪个指挥位置,都能知己知彼、依令而行,达成作战行动的高度同步。The data link is used in combat, and the biggest change it brings is the real-time realization of collective perception and shared data. To put it simply, it is a link exchange and distribution system, which can transmit various tactical data in real time, automatically and confidentially in a unified format standard and agreement, and form a real-time, accurate and complete combat situation map, so that no matter where the commander is The command position can know oneself and the enemy, follow orders, and achieve a high degree of synchronization of combat operations.

军用数据链通过有线和无线信道对战术信息进行传输。有线信道比如光纤、电缆,其传输可靠性、有效性高,但是建立通信所需时间较长,需要架设线路,机动性和抗摧毁性不如无线信道。无线信道就是常说的频段,目前军事数据链的工作频段已经覆盖短波、超短波、LX频段和卫星通信频段、量子波段。Military data links transmit tactical information over wired and wireless channels. Wired channels, such as optical fibers and cables, have high transmission reliability and effectiveness, but it takes a long time to establish communication, and lines need to be erected, and their mobility and resistance to destruction are not as good as wireless channels. The wireless channel is often referred to as the frequency band. At present, the working frequency band of the military data link has covered the short wave, ultrashort wave, LX frequency band, satellite communication frequency band, and quantum band.

如今,随着物联网、云计算、人工智能等新技术的快速发展,数据链的发展迎来新的挑战与机遇。未来战场能否更加透明,数据链的发展走向与进程至为关键。可以肯定的是,在未来,数据链将依然是战场末端聚能的“倍增器”,是军队制胜战场的重要支撑,但目前存在的问题是对用于军事训练中的仿真试验系统的分发信息无法进行查验,从而无法确保信息有效。Today, with the rapid development of new technologies such as the Internet of Things, cloud computing, and artificial intelligence, the development of data links is facing new challenges and opportunities. Whether the future battlefield can be more transparent depends on the development trend and process of the data link. What is certain is that in the future, the data link will still be the "multiplier" for energy gathering at the end of the battlefield and an important support for the army to win the battlefield. However, the current problem is the distribution of information for the simulation test system used in military training. Unable to check to ensure that the information is valid.

发明内容Contents of the invention

本公开的目的在于克服现有技术的不足,提供一种分发信息的查验方法和装置,该分发信息的查验方法能够解决对用于军事训练中的仿真试验系统的分发信息无法进行查验,从而无法确保信息有效的问题。The purpose of the present disclosure is to overcome the deficiencies in the prior art, and provide a method and device for distributing information. The method for distributing information can solve the problem that the distributing information of the simulation test system used in military training cannot be checked, so that it cannot Questions to make sure the information is valid.

根据本公开实施例的第一方面,提供一种分发信息的查验方法,该方法包括:According to the first aspect of the embodiments of the present disclosure, there is provided a checking method for distribution information, the method includes:

获取目标配置文件信息;其中,所述目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码;Obtain target configuration file information; wherein, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code;

查验所述信息字节长度是否等于配置文件定义字节长度;Check whether the byte length of the information is equal to the byte length defined by the configuration file;

在所述信息字节长度等于配置文件定义字节长度时,查验发送人代码,以确定发送人是否是协议定义用户;When the byte length of the information is equal to the byte length defined by the configuration file, check the code of the sender to determine whether the sender is a user defined by the protocol;

在发送人是协议定义用户时,查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统;When the sender is a protocol definition user, check the system code check code to determine whether the system sending the target configuration file is a simulation test system;

在发送所述目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件;When the system sending the target configuration file is a simulation test system, check the event code to determine whether the event is a protocol-defined event;

在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;When the event is a protocol-defined event, check the sub-event code to determine whether the sub-event is a protocol-defined sub-event;

在子事件是协议定义子事件时,则为所述发送人分发通道。When the sub-event is a protocol-defined sub-event, a channel is distributed for the sender.

在一个实施例中,所述方法还包括:In one embodiment, the method also includes:

所述方法还包括:The method also includes:

在所述信息字节长度不等于配置文件定义字节长度时,发送报错信息,所述报错信息中携带有错误类型信息;When the byte length of the information is not equal to the byte length defined by the configuration file, an error message is sent, and the error message carries error type information;

在发送人不是协议定义用户时,发送报错信息,所述报错信息中携带有错误类型信息;When the sender is not a protocol-defined user, send an error message, and the error message carries error type information;

在发送所述目标配置文件的系统不是仿真试验系统时,发送报错信息,所述报错信息中携带有错误类型信息;When the system sending the target configuration file is not a simulation test system, send an error message, and the error message carries error type information;

在事件不是协议定义事件时,发送报错信息,所述报错信息中携带有错误类型信息;When the event is not a protocol-defined event, an error message is sent, and the error message carries error type information;

在子事件不是协议定义子事件时,发送报错信息,所述报错信息中携带有错误类型信息。When the sub-event is not a protocol-defined sub-event, an error message is sent, and the error message carries error type information.

在一个实施例中,所述方法还包括:In one embodiment, the method also includes:

统计所述错误信息和所述错误类型信息的数量;Count the number of the error information and the error type information;

根据所述错误信息和所述错误类型信息的数量确定发送人信息的错误频率;determining the error frequency of the sender information according to the amount of the error information and the error type information;

根据所述发送人信息的错误频率生成所述发送人的分析报告,所述分析报告用于发送人纠正错误。An analysis report of the sender is generated according to the error frequency of the sender information, and the analysis report is used for the sender to correct errors.

在一个实施例中,所述查验发送人代码,以确定发送人是否是协议定义用户包括:In one embodiment, said checking the sender code to determine whether the sender is a protocol defined user comprises:

查验所述信息字节的前N位代码是否位于目标配置文件定义之内;其中,N为自然数,且N不等于0;Check whether the first N codes of the information byte are within the definition of the target configuration file; wherein, N is a natural number, and N is not equal to 0;

若所述信息字节的前N位代码位于目标配置文件定义之内,则确定所述发送人是协议定义用户;If the first N codes of the information byte are located within the definition of the target configuration file, then it is determined that the sender is a protocol definition user;

若所述信息字节的前N位代码不位于目标配置文件定义之内,则确定所述发送人不是协议定义用户。If the code of the first N digits of the information byte is not within the definition of the target configuration file, it is determined that the sender is not a protocol definition user.

在一个实施例中,所述查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统包括:In one embodiment, the checking system code verification code to determine whether the system sending the target configuration file is a simulation test system includes:

查验所述信息字节的第N+X位代码是否等于所述目标配置文件定义代码;其中,X为自然数,且X>N;Check whether the N+X bit code of the information byte is equal to the target configuration file definition code; wherein, X is a natural number, and X>N;

若所述信息字节的第N+X位代码等于所述目标配置文件定义代码,则确定发送所述目标配置文件的系统是仿真试验系统;If the N+X bit code of the information byte is equal to the target configuration file definition code, then it is determined that the system sending the target configuration file is a simulation test system;

若所述信息字节的第N+X位代码不等于所述目标配置文件定义代码,则确定发送所述目标配置文件的系统不是仿真试验系统。If the N+X bit code of the information byte is not equal to the target configuration file definition code, it is determined that the system sending the target configuration file is not a simulation test system.

在一个实施例中,所述查验事件代码,以确定事件是否是协议定义事件包括:In one embodiment, the inspecting the event code to determine whether the event is a protocol-defined event includes:

查验所述信息字节的第N+X+Y位代码是否在所述目标配置文件定义之内;其中,Y为自然数,且Y>X;Check whether the N+X+Y bit code of the information byte is within the definition of the target configuration file; wherein, Y is a natural number, and Y>X;

若所述信息字节的第N+X+Y位代码是否在所述目标配置文件定义之内,则确定事件是协议定义事件;If the N+X+Y bit code of the information byte is within the definition of the target configuration file, then determine that the event is a protocol definition event;

若所述信息字节的第N+X+Y位代码不在所述目标配置文件定义之内,则确定事件不是协议定义事件。If the N+X+Y bit code of the information byte is not defined in the target configuration file, it is determined that the event is not a protocol-defined event.

在一个实施例中,所述查验子事件代码,以确定子事件是否是协议定义子事件包括:In one embodiment, the checking subevent code to determine whether the subevent is a protocol defined subevent comprises:

查验所述信息字节的第N+X+Y+Z位代码是否在所述目标配置文件定义之内;其中,Z为自然数,且Z>Y;Check whether the N+X+Y+Z bit code of the information byte is within the definition of the target configuration file; wherein, Z is a natural number, and Z>Y;

若所述信息字节的第N+X+Y+Z位代码在所述目标配置文件定义之内,则确定子事件是协议定义子事件;If the N+X+Y+Z bit code of the information byte is within the definition of the target configuration file, then determine that the sub-event is a protocol-defined sub-event;

若所述信息字节的第N+X+Y+Z位代码不在所述目标配置文件定义之内,则确定子事件不是协议定义子事件。If the N+X+Y+Z bit code of the information byte is not within the definition of the target configuration file, it is determined that the sub-event is not a protocol-defined sub-event.

在一个实施例中,所述方法还包括:In one embodiment, the method also includes:

若所述事件代码长度少于定义代码长度,在所述事件代码前补位;If the length of the event code is less than the length of the defined code, fill in before the event code;

若所述子事件代码长度少于定义代码长度,在所述子事件代码前补位。If the sub-event code length is less than the defined code length, a place is filled before the sub-event code.

根据本公开实施例的第二方面,提供一种分发信息的查验装置,该装置包括:According to the second aspect of the embodiments of the present disclosure, there is provided an inspection device for distributing information, the device includes:

获取模块,获取目标配置文件信息;其中,所述目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码;The acquisition module acquires target configuration file information; wherein, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code;

第一查验模块,查验所述信息字节长度是否等于配置文件定义字节长度;The first check module checks whether the byte length of the information is equal to the byte length defined by the configuration file;

第二查验模块,在所述信息字节长度等于配置文件定义字节长度时,查验发送人代码,以确定发送人是否是协议定义用户;The second inspection module, when the byte length of the information is equal to the byte length defined by the configuration file, checks the code of the sender to determine whether the sender is a user defined by the protocol;

第三查验模块,在发送人是协议定义用户时,查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统;The third inspection module, when the sender is a protocol definition user, checks the system code check code to determine whether the system sending the target configuration file is a simulation test system;

第四查验模块,在发送所述目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件;The fourth inspection module, when the system sending the target configuration file is a simulation test system, inspects the event code to determine whether the event is a protocol definition event;

第五查验模块,在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;The fifth checking module, when the event is a protocol-defined event, checks the sub-event code to determine whether the sub-event is a protocol-defined sub-event;

分发模块,在子事件是协议定义子事件时,则为所述发送人分发通道。The distribution module distributes channels for the sender when the sub-event is a protocol-defined sub-event.

在一个实施例中,所述装置还包括:In one embodiment, the device also includes:

统计模块,统计所述错误信息和所述错误类型信息的数量;A statistics module, counting the quantity of the error information and the error type information;

确定模块,根据所述错误信息和所述错误类型信息的数量确定发送人信息的错误频率;A determining module, which determines the error frequency of sender information according to the number of error information and error type information;

生成模块,根据所述发送人信息的错误频率生成所述发送人的分析报告,所述分析报告用于发送人纠正错误。The generation module generates an analysis report of the sender according to the error frequency of the sender's information, and the analysis report is used for the sender to correct errors.

本公开提供的一种分发信息的查验方法,通过获取目标配置文件信息,该目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码,并查验信息字节长度是否等于配置文件定义字节长度,在信息字节长度等于配置文件定义字节长度时,进一步查验发送人代码,以确定发送人是否是协议定义用户,在发送人是协议定义用户时,查验系统代码校验码,以确定发送目标配置文件的系统是否是仿真试验系统,在发送目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件,在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;在子事件是协议定义子事件时,则为发送人分发通道,以解决对用于军事训练中的仿真试验系统的分发信息无法进行查验,从而无法确保信息有效的问题。The disclosure provides a verification method for distribution information. By obtaining target configuration file information, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code, and checks the information word Section length is equal to the byte length defined in the configuration file. When the byte length of the information is equal to the byte length defined in the configuration file, further check the sender’s code to determine whether the sender is a protocol-defined user. When the sender is a protocol-defined user, Check the system code check code to determine whether the system sending the target configuration file is a simulation test system. When the system sending the target configuration file is a simulation test system, check the event code to determine whether the event is a protocol definition event. If the event is When the protocol defines an event, check the sub-event code to determine whether the sub-event is a protocol-defined sub-event; when the sub-event is a protocol-defined sub-event, then distribute the channel for the sender to solve the problem of the emulation test system used in military training The distribution information cannot be checked to ensure that the information is valid.

附图说明Description of drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description serve to explain the principles of the disclosure.

图1为本公开实施例提供的一种分发信息的查验方法的流程图。FIG. 1 is a flow chart of a method for checking distribution information provided by an embodiment of the present disclosure.

图2为本公开实施例提供的一种分发信息的查验方法的流程图。FIG. 2 is a flow chart of a method for checking distribution information provided by an embodiment of the present disclosure.

图3为本公开实施例提供的一种分发信息的查验装置的架构图。Fig. 3 is a structural diagram of an inspection device for distributing information provided by an embodiment of the present disclosure.

图4为本公开实施例提供的一种分发信息的查验装置的架构图。FIG. 4 is a structural diagram of an inspection device for distributing information provided by an embodiment of the present disclosure.

具体实施方式Detailed ways

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

图1为本公开实施例提供的一种分发信息的查验方法的流程图。如图1所示,该方法包括:FIG. 1 is a flow chart of a method for checking distribution information provided by an embodiment of the present disclosure. As shown in Figure 1, the method includes:

步骤101、获取目标配置文件信息;Step 101, obtaining target configuration file information;

在本步骤中,所述目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码;In this step, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code;

步骤102、查验所述信息字节长度是否等于配置文件定义字节长度;Step 102, checking whether the byte length of the information is equal to the byte length defined by the configuration file;

在本步骤中,若信息字节长度等于配置文件定义字节长度,则进入步骤103,若所述信息字节长度不等于配置文件定义字节长度,则报错并反馈错误类型。In this step, if the byte length of the information is equal to the byte length defined in the configuration file, then enter step 103; if the byte length of the information is not equal to the byte length defined in the configuration file, an error is reported and the error type is fed back.

步骤103、在所述信息字节长度等于配置文件定义字节长度时,查验发送人代码,以确定发送人是否是协议定义用户;Step 103, when the byte length of the information is equal to the byte length defined in the configuration file, check the code of the sender to determine whether the sender is a protocol-defined user;

在一个实施例中,所述查验发送人代码,以确定发送人是否是协议定义用户包括:In one embodiment, said checking the sender code to determine whether the sender is a protocol defined user comprises:

查验所述信息字节的前N位代码是否位于目标配置文件定义之内;其中,N为自然数,且N不等于0;Check whether the first N codes of the information byte are within the definition of the target configuration file; wherein, N is a natural number, and N is not equal to 0;

若所述信息字节的前N位代码位于目标配置文件定义之内,则确定所述发送人是协议定义用户;If the first N codes of the information byte are located within the definition of the target configuration file, then it is determined that the sender is a protocol definition user;

若所述信息字节的前N位代码不位于目标配置文件定义之内,则确定所述发送人不是协议定义用户。If the code of the first N digits of the information byte is not within the definition of the target configuration file, it is determined that the sender is not a protocol definition user.

在本实施例中,若信息字节前N位代码位于配置文件定义范围之内,则进入步骤104,若信息字节前N位代码不位于配置文件定义范围之内,报错并反馈错误类型。In this embodiment, if the code of the first N bits of the information byte is within the definition range of the configuration file, go to step 104; if the code of the first N bits of the information byte is not within the range of the definition of the configuration file, an error will be reported and the error type will be fed back.

步骤104、在发送人是协议定义用户时,查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统;Step 104, when the sender is a protocol definition user, check the system code check code to determine whether the system sending the target configuration file is a simulation test system;

在一个实施例中,所述查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统包括:In one embodiment, the checking system code verification code to determine whether the system sending the target configuration file is a simulation test system includes:

查验所述信息字节的第N+X位代码是否等于所述目标配置文件定义代码;其中,X为自然数,且X>N;Check whether the N+X bit code of the information byte is equal to the target configuration file definition code; wherein, X is a natural number, and X>N;

若所述信息字节的第N+X位代码等于所述目标配置文件定义代码,则确定发送所述目标配置文件的系统是仿真试验系统;If the N+X bit code of the information byte is equal to the target configuration file definition code, then it is determined that the system sending the target configuration file is a simulation test system;

若所述信息字节的第N+X位代码不等于所述目标配置文件定义代码,则确定发送所述目标配置文件的系统不是仿真试验系统。If the N+X bit code of the information byte is not equal to the target configuration file definition code, it is determined that the system sending the target configuration file is not a simulation test system.

在本实施例中,查验系统代码校验码,判断信息发送的目标系统是否属于仿真试验系统,即信息字节第N+X位代码是否等于配置文件定义代码,若确定信息字节的第N+X位代码等于目标配置文件定义代码,则确定目标配置文件的系统是仿真试验系统,则进入步骤105,若确定信息字节的第N+X位代码不等于目标配置文件定义代码,则确定目标配置文件的系统不是仿真试验系统,则报错并反馈错误类型。In this embodiment, check the system code check code to determine whether the target system for information transmission belongs to the simulation test system, that is, whether the N+X bit code of the information byte is equal to the configuration file definition code, if the Nth bit of the information byte is determined +X bit code is equal to the target configuration file definition code, then it is determined that the system of the target configuration file is a simulation test system, then enter step 105, if it is determined that the N+X bit code of the information byte is not equal to the target configuration file definition code, then determine If the system of the target configuration file is not a simulation test system, an error will be reported and the error type will be fed back.

步骤105、在发送所述目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件;Step 105, when the system sending the target configuration file is a simulation test system, check the event code to determine whether the event is a protocol definition event;

在一个实施例中,所述查验事件代码,以确定事件是否是协议定义事件包括:In one embodiment, the inspecting the event code to determine whether the event is a protocol-defined event includes:

查验所述信息字节的第N+X+Y位代码是否在所述目标配置文件定义之内;其中,Y为自然数,且Y>X;Check whether the N+X+Y bit code of the information byte is within the definition of the target configuration file; wherein, Y is a natural number, and Y>X;

若所述信息字节的第N+X+Y位代码是否在所述目标配置文件定义之内,则确定事件是协议定义事件;If the N+X+Y bit code of the information byte is within the definition of the target configuration file, then determine that the event is a protocol definition event;

若所述信息字节的第N+X+Y位代码不在所述目标配置文件定义之内,则确定事件不是协议定义事件。If the N+X+Y bit code of the information byte is not defined in the target configuration file, it is determined that the event is not a protocol-defined event.

在本实施例中,查验事件代码,判断事件是否属于协议定义事件,即信息字节第N+X+Y位代码是否位于配置文件定义范围之内,若信息字节的第N+X+Y位代码在目标配置文件定义之内,则确定事件是协议定义事件,若信息字节的第N+X+Y位代码不在目标配置文件定义之内,则确定事件不是协议定义事件,则报错并反馈错误类型。In this embodiment, check the event code to determine whether the event belongs to a protocol-defined event, that is, whether the N+X+Y bit code of the information byte is within the definition range of the configuration file, if the N+X+Y bit of the information byte If the bit code is within the definition of the target configuration file, it is determined that the event is a protocol-defined event. If the N+X+Y bit code of the information byte is not within the definition of the target configuration file, it is determined that the event is not a protocol-defined event, and an error is reported and Feedback error type.

步骤106、在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;Step 106, when the event is a protocol-defined event, check the sub-event code to determine whether the sub-event is a protocol-defined sub-event;

在一个实施例中,所述查验子事件代码,以确定子事件是否是协议定义子事件包括:In one embodiment, the checking subevent code to determine whether the subevent is a protocol defined subevent comprises:

查验所述信息字节的第N+X+Y+Z位代码是否在所述目标配置文件定义之内;其中,Z为自然数,且Z>Y;Check whether the N+X+Y+Z bit code of the information byte is within the definition of the target configuration file; wherein, Z is a natural number, and Z>Y;

若所述信息字节的第N+X+Y+Z位代码在所述目标配置文件定义之内,则确定子事件是协议定义子事件;If the N+X+Y+Z bit code of the information byte is within the definition of the target configuration file, then determine that the sub-event is a protocol-defined sub-event;

若所述信息字节的第N+X+Y+Z位代码不在所述目标配置文件定义之内,则确定子事件不是协议定义子事件。If the N+X+Y+Z bit code of the information byte is not within the definition of the target configuration file, it is determined that the sub-event is not a protocol-defined sub-event.

在本实施例中,查验子事件代码,判断子事件是否属于协议定义子事件,即信息字节第N+X+Y+Z位是否位于配置文件定义范围之内,若信息字节的第N+X+Y+Z位代码在目标配置文件定义之内,则确定子事件是协议定义子事件,若信息字节的第N+X+Y+Z位代码不在目标配置文件定义之内,则确定子事件不是协议定义子事件,则报错并反馈错误类型。In this embodiment, the sub-event code is checked to determine whether the sub-event belongs to a protocol-defined sub-event, that is, whether the N+X+Y+Z bit of the information byte is within the definition range of the configuration file, if the Nth bit of the information byte +X+Y+Z bit code is within the definition of the target configuration file, then it is determined that the sub-event is a protocol-defined sub-event, if the N+X+Y+Z bit code of the information byte is not within the definition of the target configuration file, then If it is determined that the sub-event is not a protocol-defined sub-event, an error will be reported and the error type will be fed back.

步骤107、在子事件是协议定义子事件时,则为所述发送人分发通道。Step 107, when the sub-event is a protocol-defined sub-event, distribute the channel to the sender.

在本步骤中,若信息满足校验结果进入分发通道并记录备案。In this step, if the information satisfies the verification result, it enters the distribution channel and records it for filing.

本公开提供的一种分发信息的查验方法,通过获取目标配置文件信息,该目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码,并查验信息字节长度是否等于配置文件定义字节长度,在信息字节长度等于配置文件定义字节长度时,进一步查验发送人代码,以确定发送人是否是协议定义用户,在发送人是协议定义用户时,查验系统代码校验码,以确定发送目标配置文件的系统是否是仿真试验系统,在发送目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件,在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;在子事件是协议定义子事件时,则为发送人分发通道,以解决对用于军事训练中的仿真试验系统的分发信息无法进行查验,从而无法确保信息有效的问题。The disclosure provides a verification method for distribution information. By obtaining target configuration file information, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code, and checks the information word Section length is equal to the byte length defined in the configuration file. When the byte length of the information is equal to the byte length defined in the configuration file, further check the sender’s code to determine whether the sender is a protocol-defined user. When the sender is a protocol-defined user, Check the system code check code to determine whether the system sending the target configuration file is a simulation test system. When the system sending the target configuration file is a simulation test system, check the event code to determine whether the event is a protocol definition event. If the event is When the protocol defines an event, check the sub-event code to determine whether the sub-event is a protocol-defined sub-event; when the sub-event is a protocol-defined sub-event, then distribute the channel for the sender to solve the problem of the emulation test system used in military training The distribution information cannot be checked to ensure that the information is valid.

可选地,如图2所示,所示方法还包括:Optionally, as shown in Figure 2, the shown method also includes:

步骤201、统计所述错误信息和所述错误类型信息的数量;Step 201, counting the quantity of the error information and the error type information;

步骤202、根据所述错误信息和所述错误类型信息的数量确定发送人信息的错误频率;Step 202. Determine the error frequency of sender information according to the number of error information and error type information;

步骤203、根据所述发送人信息的错误频率生成所述发送人的分析报告,所述分析报告用于发送人纠正错误。Step 203: Generate an analysis report of the sender according to the error frequency of the sender information, and the analysis report is used for the sender to correct errors.

在本实施例中,通过统计错误信息和误类型信息的数量,并根据错误信息和错误类型信息的数量确定发送人信息的错误频率,并进而根据发送人信息的错误频率生成发送人的分析报告,以便于发送人纠正错误。In this embodiment, by counting the number of error information and error type information, and determining the error frequency of the sender's information according to the amount of error information and error type information, and then generating the sender's analysis report according to the error frequency of the sender's information , so that the sender can correct the error.

可选地,所述方法还包括:Optionally, the method also includes:

若所述事件代码长度少于定义代码长度,在所述事件代码前补位;If the length of the event code is less than the length of the defined code, fill in before the event code;

若所述子事件代码长度少于定义代码长度,在所述子事件代码前补位。If the sub-event code length is less than the defined code length, a place is filled before the sub-event code.

本实施例中,在事件代码长度少于定义代码长度时,在所述事件代码前自动补位,在子事件代码长度少于定义代码长度,在子事件代码前自动补位,可以用0或自定义字符补位。本实施例通过纠错方式自动修正简单位数错码问题,避免重复发送信息,造成的资源损耗和效率降低问题。In this embodiment, when the event code length is less than the defined code length, the place is automatically filled before the event code, and when the sub-event code length is less than the defined code length, the place is automatically filled before the sub-event code, and 0 or Custom character padding. In this embodiment, the problem of simple bit error code is automatically corrected by means of error correction, so as to avoid the problem of resource loss and efficiency reduction caused by repeated sending of information.

图3为本公开实施例提供的一种分发信息的查验装置的架构图。如图3所示,该分发信息的查验装置包括:获取模块301、第一查验模块302、第二查验模块303、第三查验模块304、第四查验模块305、第五查验模块306和分发模块307;其中,获取模块301用于获取目标配置文件信息;其中,所述目标配置文件信息包括信息字节长度、发送人代码、系统代码校验码、事件代码和子事件代码;第一查验模块302用于查验所述信息字节长度是否等于配置文件定义字节长度;第二查验模块303用于在所述信息字节长度等于配置文件定义字节长度时,查验发送人代码,以确定发送人是否是协议定义用户;第三查验模块304用于在发送人是协议定义用户时,查验系统代码校验码,以确定发送所述目标配置文件的系统是否是仿真试验系统;第四查验模块305用于在发送所述目标配置文件的系统是仿真试验系统时,查验事件代码,以确定事件是否是协议定义事件;第五查验模块306用于在事件是协议定义事件时,查验子事件代码,以确定子事件是否是协议定义子事件;分发模块707用于在子事件是协议定义子事件时,则为所述发送人分发通道。Fig. 3 is a structural diagram of an inspection device for distributing information provided by an embodiment of the present disclosure. As shown in Figure 3, the checking device of this distributing information comprises: acquisition module 301, first checking module 302, second checking module 303, the 3rd checking module 304, the 4th checking module 305, the 5th checking module 306 and distributing module 307; wherein, the obtaining module 301 is used to obtain target configuration file information; wherein, the target configuration file information includes information byte length, sender code, system code check code, event code and sub-event code; the first check module 302 Used to check whether the byte length of the information is equal to the byte length defined by the configuration file; the second check module 303 is used to check the sender code to determine the sender when the byte length of the information is equal to the byte length defined by the configuration file Whether it is a protocol definition user; the third inspection module 304 is used to check the system code check code when the sender is a protocol definition user, to determine whether the system sending the target configuration file is a simulation test system; the fourth inspection module 305 When the system sending the target configuration file is a simulation test system, check the event code to determine whether the event is a protocol-defined event; the fifth checking module 306 is used to check the sub-event code when the event is a protocol-defined event, to determine whether the sub-event is a protocol-defined sub-event; the distribution module 707 is configured to distribute channels for the sender when the sub-event is a protocol-defined sub-event.

图4为本公开实施例提供的一种分发信息的查验装置的架构图。如图4所示,该分发信息的查验装置包括:获取模块401、第一查验模块402、第二查验模块403、第三查验模块404、第四查验模块405、第五查验模块406和分发模块407、统计模块408、确定模块409和生成模块4010;其中,统计模块408用于统计所述错误信息和所述错误类型信息的数量;确定模块409用于根据所述错误信息和所述错误类型信息的数量确定发送人信息的错误频率;生成模块4010用于根据所述发送人信息的错误频率生成所述发送人的分析报告,所述分析报告用于发送人纠正错误。FIG. 4 is a structural diagram of an inspection device for distributing information provided by an embodiment of the present disclosure. As shown in Figure 4, the inspection device of the distribution information includes: an acquisition module 401, a first inspection module 402, a second inspection module 403, a third inspection module 404, a fourth inspection module 405, a fifth inspection module 406 and a distribution module 407, a statistics module 408, a determination module 409 and a generation module 4010; wherein, the statistics module 408 is used to count the quantity of the error information and the error type information; the determination module 409 is used to calculate the error information according to the error information and the error type The amount of information determines the error frequency of the sender's information; the generating module 4010 is configured to generate an analysis report of the sender according to the error frequency of the sender's information, and the analysis report is used for the sender to correct errors.

本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以预置于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps for implementing the above method embodiments can be completed by program instructions and related hardware. The aforementioned programs can be pre-installed in a computer-readable storage medium. When the program is executed, it executes the steps including the above-mentioned method embodiments; and the aforementioned storage medium includes: ROM, RAM, magnetic disk or optical disk and other various media that can store program codes.

本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正和精神由下面的权利要求指出。Other embodiments of the disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. The present disclosure is intended to cover any modification, use or adaptation of the present disclosure. These modifications, uses or adaptations follow the general principles of the present disclosure and include common knowledge or conventional technical means in the technical field not disclosed in the present disclosure. . The specification and examples are considered exemplary only, with the true and spirit of the disclosure pointed out by the following claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其进行各种修改和改变。本公开的仅由所附的权利要求来限制。It should be understood that the present disclosure is not limited to the precise constructions which have been described above and shown in the drawings, and that various modifications and changes may be made without departing therefrom. The present disclosure is limited only by the appended claims.

Claims (10)

1. A method of inspecting distributed information, the method comprising:
acquiring target configuration file information; the target configuration file information comprises an information byte length, a sender code, a system code check code, an event code and a sub-event code;
checking whether the information byte length is equal to the configuration file definition byte length;
checking the sender code to determine if the sender is a protocol definition user when the information byte length is equal to the profile definition byte length;
checking a system code check code when the sender is a protocol definition user to determine whether the system transmitting the target configuration file is a simulation test system;
when the system sending the target configuration file is a simulation test system, checking an event code to determine whether an event is a protocol definition event;
when the event is a protocol definition event, examining the sub-event code to determine whether the sub-event is a protocol definition sub-event;
and when the sub-event is a protocol definition sub-event, distributing a channel for the sender.
2. The method according to claim 1, wherein the method further comprises:
when the information byte length is not equal to the configuration file definition byte length, sending error reporting information, wherein the error reporting information carries error type information;
when the sender is not a protocol definition user, sending error reporting information, wherein the error reporting information carries error type information;
when the system for transmitting the target configuration file is not a simulation test system, transmitting error reporting information, wherein the error reporting information carries error type information;
when the event is not a protocol definition event, sending error reporting information, wherein the error reporting information carries error type information;
and when the sub-event is not the protocol definition sub-event, sending error reporting information, wherein the error reporting information carries error type information.
3. The method according to claim 2, wherein the method further comprises:
counting the number of the error information and the error type information;
determining the error frequency of the sender information according to the error information and the number of the error type information;
and generating an analysis report of the sender according to the error frequency of the sender information, wherein the analysis report is used for correcting errors by the sender.
4. A method according to any one of claims 1 to 3, wherein said examining the sender code to determine if the sender is a protocol defining user comprises:
checking whether the first N-bit code of the information byte is located within a target profile definition; wherein N is a natural number, and N is not equal to 0;
if the first N-bit code of the information byte is positioned in the target configuration file definition, determining that the sender is a protocol definition user;
if the first N-bit code of the information byte is not located within the target profile definition, it is determined that the sender is not a protocol definition user.
5. The method of claim 4, wherein the validating the system code check code to determine whether the system sending the target profile is a simulation test system comprises:
checking whether an n+x bit code of the information byte is equal to the target profile definition code; wherein X is a natural number, and X > N;
if the (N+X) th bit code of the information byte is equal to the target configuration file definition code, determining that the system for transmitting the target configuration file is a simulation test system;
if the (N+X) th bit code of the information byte is not equal to the target configuration file definition code, determining that the system sending the target configuration file is not a simulation test system.
6. The method of claim 5, wherein the examining the event code to determine if the event is a protocol-defined event comprises:
checking whether an n+x+y bit code of the information byte is within the target profile definition; wherein Y is a natural number, and Y > X;
if the n+X+Y bit code of the information byte is within the target profile definition, determining that the event is a protocol definition event;
if the n+X+Y bit code of the information byte is not within the target profile definition, determining that the event is not a protocol definition event.
7. The method of claim 6, wherein the examining the sub-event code to determine whether the sub-event is a protocol-defined sub-event comprises:
checking whether an n+x+y+z bit code of the information byte is within the target profile definition; wherein Z is a natural number, and Z > Y;
if the N+X+Y+Z bit code of the information byte is within the target configuration file definition, determining that the sub-event is a protocol definition sub-event;
if the n+X+Y+Z bit code of the information byte is not within the target profile definition, determining that the sub-event is not a protocol definition sub-event.
8. The method of claim 7, wherein the method further comprises:
and if the event code length is less than the definition code length, supplementing bits before the event code.
9. An inspection apparatus for distributing information, the apparatus comprising:
the acquisition module acquires target configuration file information; the target configuration file information comprises an information byte length, a sender code, a system code check code, an event code and a sub-event code;
a first checking module for checking whether the information byte length is equal to the configuration file definition byte length;
a second checking module for checking the sender code to determine whether the sender is a protocol definition user when the information byte length is equal to the profile definition byte length;
a third checking module for checking the system code check code to determine whether the system transmitting the target configuration file is a simulation test system when the sender is a protocol definition user;
a fourth checking module for checking an event code to determine whether an event is a protocol definition event when the system transmitting the target profile is a simulation test system;
a fifth checking module for checking the sub-event code to determine whether the sub-event is a protocol definition sub-event when the event is a protocol definition event;
and the distribution module is used for distributing a channel for the sender when the sub-event is a protocol definition sub-event.
10. The apparatus of claim 9, wherein the apparatus further comprises:
the statistics module is used for counting the number of the error information and the error type information;
the determining module is used for determining the error frequency of the sender information according to the error information and the number of the error type information;
and the generation module is used for generating an analysis report of the sender according to the error frequency of the sender information, wherein the analysis report is used for correcting errors by the sender.
CN202211092265.XA 2022-09-08 2022-09-08 Method and device for checking distribution information Active CN116312098B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211092265.XA CN116312098B (en) 2022-09-08 2022-09-08 Method and device for checking distribution information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211092265.XA CN116312098B (en) 2022-09-08 2022-09-08 Method and device for checking distribution information

Publications (2)

Publication Number Publication Date
CN116312098A true CN116312098A (en) 2023-06-23
CN116312098B CN116312098B (en) 2025-09-26

Family

ID=86827405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211092265.XA Active CN116312098B (en) 2022-09-08 2022-09-08 Method and device for checking distribution information

Country Status (1)

Country Link
CN (1) CN116312098B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121351A1 (en) * 2013-10-31 2015-04-30 Alan Cabrera Generating configuration data based on application definitions
KR101969940B1 (en) * 2018-11-27 2019-04-18 주식회사 나온웍스 Industrial Protocol Packet Monitoring and Control Devices
CN110830482A (en) * 2019-11-13 2020-02-21 哈尔滨工业大学 A universal drive system and method for component serial interface
WO2020133897A1 (en) * 2018-12-26 2020-07-02 盛科网络(苏州)有限公司 Operations, administration and management information processing method and device
WO2021134418A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Data checking method and apparatus
CN113821518A (en) * 2021-11-24 2021-12-21 中航材导航技术(北京)有限公司 Aviation information structured processing system
CN114363390A (en) * 2022-01-21 2022-04-15 西安羚控电子科技有限公司 Unmanned aerial vehicle ground control system and control method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121351A1 (en) * 2013-10-31 2015-04-30 Alan Cabrera Generating configuration data based on application definitions
KR101969940B1 (en) * 2018-11-27 2019-04-18 주식회사 나온웍스 Industrial Protocol Packet Monitoring and Control Devices
WO2020133897A1 (en) * 2018-12-26 2020-07-02 盛科网络(苏州)有限公司 Operations, administration and management information processing method and device
CN110830482A (en) * 2019-11-13 2020-02-21 哈尔滨工业大学 A universal drive system and method for component serial interface
WO2021134418A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Data checking method and apparatus
CN113821518A (en) * 2021-11-24 2021-12-21 中航材导航技术(北京)有限公司 Aviation information structured processing system
CN114363390A (en) * 2022-01-21 2022-04-15 西安羚控电子科技有限公司 Unmanned aerial vehicle ground control system and control method

Also Published As

Publication number Publication date
CN116312098B (en) 2025-09-26

Similar Documents

Publication Publication Date Title
Ani et al. Design considerations for building credible security testbeds: Perspectives from industrial control system use cases
CN104391934B (en) Data verification method and device
CN112887120A (en) Information processing method and device
US11546226B2 (en) System and method for simulating network events
CN106354634A (en) Interface testing method and device
CN106603259B (en) The configuration data method of calibration and device of network element, network management device
CN115085867B (en) E2E verification method and device for CAN bus message
CN106411652B (en) A gateway protocol conversion test system and method for aerospace communication
CN103812730B (en) A kind of multiple cell TTCN Conformance Testing Environment systems
CN116312098A (en) Method and device for checking distributed information
CN119090508A (en) A blockchain-based enterprise carbon accounting method, system, device and medium
JP2018125632A (en) Traffic generation device and traffic generation method
CN108228197A (en) A kind of method and apparatus for installing software in the cluster
CN109753639A (en) Front-end and back-end unified verification method, device, storage medium and electronic equipment
CN103001786A (en) MML-based (man-machine-language-based) method, server and system for configuring large volume data
CN114338835A (en) Data message dynamic conversion method and device, storage medium and electronic device
Stiri et al. Internet of things connectivity-based smart grids in Morocco: proof of concept and guide to massive deployments
CN117118872A (en) Communication channel quality testing method, system, storage medium, equipment and terminal
CN109766102A (en) A kind of matching process automatically parsing required parameter
CN116798294A (en) A pilot training level assessment system and method based on flight tolerance envelope
CN116248749A (en) Message processing component, method, device, electronic device and readable storage medium
He Design and Application of Interactive Teaching System for Electronic Engineering Specialty Based on ZigBee
Herrnleben Measurement, modeling, and prediction of network quality with a focus on IoT
CN106484666B (en) Big data splitting and assembling method, device and public message management system
US20240071246A1 (en) Distributed Architecture for Structured Data Exchange and User Interface Transformation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20250207

Address after: East of 5th Floor, Building 2, No. 239, Shenzhou 4th Road, Aerospace Economic and Technological Development Zone, Xi'an City, Shaanxi Province 710199

Applicant after: SHAANXI NAVI BEIDOU INFORMATION TECHNOLOGY CO.,LTD.

Country or region after: China

Applicant after: Shaanxi Weixing Zhihang Technology Co.,Ltd.

Address before: East of 5th Floor, Building 2, No. 239, Shenzhou 4th Road, Aerospace Economic and Technological Development Zone, Xi'an City, Shaanxi Province 710199

Applicant before: SHAANXI NAVI BEIDOU INFORMATION TECHNOLOGY CO.,LTD.

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant