CN111934851A - Flight plan verification method and device based on Hash algorithm - Google Patents

Flight plan verification method and device based on Hash algorithm Download PDF

Info

Publication number
CN111934851A
CN111934851A CN202010727115.6A CN202010727115A CN111934851A CN 111934851 A CN111934851 A CN 111934851A CN 202010727115 A CN202010727115 A CN 202010727115A CN 111934851 A CN111934851 A CN 111934851A
Authority
CN
China
Prior art keywords
hash value
flight plan
message
hash
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010727115.6A
Other languages
Chinese (zh)
Inventor
程晓航
关礼安
朱立彬
张海
陆岩
邵欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
93209 Troops Of Chinese Pla
Original Assignee
93209 Troops Of Chinese Pla
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 93209 Troops Of Chinese Pla filed Critical 93209 Troops Of Chinese Pla
Priority to CN202010727115.6A priority Critical patent/CN111934851A/en
Publication of CN111934851A publication Critical patent/CN111934851A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • G08G5/003Flight plan management

Landscapes

  • Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a flight plan verification method and a flight plan verification device based on a Hash algorithm, which mainly aim at accurately verifying a wrong or tampered flight plan in the flight plan, and the main technical scheme comprises the following steps: a data receiving party receives data to be verified sent by a data sending party, wherein the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message; the data receiving party calculates and receives the flight plan message to obtain a second hash value; comparing the first hash value with the second hash value; if the first hash value is consistent with the second hash value, determining that the original flight plan message is transmitted without errors; and if the first hash value is inconsistent with the second hash value, determining that an error occurs in the original flight plan message transmission.

Description

Flight plan verification method and device based on Hash algorithm
Technical Field
The embodiment of the invention relates to the technical field of information processing, in particular to a flight plan verification method and device based on a Hash algorithm.
Background
The Flight Plan (Flight Plan) includes Flight plans of military aviation, civil aviation and navigation, and is an important component of Flight Information (Flight Information) and is used for representing the key element Information of an airplane identifier, a take-off airport, a destination airport, a planned take-off time, a Flight route, Flight heights of all Flight segments, machine types, tasks, communication modes and the like of the current Flight. The formats of the messages between the military and civil aviation are different, but the components are different.
In practical application, when a civil aviation district administration center reports a next-day flight plan to a civil aviation bureau operation and control center, or when a navigable flight service station reports a navigable flight plan to a local air administration department, and furthermore, when a military aviation lower-level air administration department reports a flight plan to a higher-level air administration department, a large number of flight plans may be sent, message errors may be caused due to communication and the like, and malicious invasion may occur particularly during wartime or terrorist attack, and the flight plans are tampered, so that chaos and even flight conflicts are caused. Therefore, it is necessary to check the flight plans in batches quickly to find the wrong message, and most of the current flight plan checks adopt a syntax semantic check method to check the validity of the message field information, but the method cannot find the error or tampering in the legal value range.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for verifying a flight plan based on a hash algorithm, and mainly aim to accurately verify an incorrect or tampered flight plan in a flight plan.
In order to solve the above problems, embodiments of the present invention mainly provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a flight plan verification method based on a hash algorithm, including:
a data receiving party receives data to be verified sent by a data sending party, wherein the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message;
calculating a received flight plan message to obtain a second hash value;
comparing the first hash value with the second hash value;
if the first hash value is consistent with the second hash value, determining that the original flight plan message is transmitted without errors;
and if the first hash value is inconsistent with the second hash value, determining that an error occurs in the original flight plan message transmission.
Optionally, the calculating, for the flight plan packet, to obtain a second hash value includes:
and calculating the flight plan message by adopting a Hash SHA256 algorithm to obtain a second Hash value, wherein the second Hash value is a character string of 256 characters.
In a second aspect, an embodiment of the present invention further provides a flight plan verification apparatus based on a hash algorithm, including:
the system comprises a receiving unit, a verification unit and a verification unit, wherein the receiving unit is used for receiving data to be verified sent by a data sending party, the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message;
the calculating unit is used for calculating the received flight plan message to obtain a second hash value;
the comparison unit is used for comparing the first hash value with the second hash value;
a first determining unit, configured to determine that the original flight plan packet is transmitted without error when it is determined that the first hash value is consistent with the second hash value;
and the second determining unit is used for determining that an error occurs in the original flight plan message transmission when the first hash value is determined to be inconsistent with the second hash value.
Optionally, the calculating unit is further configured to calculate the flight plan packet by using a hash SHA256 algorithm to obtain a second hash value, where the second hash value is a character string of 256 characters.
By the technical scheme, the technical scheme provided by the embodiment of the invention at least has the following advantages:
according to the flight plan verification method and device based on the Hash algorithm, a data receiving party receives data to be verified sent by a data sending party, the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first Hash value of the original flight plan message; calculating a received flight plan message to obtain a second hash value; comparing the first hash value with the second hash value; if the first hash value is consistent with the second hash value, determining that the original flight plan message is error-free; and if the first hash value is inconsistent with the second hash value, determining that the original flight plan message has errors. Compared with the prior art, the embodiment of the invention can accurately verify the wrong or tampered flight plan in the flight plan.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the embodiments of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a flight plan verification method based on a hash algorithm according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a flight plan verification apparatus based on a hash algorithm according to an embodiment of the present invention;
fig. 3 shows an architecture diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention also provides a flight plan verification method based on the hash algorithm, as shown in fig. 1, the method comprises the following steps:
101. a data receiving party receives data to be verified sent by a data sending party, wherein the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message;
according to the invention, the check field is added, and the hash value of the original flight plan message is used as the check field, in practical application, the first hash value is transmitted at the background of the data sending end and is invisible to a user, so that the original flight plan message can be prevented from being tampered.
102. Calculating a received flight plan message to obtain a second hash value;
the Hash Algorithm (Hash Algorithm) is to generate a character string with fixed length by a certain calculation for an input with any length, and the output character string becomes the Hash value of the input.
103. Comparing the first hash value with the second hash value;
if the first hash value is consistent with the second hash value, executing step 104; if the first hash value is not consistent with the second hash value, go to step 105.
104. Determining the error-free transmission of the original flight plan message;
105. and determining that an error occurs in the original flight plan message transmission.
In the flight plan verification method based on the hash algorithm provided by the embodiment of the invention, a data receiving party receives data to be verified sent by a data sending party, the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message; calculating a received flight plan message to obtain a second hash value; comparing the first hash value with the second hash value; if the first hash value is consistent with the second hash value, determining that the original flight plan message is error-free; and if the first hash value is inconsistent with the second hash value, determining that the original flight plan message has errors. Compared with the prior art, the embodiment of the invention can accurately verify the wrong or tampered flight plan in the flight plan.
Specific examples will be described below, but specific fields or values appearing in the following embodiments are merely illustrative examples and are not intended to be limiting.
Taking a civil aviation flight planning report (FPL) as an example for explanation, the following IS a civil aviation FPL message, a CA XXXX flight of a certain aviation, a take-off airport IS a first international airport, and a landing airport IS a second international airport FPL-CCA XXXX-IS
-A332/H-SDE2E3FGHIJ2J4J5M1RWY/LB1D1
-ZSSS2035
-K0859S1040 PIKAS G330 PIMOL A593 BTO W82 DOGAR
-ZBAA0153 ZBYN
-STS/ALTRV HEAD PBN/A1B2B3B4B5D1L1 NAV/GBAS REG/B6513 EET/ZBPE0112
SEL/KMAL PER/C RIF/FRT N640 ZBYN RMK/TCAS
JUTI CAOZUO GUOCHENG ZHOGN
Firstly, sequentially connecting fields of an original flight plan message into a long character string (as shown above); secondly, the hash value (H1) of the flight plan is calculated to be 347434f5fc63ca9f671d03d2dc9fba8de641e917689df66f1a97bfaace8cc 306;
and transmitting the first hash value serving as a check field and the original flight plan message to a data receiving end together, wherein the first hash value is transmitted in the background and invisible to a user.
If the landing airport of the original flight plan message is tampered with as a third airport, the original flight plan message is only tampered with as a letter,
FPL-CCA1532-IS
-A332/H-SDE2E3FGHIJ2J4J5M1RWY/LB1D1
-ZSSS2035
-K0859S1040 PIKAS G330 PIMOL A593 BTO W82 DOGAR
-ZBAD0153 ZBYN
-STS/ALTRV HEAD PBN/A1B2B3B4B5D1L1 NAV/GBAS REG/B6513 EET/ZBPE0112
SEL/KMAL PER/C RIF/FRT N640 ZBYN RMK/TCAS
after the data receiving end receives the original flight plan message, calculating a second hash value (H2) of the received original flight plan message as
4308ccf8c61b887b06215bae89fd4b4792759f8b4de52b347c2ca1676ecd072d;
Comparing the first hash value (H1) with the second hash value (H2), finding that although the original message only differs by one letter, the hash values of the two are very different, and the message has errors, and entering an error correction program. The above example shows that any slight change of the original flight plan message causes a huge change of the hash value, so that the identification is convenient;
optionally, because the flight plan verification device based on the hash algorithm described in this embodiment is a device that can execute the flight plan verification method based on the hash algorithm in the embodiment of the present invention, based on the flight plan verification method based on the hash algorithm described in the embodiment of the present invention, a person skilled in the art can understand a specific implementation manner of the flight plan verification device based on the hash algorithm and various variations thereof in this embodiment, so how the flight plan verification device based on the hash algorithm implements the flight plan verification method based on the hash algorithm in the embodiment of the present invention is not described in detail here. As long as those skilled in the art implement the apparatus used in the method for verifying a flight plan based on a hash algorithm in the embodiment of the present invention, the apparatus is within the scope of the present application.
Further, an embodiment of the present invention further provides a flight plan verification apparatus based on a hash algorithm, as shown in fig. 2, including:
the receiving unit 21 is configured to receive data to be verified sent by a data sending party, where the data to be verified includes an original flight plan packet and a verification field, and the verification field is a first hash value of the original flight plan packet;
the calculating unit 22 is configured to calculate a received flight plan message to obtain a second hash value;
a comparing unit 23, configured to compare the first hash value with the second hash value;
a first determining unit 24, configured to determine that the original flight plan packet is transmitted without error when it is determined that the first hash value is consistent with the second hash value;
a second determining unit 25, configured to determine that an error occurs in the original flight plan message transmission when it is determined that the first hash value is inconsistent with the second hash value.
Further, the calculating unit 22 is further configured to calculate, by using a hash SHA256 algorithm, a second hash value for the flight plan packet, where the second hash value is a character string of 256 characters.
According to the flight plan verification device based on the Hash algorithm, a data receiving party receives data to be verified sent by a data sending party, the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first Hash value of the original flight plan message; calculating a received flight plan message to obtain a second hash value; comparing the first hash value with the second hash value; if the first hash value is consistent with the second hash value, determining that the original flight plan message is error-free; and if the first hash value is inconsistent with the second hash value, determining that the original flight plan message has errors. Compared with the prior art, the embodiment of the invention can accurately verify the wrong or tampered flight plan in the flight plan.
An embodiment of the present invention provides an electronic device, as shown in fig. 3, including: at least one processor (processor) 31; and at least one memory (memory)32, a bus 33, connected to the processor 31; wherein the content of the first and second substances,
the processor 31 and the memory 32 complete mutual communication through the bus 33;
the processor 31 is configured to call program instructions in the memory 32 to perform the steps in the above-described method embodiments.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the method embodiments described above.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (4)

1. A flight plan verification method based on a Hash algorithm is characterized by comprising the following steps:
a data receiving party receives data to be verified sent by a data sending party, wherein the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message;
calculating a received flight plan message to obtain a second hash value;
comparing the first hash value with the second hash value;
if the first hash value is consistent with the second hash value, determining that the original flight plan message is transmitted without errors;
and if the first hash value is inconsistent with the second hash value, determining that an error occurs in the original flight plan message transmission.
2. The method of claim 1, wherein the computing a second hash value for the flight plan message comprises:
and calculating the flight plan message by adopting a Hash SHA256 algorithm to obtain a second Hash value, wherein the second Hash value is a character string of 256 characters.
3. A flight plan verification device based on a Hash algorithm is characterized by comprising:
the system comprises a receiving unit, a verification unit and a verification unit, wherein the receiving unit is used for receiving data to be verified sent by a data sending party, the data to be verified comprises an original flight plan message and a verification field, and the verification field is a first hash value of the original flight plan message;
the calculating unit is used for calculating the received flight plan message to obtain a second hash value;
the comparison unit is used for comparing the first hash value with the second hash value;
a first determining unit, configured to determine that the original flight plan packet is transmitted without error when it is determined that the first hash value is consistent with the second hash value;
and the second determining unit is used for determining that an error occurs in the original flight plan message transmission when the first hash value is determined to be inconsistent with the second hash value.
4. The apparatus according to claim 3, wherein the computing unit is further configured to compute a second hash value for the flight plan message by using a hash SHA256 algorithm, where the second hash value is a 256-character string.
CN202010727115.6A 2020-07-26 2020-07-26 Flight plan verification method and device based on Hash algorithm Pending CN111934851A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010727115.6A CN111934851A (en) 2020-07-26 2020-07-26 Flight plan verification method and device based on Hash algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010727115.6A CN111934851A (en) 2020-07-26 2020-07-26 Flight plan verification method and device based on Hash algorithm

Publications (1)

Publication Number Publication Date
CN111934851A true CN111934851A (en) 2020-11-13

Family

ID=73314662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010727115.6A Pending CN111934851A (en) 2020-07-26 2020-07-26 Flight plan verification method and device based on Hash algorithm

Country Status (1)

Country Link
CN (1) CN111934851A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108921552A (en) * 2018-06-15 2018-11-30 中金金融认证中心有限公司 A kind of method and device of experimental evidence
CN109922049A (en) * 2019-02-02 2019-06-21 立旃(上海)科技有限公司 Verifying device and method based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108921552A (en) * 2018-06-15 2018-11-30 中金金融认证中心有限公司 A kind of method and device of experimental evidence
CN109922049A (en) * 2019-02-02 2019-06-21 立旃(上海)科技有限公司 Verifying device and method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田勇: "一线知天下-互联网", 31 October 2014, 吉林人民出版社, pages: 126 *

Similar Documents

Publication Publication Date Title
CN104899952B (en) Work attendance method and device based on instant messaging application
CN105335310B (en) Interface definition method and data transmission method and device
CN112380294B (en) Block chain cross-chain access method and device
CN111262759A (en) Internet of things platform testing method, device, equipment and storage medium
CN110928891B (en) Data consistency detection method, device, computing equipment and medium
CN112181804A (en) Parameter checking method, equipment and storage medium
CN106897342B (en) Data verification method and equipment
CN111428208A (en) Application software authorization method, device and storage medium
CN110046509B (en) Method and device for hiding transaction written into block chain
CN106095688A (en) A kind of software performance testing method and device
US11489746B2 (en) Detection device, detection method, and detection program
CN108924185A (en) Interface creation method and device
KR101596257B1 (en) System and method for developing of service based on software product line
CN111934851A (en) Flight plan verification method and device based on Hash algorithm
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
Bonargent et al. Adaptive observer design for a class of Lipschitz nonlinear systems with multirate outputs and uncertainties: Application to attitude estimation with gyro bias
CN111915931A (en) Batch flight plan error correction method, device and system based on Mercker tree
CN109064121B (en) Method and device for signing electronic contract
CN112087475A (en) Message pushing method and device for cloud platform component application and message server
CN110968888B (en) Data processing method and device
CN110033264B (en) Merkel tree corresponding to building block and simple payment verification method and device
CN112953786B (en) Information processing method, device, system and computer readable storage medium
CN107908516B (en) Data display method and device
CN112632211A (en) Semantic information processing method and equipment for mobile robot
CN105791888A (en) Video analyzing method and video analyzing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination