CN107888328A - Information processing method - Google Patents

Information processing method Download PDF

Info

Publication number
CN107888328A
CN107888328A CN201610875944.2A CN201610875944A CN107888328A CN 107888328 A CN107888328 A CN 107888328A CN 201610875944 A CN201610875944 A CN 201610875944A CN 107888328 A CN107888328 A CN 107888328A
Authority
CN
China
Prior art keywords
byte
code character
generation code
group
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610875944.2A
Other languages
Chinese (zh)
Inventor
戴晓罡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to CN201610875944.2A priority Critical patent/CN107888328A/en
Publication of CN107888328A publication Critical patent/CN107888328A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0014Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0023Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the signalling
    • H04L1/0028Formatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location

Abstract

The invention provides information processing method, methods described includes:First generation code character is extracted from raw information according to extraction feature;First generation code character is converted to by second generation code character according to predetermined transformation rule;Second generation code character is decoded according to decoding rule, to obtain target information.Therefore, efficiently raw information can be handled to obtain target information.

Description

Information processing method
Technical field
The present invention relates to information processing method.
Background technology
The industrial equipment of such as power equipment may be coupled in the network of such as internet, and enter according to predetermined agreement Row communication, for example, sending the running log of industrial equipment in the form of wrapping according to predetermined communication protocol.Such bag is generally adopted With 16 system forms.In order to read the content in bag, user needs manually to proceed as follows:The bag of 16 system forms is turned It is changed to the form of 2 systems;Then according to Request for Comment (RFC, the Request For formulated according to used agreement Comments) bag of 2 system forms is divided into different fields by document;Finally these fields are explained according to RFC documents Or analysis, to obtain required information.For example, when using Internet Protocol Security (Internet Protocol Security, IPsec when) security protocol is communicated, the both sides communicated with each other can send respective configuration information to each other.So Configuration information can include, with Advanced Encryption Standard (Advanced Encryption Standard, AES) such as plus The related information of close algorithm, the information related to the key length of 128 (bit) and such as SHA (Secure Hash Algorithm, SHA) the related information of checking algorithm, with such as pre-share key (Pre-Shared Key, PSK) The related information of authentication method.The configuration of these information can be used for verification operation person in a device whether the reality with equipment Whether operation is consistent.However, such manually processing bag efficiency is very low and error rate is very high.
The content of the invention
It is an object of the invention to solve above-mentioned and/or other technical problems.Therefore, exemplary embodiment provides one Kind can be handled efficiently raw information to obtain the information processing method of target information.
In one exemplary embodiment, there is provided a kind of information processing method, methods described include:According to extraction feature First generation code character is extracted from raw information;First generation code character is converted into second generation code character;According to decoding rule to the second generation Code character is decoded, so as to obtain target information.
Therefore, automatically raw information can be handled, so as to be efficiently obtained target information, and can subtracted Less or prevent therefore manually handle mistake caused by raw information.
Methods described also includes:Extraction feature is determined according to raw information.When raw information is the day that industrial equipment is sent During the information included in will file, it is determined that the step of extraction feature includes:According to send journal file used by communication protocol To determine to extract feature.
Therefore, suitable extraction feature can be automatically selected according to raw information to extract first generation code character, so as to enter The processing of capable efficiently raw information.
First generation code character includes multiple bytes of 16 systems, and the step of first generation code character is converted into second generation code character wraps Include:It is multiple byte groups by multiple byte packets in first generation code character;Add for each byte group in the multiple byte group Guide is added to mark;The multiple byte group marked is guided to be combined to obtain second generation code character by with the addition of.By the first generation The step of multiple byte packets in code character are multiple byte groups includes:It is corresponding with placeholder being removed from the multiple byte Byte after remaining byte order be grouped into multiple byte groups.Each byte group in the multiple byte group includes phase With the N number of byte of quantity, described the step of obtaining second generation code character, also includes:When the word being grouped into last byte group When the quantity of section is less than N, at least one cover byte is added in last byte group.To be every in the multiple byte group The step of mark is guided in individual byte group addition includes:Addition represents that the byte group exists before the first character section of each byte group The guide mark of position in code-group.
Therefore, first generation code character automatically can be converted into second generation code character, so as to improve the efficiency of information processing and Accuracy.In addition, so obtained second generation code character can be directly inputted to existing " Wireshark " groupware, from And it can simply and efficiently obtain target information.
Methods described also includes:Decoding rule is determined according to raw information.9th, method as claimed in claim 8, it is special Sign is that raw information is the information included in the journal file that industrial equipment is sent, it is determined that the step of decoding rule includes:Root Communication protocol is regular to determine to decode used by according to journal file is sent.10th, method as claimed in claim 9, its feature It is, decoding rule includes Request for Comment file corresponding with communication protocol used by transmission journal file, decodes rule bag The step of including to obtain target information includes:According to Request for Comment text corresponding with communication protocol used by transmission journal file Part, the byte for being pointed to diverse location in second generation code character are decoded, corresponding with the byte in second generation code character to obtain Target information.
Therefore, automatically second generation code character can be decoded to obtain target information, so as to reduce or prevent The mistake caused by manually operated.
Brief description of the drawings
The following drawings is only intended to, in doing exemplary embodiment schematic illustration and explanation, not limit the model of the present invention Enclose.Wherein,
Fig. 1 is the flow chart for showing the information processing method according to exemplary embodiment;
Fig. 2 is the diagram for the example for showing the raw information according to exemplary embodiment;
Fig. 3 is the diagram for the example for showing the second generation code character according to exemplary embodiment;
Fig. 4 is the diagram for the example for showing the target information according to exemplary embodiment.
Embodiment
In order to which technical characteristic, purpose and the effect of the present invention is more clearly understood, now control illustrates this hair Bright embodiment.
Fig. 1 is the flow chart for showing the information processing method according to exemplary embodiment.As shown in fig. 1, operating In S110, first generation code character can be extracted from raw information according to extraction feature.Here, raw information can be such as electric power The information included in the journal file that the industrial equipment of equipment is sent.Set for example, raw information can be Siemens's remote control Included in standby CP-8022 GPRS (General Packet Radio Service, GPRS) communication log Information, for example, state that GPRS module is current (such as, if obtain address, with the presence or absence of mistake etc.), flow into GPRS module Message accounting and operator base station return such as operator's numbering and the status information the time.Such system day Will file can be to be transmitted using the bag of end-to-end protocol (Peer-Peer Protocol, PPP) agreement.
Extraction feature can be the feature for the starting position for indicating first code group.According to exemplary embodiment, Ke Yigen Determine to extract feature according to raw information.For example, it can be determined according to communication protocol used by the raw information as bag Extract feature.
Fig. 2 is the diagram of the example for the part for showing the raw information according to exemplary embodiment.As shown in Figure 2 Raw information can be using the information included in the bag of ppp protocol., can be according to raw information according to exemplary embodiment Used ppp protocol determines that extraction is characterized as " c021 ".Here, the extraction feature " c021 " in raw information can indicate Communication protocol is ppp protocol used by sending raw information.When sending raw information using other communication protocols, extraction is special Sign can be different.
When being determined that extraction is characterized as, first code can be extracted from raw information according to the extraction feature of determination Group.For example, as shown in Figure 2, it can determine that extraction is characterized as " c021 " according to ppp protocol.It is then possible in raw information Find to extract the code c0217d21-7d207d20- ... of feature " c021 " beginning.Here it is possible to extract from extraction feature Start until the code c0217d21-7d207d20-7d387d21-7d247d29-607d227d-267d207d- terminated 2a7d207d-207d257d-267d23c5-6b6d7d27-7d227d28-7d2251767e is as first generation code character.
Referring back to Fig. 1, after first generation code character is obtained, in step S130, first generation code character can be converted to Two code-groups.
Such as in the above embodiments, the first generation code character extracted from raw information as shown in Figure 2 c0217d21-7d207d20-7d387d21-7d247d29-607d227d-267d207d-2a7d207d-207d257d- 267d23c5-6b6d7d27-7d227d28-7d2251767e can include the byte of multiple 16 systems, for example, c0,21,7d, 21、7d、20、7d、20、…….Therefore, can be multiple byte groups first by these byte packets.By multiple byte packets During for multiple byte groups, multiple bytes can be handled.For example, the byte of 7d such as here can be represented and accounted for Position symbol.Therefore, can be with removal byte 7d corresponding with placeholder in multiple bytes.Eliminate byte corresponding with placeholder it Can obtain afterwards remaining byte c0,21,21,20,20 ....It is then possible to be subtracted from remaining byte and basis ASCII coding rules represent " 20 " of " 0 ".By such operation, can obtain c0,21,01,00,00 ....Finally, may be used Using will obtain byte c0,21,01,00,00 ... sequential packet is multiple byte group:
Here, each byte group can include the N number of byte of identical quantity, for example, can include 8 bytes.One , can be at last when the quantity for the byte being grouped into last byte group is less than N in individual exemplary embodiment At least one cover byte is added in byte group, so that the quantity of the byte in last byte group is equal to N.It is superincumbent In example, cover byte can be space character " ".
It is then possible to mark is guided in addition in each byte group.For example, can be in the first character section of each byte group Addition before represents the guide mark of the position of the byte group in second generation code character:
Here, mark is guided to use 16 systems.For example, " 000000 " represents first in the byte group of the row For individual byte c0 in second generation code character middle position in the 1st, " 000008 " represents the first character section 09 in the byte group of the row In second generation code character middle position in the 9th, the first character section 05 that " 000010 " represents to be located in the byte group of the row is in the second generation It is located at the 17th in code character, the first character section 08 that " 000018 " represents to be located in the byte group of the row is in second generation code character middle position In the 25th.
It is then possible to the byte group marked is guided to be combined by with the addition of, so as to obtain second generation code character.Fig. 3 is to show Go out the diagram of the example of the second generation code character according to current exemplary embodiment.
,, can be according to decoding rule to second in operation S150 after obtained second generation code character referring back to Fig. 1 Code-group is decoded, so as to obtain target information.Fig. 4 is the example for showing the target information according to exemplary embodiment Diagram.
Here, decoding rule can determine according to raw information.It is, for example, possible to use used by sending raw information Internet communication protocol is regular to determine to decode.Therefore, decoding rule can be included with being communicated used by sending journal file Request for Comment corresponding to agreement (Request For Comments, RFC) file.RFC files can describe such as PPP associations The single file of the detailed description of the internet communication protocol of view or multiple files.RFC files can be ranked with numbering, and difference is compiled Number RFC files different agreements can be described.For example, the raw information shown in Fig. 2 can be to be sent using ppp protocol The information included in bag, hence, it can be determined that and selecting the RFC files of description ppp protocol to be used as decoding used herein above Rule.
After decoding rule is determined, target information can be obtained according to the decoding rule of determination.For example, such as Fig. 4 Shown in, according to the decoding of determination rule, the code 01 04 09 60 in second generation code character can be decoded to obtain mesh Mark information Maximum Receive Unit:2400 (maximum recruiting unit:2400).
It described above is being handled raw information to obtain the method for target information according to specific embodiment.So And exemplary embodiment not limited to this, in some exemplary embodiments, Overall Steps or a part of step in methods described It can be automatically carried out by special or general software or hardware.For example, special or general software or hardware can be passed through To complete to operate S110-S150.In another example, behaviour can be performed using existing " Wireshark " groupware Make S150.In this example, second generation code character can be input in " Wireshark " groupware, so as to pass through this Software automatically determines decoding rule and obtains target information.Here, " Wireshark " groupware can be original according to sending Communication protocol calls the corresponding RFC files prestored used by information, and can utilize the RFC files called Second generation code character is decoded as decoding rule, to obtain target information.Because " Wireshark " groupware is known , so omitting relative specific descriptions here.
As it appears from the above, according to exemplary embodiment, simply and accurately raw information can be handled, to obtain mesh Mark information.Therefore, it can greatly shorten to obtain the processing time needed for target information, and can prevent because user is carried out manually Mistake caused by the conversion of information and code.
It should be appreciated that although this specification is described according to each embodiment, not each embodiment only includes one Individual independent technical scheme, this narrating mode of specification is only that those skilled in the art will should say for clarity Bright book is as an entirety, and the technical solutions in the various embodiments may also be suitably combined, and forming those skilled in the art can be with The other embodiment of understanding.
The schematical embodiment of the present invention is the foregoing is only, is not limited to the scope of the present invention.It is any Those skilled in the art, equivalent variations, modification and the combination made on the premise of the design of the present invention and principle is not departed from, The scope of protection of the invention all should be belonged to.

Claims (10)

1. information processing method, it is characterised in that methods described includes:
First generation code character is extracted from raw information according to extraction feature;
First generation code character is converted into second generation code character;
Second generation code character is decoded according to decoding rule, so as to obtain target information.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Extraction feature is determined according to raw information.
3. method as claimed in claim 2, it is characterised in that raw information is included in the journal file that industrial equipment is sent Information, it is determined that extraction feature the step of include:
According to send journal file used by communication protocol come determine extract feature.
4. the method as described in claim 1, it is characterised in that first generation code character includes multiple bytes of 16 systems, by first Code-group, which is converted to the step of second generation code character, to be included:
It is multiple byte groups by multiple byte packets in first generation code character;
Mark is guided for each byte group addition in the multiple byte group;
The multiple byte group marked is guided to be combined to obtain second generation code character by with the addition of.
5. method as claimed in claim 4, it is characterised in that by multiple byte packets in first generation code character be multiple bytes The step of group, includes:
Remaining byte order is grouped into multiple words after byte corresponding with placeholder is removed from the multiple byte Section group.
6. method as claimed in claim 5, it is characterised in that each byte group in the multiple byte group includes identical number N number of byte is measured, described the step of obtaining second generation code character also includes:
When the quantity for the byte being grouped into last byte group is less than N, added at least in last byte group One cover byte.
7. method as claimed in claim 6, it is characterised in that be each byte group addition guide in the multiple byte group The step of mark, includes:
Addition represents the guide mark of the position of the byte group in code-group before the first character section of each byte group.
8. the method as described in claim 1, it is characterised in that methods described also includes:
Decoding rule is determined according to raw information.
9. method as claimed in claim 8, it is characterised in that raw information is included in the journal file that industrial equipment is sent Information, it is determined that decoding rule step include:
According to send journal file used by communication protocol come determine decoding rule.
10. method as claimed in claim 9, it is characterised in that decoding rule is included with leading to used by sending journal file Believe Request for Comment file corresponding to agreement, decoding rule includes including the step of obtaining target information:
According to Request for Comment file corresponding with communication protocol used by transmission journal file, it is pointed in second generation code character not Byte with position is decoded, to obtain target information corresponding with the byte in second generation code character.
CN201610875944.2A 2016-09-30 2016-09-30 Information processing method Pending CN107888328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610875944.2A CN107888328A (en) 2016-09-30 2016-09-30 Information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610875944.2A CN107888328A (en) 2016-09-30 2016-09-30 Information processing method

Publications (1)

Publication Number Publication Date
CN107888328A true CN107888328A (en) 2018-04-06

Family

ID=61769267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610875944.2A Pending CN107888328A (en) 2016-09-30 2016-09-30 Information processing method

Country Status (1)

Country Link
CN (1) CN107888328A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311576A (en) * 2019-07-31 2021-02-02 中兴通讯股份有限公司 OTA upgrade diagnosis method and device, wireless routing equipment and terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118540A1 (en) * 2005-11-23 2007-05-24 Oracle International Corporation integrating medical data and images in a database management system
CN101247233A (en) * 2008-03-24 2008-08-20 北京飞天诚信科技有限公司 Method for generating message summary
CN102447575A (en) * 2011-10-08 2012-05-09 烽火通信科技股份有限公司 Method for analyzing and managing log file with hexadecimal data
CN102542072A (en) * 2012-01-31 2012-07-04 首钢京唐钢铁联合有限责任公司 Method for analyzing tracking fault data of hot-rolling conveying chain
CN105224447A (en) * 2014-06-11 2016-01-06 联创汽车电子有限公司 Engine controller software diagnosis module test method and test macro

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118540A1 (en) * 2005-11-23 2007-05-24 Oracle International Corporation integrating medical data and images in a database management system
CN101247233A (en) * 2008-03-24 2008-08-20 北京飞天诚信科技有限公司 Method for generating message summary
CN102447575A (en) * 2011-10-08 2012-05-09 烽火通信科技股份有限公司 Method for analyzing and managing log file with hexadecimal data
CN102542072A (en) * 2012-01-31 2012-07-04 首钢京唐钢铁联合有限责任公司 Method for analyzing tracking fault data of hot-rolling conveying chain
CN105224447A (en) * 2014-06-11 2016-01-06 联创汽车电子有限公司 Engine controller software diagnosis module test method and test macro

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311576A (en) * 2019-07-31 2021-02-02 中兴通讯股份有限公司 OTA upgrade diagnosis method and device, wireless routing equipment and terminal equipment
WO2021017919A1 (en) * 2019-07-31 2021-02-04 中兴通讯股份有限公司 Ota update diagnostic method and apparatus, wireless routing device, and terminal device
CN112311576B (en) * 2019-07-31 2023-11-24 中兴通讯股份有限公司 OTA upgrading diagnosis method and device, wireless routing equipment and terminal equipment

Similar Documents

Publication Publication Date Title
CN109617680B (en) Encryption method, device, equipment and medium
EP2638661B1 (en) Method of performing a financial transaction via unsecured public telecommunication infrastructure and an apparatus for same
US20140317406A1 (en) Communication between network nodes that are not directly connected
US20180253559A1 (en) Secured lossless data compression using encrypted headers
CN103888292A (en) Tool and method for operation and maintenance of distribution terminal
CN103037323B (en) Based on random code verification system and the verification method thereof of mobile terminal
CN101964722A (en) Be used for method for communicating and system
CN108430092A (en) Obtain, provide method, equipment and the medium of wireless access point access information
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN106815733A (en) Data processing method, device and system and printer
CN102780588A (en) Deep message detection method, device, network equipment and system
CN108804487A (en) A kind of method and device of extraction target character
CN104640091A (en) Method for encryption communication of short message of mobile phone
CN115695051A (en) Data center transmission management system based on remote network platform architecture
CN109758629B (en) Dialysis data transmission method, device, equipment and storage medium
CN103152401A (en) Mobile terminal, login method and system through mobile terminal, and cloud server
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN107888328A (en) Information processing method
CN104065669B (en) A kind of spatial network encryption method
CN109460646A (en) Method for identifying ID, device, system, electronic equipment and readable medium
CN106375177A (en) Message transmission method and apparatus
CN105228114A (en) A kind of Encrypted short message receive-transmit system based on power failure navigation system and method
CN107294704B (en) Password generation method, password execution method and terminal
CN107613494A (en) A kind of large-scale consumer based on wireless device Handshake Protocol is registered method
CN104883383B (en) The method and device that data during combined anti-fake is identified are bound

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180406

WD01 Invention patent application deemed withdrawn after publication