CN107888328A - Information processing method - Google Patents
Information processing method Download PDFInfo
- Publication number
- CN107888328A CN107888328A CN201610875944.2A CN201610875944A CN107888328A CN 107888328 A CN107888328 A CN 107888328A CN 201610875944 A CN201610875944 A CN 201610875944A CN 107888328 A CN107888328 A CN 107888328A
- Authority
- CN
- China
- Prior art keywords
- byte
- code character
- generation code
- group
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0014—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0023—Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the signalling
- H04L1/0028—Formatting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0078—Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
Abstract
The invention provides information processing method, methods described includes:First generation code character is extracted from raw information according to extraction feature;First generation code character is converted to by second generation code character according to predetermined transformation rule;Second generation code character is decoded according to decoding rule, to obtain target information.Therefore, efficiently raw information can be handled to obtain target information.
Description
Technical field
The present invention relates to information processing method.
Background technology
The industrial equipment of such as power equipment may be coupled in the network of such as internet, and enter according to predetermined agreement
Row communication, for example, sending the running log of industrial equipment in the form of wrapping according to predetermined communication protocol.Such bag is generally adopted
With 16 system forms.In order to read the content in bag, user needs manually to proceed as follows:The bag of 16 system forms is turned
It is changed to the form of 2 systems;Then according to Request for Comment (RFC, the Request For formulated according to used agreement
Comments) bag of 2 system forms is divided into different fields by document;Finally these fields are explained according to RFC documents
Or analysis, to obtain required information.For example, when using Internet Protocol Security (Internet Protocol Security,
IPsec when) security protocol is communicated, the both sides communicated with each other can send respective configuration information to each other.So
Configuration information can include, with Advanced Encryption Standard (Advanced Encryption Standard, AES) such as plus
The related information of close algorithm, the information related to the key length of 128 (bit) and such as SHA (Secure
Hash Algorithm, SHA) the related information of checking algorithm, with such as pre-share key (Pre-Shared Key, PSK)
The related information of authentication method.The configuration of these information can be used for verification operation person in a device whether the reality with equipment
Whether operation is consistent.However, such manually processing bag efficiency is very low and error rate is very high.
The content of the invention
It is an object of the invention to solve above-mentioned and/or other technical problems.Therefore, exemplary embodiment provides one
Kind can be handled efficiently raw information to obtain the information processing method of target information.
In one exemplary embodiment, there is provided a kind of information processing method, methods described include:According to extraction feature
First generation code character is extracted from raw information;First generation code character is converted into second generation code character;According to decoding rule to the second generation
Code character is decoded, so as to obtain target information.
Therefore, automatically raw information can be handled, so as to be efficiently obtained target information, and can subtracted
Less or prevent therefore manually handle mistake caused by raw information.
Methods described also includes:Extraction feature is determined according to raw information.When raw information is the day that industrial equipment is sent
During the information included in will file, it is determined that the step of extraction feature includes:According to send journal file used by communication protocol
To determine to extract feature.
Therefore, suitable extraction feature can be automatically selected according to raw information to extract first generation code character, so as to enter
The processing of capable efficiently raw information.
First generation code character includes multiple bytes of 16 systems, and the step of first generation code character is converted into second generation code character wraps
Include:It is multiple byte groups by multiple byte packets in first generation code character;Add for each byte group in the multiple byte group
Guide is added to mark;The multiple byte group marked is guided to be combined to obtain second generation code character by with the addition of.By the first generation
The step of multiple byte packets in code character are multiple byte groups includes:It is corresponding with placeholder being removed from the multiple byte
Byte after remaining byte order be grouped into multiple byte groups.Each byte group in the multiple byte group includes phase
With the N number of byte of quantity, described the step of obtaining second generation code character, also includes:When the word being grouped into last byte group
When the quantity of section is less than N, at least one cover byte is added in last byte group.To be every in the multiple byte group
The step of mark is guided in individual byte group addition includes:Addition represents that the byte group exists before the first character section of each byte group
The guide mark of position in code-group.
Therefore, first generation code character automatically can be converted into second generation code character, so as to improve the efficiency of information processing and
Accuracy.In addition, so obtained second generation code character can be directly inputted to existing " Wireshark " groupware, from
And it can simply and efficiently obtain target information.
Methods described also includes:Decoding rule is determined according to raw information.9th, method as claimed in claim 8, it is special
Sign is that raw information is the information included in the journal file that industrial equipment is sent, it is determined that the step of decoding rule includes:Root
Communication protocol is regular to determine to decode used by according to journal file is sent.10th, method as claimed in claim 9, its feature
It is, decoding rule includes Request for Comment file corresponding with communication protocol used by transmission journal file, decodes rule bag
The step of including to obtain target information includes:According to Request for Comment text corresponding with communication protocol used by transmission journal file
Part, the byte for being pointed to diverse location in second generation code character are decoded, corresponding with the byte in second generation code character to obtain
Target information.
Therefore, automatically second generation code character can be decoded to obtain target information, so as to reduce or prevent
The mistake caused by manually operated.
Brief description of the drawings
The following drawings is only intended to, in doing exemplary embodiment schematic illustration and explanation, not limit the model of the present invention
Enclose.Wherein,
Fig. 1 is the flow chart for showing the information processing method according to exemplary embodiment;
Fig. 2 is the diagram for the example for showing the raw information according to exemplary embodiment;
Fig. 3 is the diagram for the example for showing the second generation code character according to exemplary embodiment;
Fig. 4 is the diagram for the example for showing the target information according to exemplary embodiment.
Embodiment
In order to which technical characteristic, purpose and the effect of the present invention is more clearly understood, now control illustrates this hair
Bright embodiment.
Fig. 1 is the flow chart for showing the information processing method according to exemplary embodiment.As shown in fig. 1, operating
In S110, first generation code character can be extracted from raw information according to extraction feature.Here, raw information can be such as electric power
The information included in the journal file that the industrial equipment of equipment is sent.Set for example, raw information can be Siemens's remote control
Included in standby CP-8022 GPRS (General Packet Radio Service, GPRS) communication log
Information, for example, state that GPRS module is current (such as, if obtain address, with the presence or absence of mistake etc.), flow into GPRS module
Message accounting and operator base station return such as operator's numbering and the status information the time.Such system day
Will file can be to be transmitted using the bag of end-to-end protocol (Peer-Peer Protocol, PPP) agreement.
Extraction feature can be the feature for the starting position for indicating first code group.According to exemplary embodiment, Ke Yigen
Determine to extract feature according to raw information.For example, it can be determined according to communication protocol used by the raw information as bag
Extract feature.
Fig. 2 is the diagram of the example for the part for showing the raw information according to exemplary embodiment.As shown in Figure 2
Raw information can be using the information included in the bag of ppp protocol., can be according to raw information according to exemplary embodiment
Used ppp protocol determines that extraction is characterized as " c021 ".Here, the extraction feature " c021 " in raw information can indicate
Communication protocol is ppp protocol used by sending raw information.When sending raw information using other communication protocols, extraction is special
Sign can be different.
When being determined that extraction is characterized as, first code can be extracted from raw information according to the extraction feature of determination
Group.For example, as shown in Figure 2, it can determine that extraction is characterized as " c021 " according to ppp protocol.It is then possible in raw information
Find to extract the code c0217d21-7d207d20- ... of feature " c021 " beginning.Here it is possible to extract from extraction feature
Start until the code c0217d21-7d207d20-7d387d21-7d247d29-607d227d-267d207d- terminated
2a7d207d-207d257d-267d23c5-6b6d7d27-7d227d28-7d2251767e is as first generation code character.
Referring back to Fig. 1, after first generation code character is obtained, in step S130, first generation code character can be converted to
Two code-groups.
Such as in the above embodiments, the first generation code character extracted from raw information as shown in Figure 2
c0217d21-7d207d20-7d387d21-7d247d29-607d227d-267d207d-2a7d207d-207d257d-
267d23c5-6b6d7d27-7d227d28-7d2251767e can include the byte of multiple 16 systems, for example, c0,21,7d,
21、7d、20、7d、20、…….Therefore, can be multiple byte groups first by these byte packets.By multiple byte packets
During for multiple byte groups, multiple bytes can be handled.For example, the byte of 7d such as here can be represented and accounted for
Position symbol.Therefore, can be with removal byte 7d corresponding with placeholder in multiple bytes.Eliminate byte corresponding with placeholder it
Can obtain afterwards remaining byte c0,21,21,20,20 ....It is then possible to be subtracted from remaining byte and basis
ASCII coding rules represent " 20 " of " 0 ".By such operation, can obtain c0,21,01,00,00 ....Finally, may be used
Using will obtain byte c0,21,01,00,00 ... sequential packet is multiple byte group:
Here, each byte group can include the N number of byte of identical quantity, for example, can include 8 bytes.One
, can be at last when the quantity for the byte being grouped into last byte group is less than N in individual exemplary embodiment
At least one cover byte is added in byte group, so that the quantity of the byte in last byte group is equal to N.It is superincumbent
In example, cover byte can be space character " ".
It is then possible to mark is guided in addition in each byte group.For example, can be in the first character section of each byte group
Addition before represents the guide mark of the position of the byte group in second generation code character:
Here, mark is guided to use 16 systems.For example, " 000000 " represents first in the byte group of the row
For individual byte c0 in second generation code character middle position in the 1st, " 000008 " represents the first character section 09 in the byte group of the row
In second generation code character middle position in the 9th, the first character section 05 that " 000010 " represents to be located in the byte group of the row is in the second generation
It is located at the 17th in code character, the first character section 08 that " 000018 " represents to be located in the byte group of the row is in second generation code character middle position
In the 25th.
It is then possible to the byte group marked is guided to be combined by with the addition of, so as to obtain second generation code character.Fig. 3 is to show
Go out the diagram of the example of the second generation code character according to current exemplary embodiment.
,, can be according to decoding rule to second in operation S150 after obtained second generation code character referring back to Fig. 1
Code-group is decoded, so as to obtain target information.Fig. 4 is the example for showing the target information according to exemplary embodiment
Diagram.
Here, decoding rule can determine according to raw information.It is, for example, possible to use used by sending raw information
Internet communication protocol is regular to determine to decode.Therefore, decoding rule can be included with being communicated used by sending journal file
Request for Comment corresponding to agreement (Request For Comments, RFC) file.RFC files can describe such as PPP associations
The single file of the detailed description of the internet communication protocol of view or multiple files.RFC files can be ranked with numbering, and difference is compiled
Number RFC files different agreements can be described.For example, the raw information shown in Fig. 2 can be to be sent using ppp protocol
The information included in bag, hence, it can be determined that and selecting the RFC files of description ppp protocol to be used as decoding used herein above
Rule.
After decoding rule is determined, target information can be obtained according to the decoding rule of determination.For example, such as Fig. 4
Shown in, according to the decoding of determination rule, the code 01 04 09 60 in second generation code character can be decoded to obtain mesh
Mark information Maximum Receive Unit:2400 (maximum recruiting unit:2400).
It described above is being handled raw information to obtain the method for target information according to specific embodiment.So
And exemplary embodiment not limited to this, in some exemplary embodiments, Overall Steps or a part of step in methods described
It can be automatically carried out by special or general software or hardware.For example, special or general software or hardware can be passed through
To complete to operate S110-S150.In another example, behaviour can be performed using existing " Wireshark " groupware
Make S150.In this example, second generation code character can be input in " Wireshark " groupware, so as to pass through this
Software automatically determines decoding rule and obtains target information.Here, " Wireshark " groupware can be original according to sending
Communication protocol calls the corresponding RFC files prestored used by information, and can utilize the RFC files called
Second generation code character is decoded as decoding rule, to obtain target information.Because " Wireshark " groupware is known
, so omitting relative specific descriptions here.
As it appears from the above, according to exemplary embodiment, simply and accurately raw information can be handled, to obtain mesh
Mark information.Therefore, it can greatly shorten to obtain the processing time needed for target information, and can prevent because user is carried out manually
Mistake caused by the conversion of information and code.
It should be appreciated that although this specification is described according to each embodiment, not each embodiment only includes one
Individual independent technical scheme, this narrating mode of specification is only that those skilled in the art will should say for clarity
Bright book is as an entirety, and the technical solutions in the various embodiments may also be suitably combined, and forming those skilled in the art can be with
The other embodiment of understanding.
The schematical embodiment of the present invention is the foregoing is only, is not limited to the scope of the present invention.It is any
Those skilled in the art, equivalent variations, modification and the combination made on the premise of the design of the present invention and principle is not departed from,
The scope of protection of the invention all should be belonged to.
Claims (10)
1. information processing method, it is characterised in that methods described includes:
First generation code character is extracted from raw information according to extraction feature;
First generation code character is converted into second generation code character;
Second generation code character is decoded according to decoding rule, so as to obtain target information.
2. the method as described in claim 1, it is characterised in that methods described also includes:
Extraction feature is determined according to raw information.
3. method as claimed in claim 2, it is characterised in that raw information is included in the journal file that industrial equipment is sent
Information, it is determined that extraction feature the step of include:
According to send journal file used by communication protocol come determine extract feature.
4. the method as described in claim 1, it is characterised in that first generation code character includes multiple bytes of 16 systems, by first
Code-group, which is converted to the step of second generation code character, to be included:
It is multiple byte groups by multiple byte packets in first generation code character;
Mark is guided for each byte group addition in the multiple byte group;
The multiple byte group marked is guided to be combined to obtain second generation code character by with the addition of.
5. method as claimed in claim 4, it is characterised in that by multiple byte packets in first generation code character be multiple bytes
The step of group, includes:
Remaining byte order is grouped into multiple words after byte corresponding with placeholder is removed from the multiple byte
Section group.
6. method as claimed in claim 5, it is characterised in that each byte group in the multiple byte group includes identical number
N number of byte is measured, described the step of obtaining second generation code character also includes:
When the quantity for the byte being grouped into last byte group is less than N, added at least in last byte group
One cover byte.
7. method as claimed in claim 6, it is characterised in that be each byte group addition guide in the multiple byte group
The step of mark, includes:
Addition represents the guide mark of the position of the byte group in code-group before the first character section of each byte group.
8. the method as described in claim 1, it is characterised in that methods described also includes:
Decoding rule is determined according to raw information.
9. method as claimed in claim 8, it is characterised in that raw information is included in the journal file that industrial equipment is sent
Information, it is determined that decoding rule step include:
According to send journal file used by communication protocol come determine decoding rule.
10. method as claimed in claim 9, it is characterised in that decoding rule is included with leading to used by sending journal file
Believe Request for Comment file corresponding to agreement, decoding rule includes including the step of obtaining target information:
According to Request for Comment file corresponding with communication protocol used by transmission journal file, it is pointed in second generation code character not
Byte with position is decoded, to obtain target information corresponding with the byte in second generation code character.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610875944.2A CN107888328A (en) | 2016-09-30 | 2016-09-30 | Information processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610875944.2A CN107888328A (en) | 2016-09-30 | 2016-09-30 | Information processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888328A true CN107888328A (en) | 2018-04-06 |
Family
ID=61769267
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610875944.2A Pending CN107888328A (en) | 2016-09-30 | 2016-09-30 | Information processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888328A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112311576A (en) * | 2019-07-31 | 2021-02-02 | 中兴通讯股份有限公司 | OTA upgrade diagnosis method and device, wireless routing equipment and terminal equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118540A1 (en) * | 2005-11-23 | 2007-05-24 | Oracle International Corporation | integrating medical data and images in a database management system |
CN101247233A (en) * | 2008-03-24 | 2008-08-20 | 北京飞天诚信科技有限公司 | Method for generating message summary |
CN102447575A (en) * | 2011-10-08 | 2012-05-09 | 烽火通信科技股份有限公司 | Method for analyzing and managing log file with hexadecimal data |
CN102542072A (en) * | 2012-01-31 | 2012-07-04 | 首钢京唐钢铁联合有限责任公司 | Method for analyzing tracking fault data of hot-rolling conveying chain |
CN105224447A (en) * | 2014-06-11 | 2016-01-06 | 联创汽车电子有限公司 | Engine controller software diagnosis module test method and test macro |
-
2016
- 2016-09-30 CN CN201610875944.2A patent/CN107888328A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118540A1 (en) * | 2005-11-23 | 2007-05-24 | Oracle International Corporation | integrating medical data and images in a database management system |
CN101247233A (en) * | 2008-03-24 | 2008-08-20 | 北京飞天诚信科技有限公司 | Method for generating message summary |
CN102447575A (en) * | 2011-10-08 | 2012-05-09 | 烽火通信科技股份有限公司 | Method for analyzing and managing log file with hexadecimal data |
CN102542072A (en) * | 2012-01-31 | 2012-07-04 | 首钢京唐钢铁联合有限责任公司 | Method for analyzing tracking fault data of hot-rolling conveying chain |
CN105224447A (en) * | 2014-06-11 | 2016-01-06 | 联创汽车电子有限公司 | Engine controller software diagnosis module test method and test macro |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112311576A (en) * | 2019-07-31 | 2021-02-02 | 中兴通讯股份有限公司 | OTA upgrade diagnosis method and device, wireless routing equipment and terminal equipment |
WO2021017919A1 (en) * | 2019-07-31 | 2021-02-04 | 中兴通讯股份有限公司 | Ota update diagnostic method and apparatus, wireless routing device, and terminal device |
CN112311576B (en) * | 2019-07-31 | 2023-11-24 | 中兴通讯股份有限公司 | OTA upgrading diagnosis method and device, wireless routing equipment and terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109617680B (en) | Encryption method, device, equipment and medium | |
EP2638661B1 (en) | Method of performing a financial transaction via unsecured public telecommunication infrastructure and an apparatus for same | |
US20140317406A1 (en) | Communication between network nodes that are not directly connected | |
US20180253559A1 (en) | Secured lossless data compression using encrypted headers | |
CN103888292A (en) | Tool and method for operation and maintenance of distribution terminal | |
CN103037323B (en) | Based on random code verification system and the verification method thereof of mobile terminal | |
CN101964722A (en) | Be used for method for communicating and system | |
CN108430092A (en) | Obtain, provide method, equipment and the medium of wireless access point access information | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN106815733A (en) | Data processing method, device and system and printer | |
CN102780588A (en) | Deep message detection method, device, network equipment and system | |
CN108804487A (en) | A kind of method and device of extraction target character | |
CN104640091A (en) | Method for encryption communication of short message of mobile phone | |
CN115695051A (en) | Data center transmission management system based on remote network platform architecture | |
CN109758629B (en) | Dialysis data transmission method, device, equipment and storage medium | |
CN103152401A (en) | Mobile terminal, login method and system through mobile terminal, and cloud server | |
CN102624892B (en) | A kind of method preventing plug-in client simulation HTTP request | |
CN107888328A (en) | Information processing method | |
CN104065669B (en) | A kind of spatial network encryption method | |
CN109460646A (en) | Method for identifying ID, device, system, electronic equipment and readable medium | |
CN106375177A (en) | Message transmission method and apparatus | |
CN105228114A (en) | A kind of Encrypted short message receive-transmit system based on power failure navigation system and method | |
CN107294704B (en) | Password generation method, password execution method and terminal | |
CN107613494A (en) | A kind of large-scale consumer based on wireless device Handshake Protocol is registered method | |
CN104883383B (en) | The method and device that data during combined anti-fake is identified are bound |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180406 |
|
WD01 | Invention patent application deemed withdrawn after publication |