Unlock instant, AI-driven research and patent intelligence for your innovation.
Space link protocol blind identification method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A link protocol and blind recognition technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems of increasing space and time overhead, low mining efficiency, mining processor overflow, etc.
Active Publication Date: 2013-11-27
NAT SPACE SCI CENT CAS
View PDF0 Cites 6 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Therefore, for the case where the data sequence is huge and the frequent patterns are long, the mining efficiency is quite low
[0007] 2) A large number of candidate patterns may be generated during the scanning process
If there are too many short-length frequent patterns, a large number of candidate patterns will be generated when the length of sensitive information is expanded through connection operations, which will increase the overhead of space and time, and even cause the mining processor to overflow
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment approach
[0073] Among the identification objects targeted by this method, binary bit stream data (or other data that can be converted into binary) is converted into hexadecimal, called target data. The hexadecimal data element contains sixteen numbers from 0 to F, so the pattern sequence P with a length of k is combined with a hexadecimal number to form sixteen subsequences Q with a length of "k+1". They are OP, 1P, 2P, 3P, 4P, 5P, 6P, 7P, 8P, 9P, AP, BP, CP, DP, EP, FP, and the relationship between the subsequence Q and the pattern sequence P of length k is as follows: Figure 1-b As shown, enumerating all sequences with a length of 1 to k in the target data can form a complete hexadecimal tree linked by parent-child relationship. Figure 1-a is a complete hexadecimal state diagram, Figure 1-b is one of the states.
[0074] If you want to mine the counting of frequent sequences within the length of k bits in the target data, you need to create k buffs, and then read the characters i...
Embodiment
[0113] Assume that the target data is a set of binary data with a data size of 12Kbyte, frame synchronization codeword: 1ACFFCID (unknown), frame length: 256 byte (unknown).
[0114] Concrete implementation steps after adopting the scheme of the present invention are:
[0115] 1) Read the binary bit streamdata file ccsds_data.raw stored in the hard disk of the computer in advance.
[0116] 2) Perform data preprocessing, convert binary data into hexadecimal data, and generate target data ccsds_data.hex.
[0117] 3) Set the length of the pattern sequence to 4 bits (empirical value), call the method of the complete hexadecimal tree of the finite statemachine, perform initial frequent sequence statistics on the target data ccsds_data.hex, and generate the initial frequent sequence set:
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a space link protocol blind identification method and system. The space link protocol blind identification method comprises the steps that target data in a file to be blind identified are converted into hexadecimal data; all frequent sequences within an appointed length range are found based on the hexadecimal data to constitute an initial frequent sequence set, and statistics is performed on the number of occurring times of the sequences of each appointed length; count values of the frequent sequences obtained by the statistics are compared with a plurality of set min_threshold values one by one, and the frequent sequences of which the count values are larger than the min_threshold values are stored in a middle frequent sequence set; a pattern matching method is adopted, all sequences in the middle frequent sequence set are searched for and positioned in the target data one by one, all equally-spaced frequent sequences are extracted from the middle frequent sequence set, and a target frequent sequence set is constituted; pattern matching is conducted on the target frequent sequence set obtained by excavation and space link protocol frame synchronization word sensitive information, and applied protocol types are judged.
Description
technical field [0001] The present invention relates to the field of space data communication, in particular to the field of space link protocol data format identification and standardized detection, especially for the lack of prior knowledge of the target protocol, the present invention provides a space link from bit stream data A method for blind identification of road protocols. Background technique [0002] In current space data communication, space link protocols are widely used to organize and manage various types of space data information. The space link protocol is the skeleton and nerve of the space link information system, and the link to maintain the normal transmission of information. Protocol identification is to use certain algorithms and tools to determine the type of protocol adopted by the target information through feature analysis, clarify the data format of the target information, and lay the foundation for further information application. [0003] At p...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.