CN115967565A - Battlefield situation sensing method, system, terminal equipment and storage medium - Google Patents

Battlefield situation sensing method, system, terminal equipment and storage medium Download PDF

Info

Publication number
CN115967565A
CN115967565A CN202211665461.1A CN202211665461A CN115967565A CN 115967565 A CN115967565 A CN 115967565A CN 202211665461 A CN202211665461 A CN 202211665461A CN 115967565 A CN115967565 A CN 115967565A
Authority
CN
China
Prior art keywords
verification
information
data stream
target data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211665461.1A
Other languages
Chinese (zh)
Inventor
崔忠月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gengtu Technology Co ltd
Original Assignee
Beijing Gengtu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gengtu Technology Co ltd filed Critical Beijing Gengtu Technology Co ltd
Priority to CN202211665461.1A priority Critical patent/CN115967565A/en
Publication of CN115967565A publication Critical patent/CN115967565A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The present application relates to the field of information sensing technologies, and in particular, to a battlefield situation sensing method, system, terminal device, and storage medium. The method comprises the steps that the second node device identifies a verification label corresponding to a target data stream and acquires verification information sent by the first node device; if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information, the second node equipment analyzes the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result; judging whether the check code in the analysis result meets a preset check condition or not; and if the check code in the analysis result meets the preset check condition, the target data stream is interpreted and corresponding battlefield situation perception data is generated. The battlefield situation sensing method, the battlefield situation sensing system, the terminal device and the storage medium have the effect of improving the safety of relevant target information data in a battlefield environment.

Description

Battlefield situation perception method, system, terminal equipment and storage medium
Technical Field
The present application relates to the field of information sensing technologies, and in particular, to a battlefield situation sensing method, system, terminal device, and storage medium.
Background
Information fusion is a process of decomposing information layer by layer and gradually abstracting and understanding, and generally comprises three levels of data level fusion, feature level fusion and decision level fusion.
Decision-level fusion is a high-level stage of information fusion, and a behavior process is determined by experience and rules, and generally comprises three stages of situation assessment, threat estimation and decision making. The situation assessment is a process of dynamically evaluating situation elements of two enemies and the like on a battlefield, the situation elements such as force distribution and activities of the two enemies and the like, weapon systems, maneuverability, battlefield geographic environment, weather and the like are integrated, the occurred events and plans are identified and analyzed, the estimation of force structures, deployment, action directions and routes of the enemies is determined, the fighting style of the enemies and the fighting intentions of the enemies are identified, the current battlefield situation is reasonably explained, the situation change at the future moment is predicted, and finally a battlefield integrated situation map formed by the organizations of the fighting activities, the events, the time, the positions, the force elements and the like is established.
Situation awareness is the first step of situation estimation, attributes and state information of relevant targets and elements in a battlefield environment are mainly provided in the stage, the targets are further clustered according to the target information, the current situation is explained according to information obtained by situation awareness and knowledge of domain experts in the stage, and the force deployment condition and the fighting intention of an enemy are judged.
Disclosure of Invention
In order to improve the security of relevant target information data in a battlefield environment, the application provides a battlefield situation sensing method, a system, terminal equipment and a storage medium.
In a first aspect, the present application provides a battlefield situation awareness method, including the following steps:
acquiring battlefield information acquired by first node equipment;
forming a corresponding target data stream according to the element attribute of the battlefield information and setting a verification label corresponding to the target data stream;
identifying the target data stream, acquiring corresponding key identification data and setting an identification code corresponding to the key identification data;
the second node equipment identifies the verification label corresponding to the target data stream and acquires verification information sent by the first node equipment;
if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information, the second node equipment analyzes the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result;
judging whether the check code in the analysis result meets a preset check condition or not;
if the check code in the analysis result meets the preset check condition, the target data stream is interpreted, and corresponding battlefield situation perception data are generated.
By adopting the technical scheme, when the second node equipment identifies and acquires the corresponding target data stream, the security verification is carried out through the verification information sent by the first node equipment, if the verification input information conforms to the preset verification condition corresponding to the verification information, the second node equipment is proved to have the acquisition and analysis permission for acquiring the target data stream, the second node equipment further analyzes the identification code corresponding to the key identification data in the target data stream according to the acquisition and analysis permission and generates a corresponding analysis result, the system immediately judges whether the check code in the analysis result conforms to the preset check condition, if so, the second node equipment is proved to be the security data receiving terminal and interprets the target data stream to generate corresponding battlefield situation sensing data, and the acquisition and analysis permission and the interpretation permission are set by combining the target data stream corresponding to the battlefield information, so that the security of the related target information data in the battlefield environment is improved.
Optionally, the forming a corresponding target data stream and setting a verification tag corresponding to the target data stream according to the element attribute of the battlefield information includes the following steps:
acquiring data acquisition time and data clustering time corresponding to the target data stream;
combining the data acquisition time and the data clustering time to form the preset verification condition corresponding to the target data stream;
and setting the verification label corresponding to the target data stream according to the preset verification condition.
By adopting the technical scheme, the preset verification condition corresponding to the target data stream is formed according to the data acquisition time and the data clustering time, so that the safety level corresponding to the verification label is improved.
Optionally, the identifying the target data stream, acquiring corresponding key identification data, and setting an identification code corresponding to the key identification data includes the following steps:
identifying the target data stream and acquiring corresponding key identification data;
analyzing the key identification data to obtain a corresponding target event and an occurrence time period corresponding to the target event;
and setting the identification code corresponding to the key identification data by combining the target event and the occurrence time period corresponding to the target event.
By adopting the technical scheme, the identification code corresponding to the key identification data is set according to the target event recording the battlefield situation in the key identification data and the time period in which the battlefield situation occurs, so that the identification efficiency of the second node device on the corresponding target data stream is improved.
Optionally, after analyzing the key identification data and acquiring the corresponding target event and the occurrence time period corresponding to the target event, the method further includes the following steps:
acquiring a starting time point and an ending time point corresponding to the occurrence time period;
combining the starting time point and the ending time point to form the corresponding target check code;
and taking the target check code as the preset check condition corresponding to the check code in the analysis result corresponding to the second node equipment.
By adopting the technical scheme, the standard for the second node equipment to obtain the corresponding interpretation authority of the target data stream is formed further according to the starting time point and the ending time point corresponding to the occurrence time period, so that the safety of the target data stream is improved.
Optionally, after the second node device identifies the verification tag corresponding to the target data stream and acquires the verification information sent by the first node device, the method further includes the following steps:
if the verification input information corresponding to the second node equipment does not accord with the preset verification condition, acquiring heartbeat information of the second node equipment;
judging whether a communication link between the first node equipment and the second node equipment is in a connection state or not according to the heartbeat information;
and if the communication link between the first node device and the second node device is in the connection state, the first node device sends a target control instruction for outputting the verification input information to the second node device.
By adopting the technical scheme, if the communication link between the first node device and the second node device is in the connection state, the check code in the first analysis result of the second node device is abnormal error possibly caused by network delay or intermittent fault, and the first node device further sends a target control instruction for outputting verification input information to the second node device, so that the occurrence of misjudgment caused by the abnormal error of the network is reduced.
Optionally, after the sending, by the first node device, the control instruction to re-identify the verification tag corresponding to the target data stream to the second node device if the communication link between the first node device and the second node device is in the connection state, the method further includes the following steps:
judging whether the second node equipment outputs the verification input information according to the target control instruction;
if the second node equipment does not output the verification input information according to the target control instruction, outputting corresponding abnormal warning information;
if the second node equipment outputs the verification input information according to the target control instruction pair, judging whether the verification input information meets the preset verification condition corresponding to the verification information;
and if the verification input information does not accord with the preset verification condition corresponding to the verification information, acquiring the position information of the second node equipment, and checking the second node equipment according to the position information.
By adopting the technical scheme, whether the second node equipment outputs verification input information according to the target control instruction and whether the re-output verification input information meets the preset verification condition corresponding to the verification information is judged, so that the analysis of the running state of the second node equipment is promoted, and the target data stream leakage caused by the abnormal running of the second node equipment is reduced.
Optionally, after the determining, if the second node device outputs the verification input information according to the target control instruction pair, whether the verification input information meets the preset verification condition corresponding to the verification information or not, the method further includes:
if the verification input information meets the preset verification condition corresponding to the verification information, acquiring the generation time of the verification input information;
judging whether the generation time of the verification input information meets a preset time standard or not;
and if the generation time of the verification input information does not meet the preset time standard, acquiring the position information of the second node equipment, and checking the second node equipment according to the position information.
By adopting the technical scheme, whether the generation time of the verification input information meets the preset time standard or not is judged, if yes, the second node equipment is in the normal identification verification process, and if not, the second node equipment is in the network fault or controlled by a third party, and then the second node equipment is temporarily checked according to the corresponding position information, so that the safety of the target data stream in the transmission process is improved.
In a second aspect, the present application provides a battlefield situation awareness system, comprising:
the first acquisition module is used for acquiring battlefield information acquired by the first node equipment;
the forming module is used for forming a corresponding target data stream and setting a verification label corresponding to the target data stream according to the element attribute of the battlefield information;
the identification module is used for identifying the target data stream, acquiring corresponding key identification data and setting an identification code corresponding to the key identification data;
a second obtaining module, configured to identify, by a second node device, the verification tag corresponding to the target data stream, and obtain verification information sent by the first node device;
the analysis module is used for the second node equipment to analyze the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information;
the judging module is used for judging whether the check code in the analysis result meets a preset check condition or not;
and the interpretation module is used for interpreting the target data stream and generating corresponding battlefield situation perception data if the check code in the analysis result accords with the preset check condition.
By adopting the technical scheme, when the second node equipment identifies and acquires the corresponding target data stream formed in the forming module, the security verification is carried out through the verification information sent by the first node equipment in the second acquisition module, if the verification input information meets the preset verification condition corresponding to the verification information, the second node equipment is indicated to have the acquisition and analysis permission for acquiring the target data stream, the second node equipment further analyzes the identification code corresponding to the key identification data in the target data stream through the analysis module according to the acquisition and analysis permission and generates the corresponding analysis result, the system immediately judges whether the check code in the analysis result meets the preset check condition through the judgment module, if the check code meets the preset check condition, the second node equipment is indicated to be a security data receiving terminal, the target data stream corresponding to the battlefield information is interpreted through the interpretation module to generate the corresponding battlefield situation sensing data, and the acquisition and analysis permission and the interpretation permission are set through combining the target data stream corresponding to the battlefield information, and therefore the security of the related target information data in the battlefield environment is improved.
In a third aspect, the present application provides a terminal device, which adopts the following technical solution:
a terminal device comprises a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and when the processor loads and executes the computer instructions, the battlefield situation awareness method is adopted.
By adopting the technical scheme, the computer instruction is generated by the battlefield situation sensing method and is stored in the memory so as to be loaded and executed by the processor, so that the terminal equipment is manufactured according to the memory and the processor, and the use is convenient.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having stored thereon computer instructions which, when loaded and executed by a processor, implement a method of battlefield situation awareness as described above.
By adopting the technical scheme, the computer instruction is generated by the battlefield situation sensing method and is stored in the computer readable storage medium to be loaded and executed by the processor, and the computer instruction can be conveniently read and stored through the computer readable storage medium.
In summary, the present application includes at least one of the following beneficial technical effects: when the second node equipment identifies and acquires a corresponding target data stream, the security verification is carried out through verification information sent by the first node equipment, if the verification input information meets the preset verification condition corresponding to the verification information, the second node equipment is indicated to have the acquisition and analysis permission for acquiring the target data stream, the second node equipment further analyzes the identification code corresponding to the key identification data in the target data stream according to the acquisition and analysis permission and generates a corresponding analysis result, the system immediately judges whether the check code in the analysis result meets the preset check condition, if the check code meets the preset check condition, the second node equipment is a security data receiving terminal and interprets the target data stream to generate corresponding battlefield situation sensing data, and the acquisition and analysis permission and the interpretation permission are set by combining the target data stream corresponding to the battlefield information, so that the security of the relevant target information data in the battlefield environment is improved.
Drawings
Fig. 1 is a schematic flowchart of steps S101 to S107 in a battlefield situation awareness method according to the present application.
Fig. 2 is a schematic flowchart of steps S201 to S203 in a battlefield situation awareness method according to the present application.
Fig. 3 is a schematic flowchart of steps S301 to S303 in a battlefield situation awareness method according to the present application.
Fig. 4 is a schematic flowchart of steps S401 to S403 in a battlefield situation awareness method according to the present application.
Fig. 5 is a schematic flowchart of steps S501 to S503 in a battlefield situation awareness method according to the present application.
Fig. 6 is a schematic flowchart of steps S601 to S604 in a battlefield situation awareness method according to the present application.
Fig. 7 is a schematic flowchart of steps S701 to S703 in a battlefield situation awareness method according to the present application.
Fig. 8 is a block diagram of a battlefield situation awareness system according to the present application.
Description of reference numerals:
1. a first acquisition module; 2. forming a module; 3. an identification module; 4. a second acquisition module; 5. an analysis module; 6. a judgment module; 7. and an interpretation module.
Detailed Description
The present application is described in further detail below with reference to figures 1-8.
The embodiment of the application discloses a battlefield situation perception method, as shown in fig. 1, comprising the following steps:
s101, battlefield information acquired by first node equipment is acquired;
s102, forming a corresponding target data stream according to the element attribute of the battlefield information and setting a verification label corresponding to the target data stream;
s103, identifying the target data stream, acquiring corresponding key identification data and setting identification codes corresponding to the key identification data;
s104, identifying a verification label corresponding to the target data stream by the second node equipment, and acquiring verification information sent by the first node equipment;
s105, if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information, the second node equipment analyzes the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result;
s106, judging whether the check code in the analysis result meets a preset check condition or not;
and S107, if the check code in the analysis result meets the preset check condition, the target data stream is interpreted, and corresponding battlefield situation sensing data are generated.
In practical application, for convenience of explaining the present solution, the first node device mentioned in the present solution is a data acquisition device of battlefield information, and the second node device may be a data reception interrupt or a data transmission relay device. The battlefield information comprises battlefield resource deployment information, battlefield multi-source information, battlefield environment information, and history and real-time information of battlefield engagement states.
Furthermore, in order to facilitate classification and acquisition of the battlefield information, corresponding target data streams are formed according to the element attributes of the battlefield information. Wherein, the element attributes of the battlefield information refer to the military force, environment, event and estimation of various elements of the battlefield situation, and various morphological attributes such as image information, character information, technical reconnaissance information and the like; the target data stream is a data stream formed by dividing according to the element attributes of the battlefield information, and aims to transmit a large amount of battlefield information in a short time and improve the acquisition efficiency of the battlefield information.
In order to improve the security of the target data stream in the transmission process, a corresponding verification tag is set, and when the second node device identifies and acquires the target data stream, verification of the verification tag corresponding to the verification target data stream needs to be performed.
Specifically, after the second node device identifies the verification tag, an acquisition instruction is sent to the first node device, the first node device sends verification information to the second node device after receiving the acquisition instruction, the verification information refers to a preset security problem corresponding to the authority of acquiring the target data stream, then the second node device gives verification input information corresponding to the verification information, the verification input information refers to a security problem answer output by the second node device, the first node device immediately judges whether the verification input information meets a preset verification condition corresponding to the verification information, namely an actual security problem answer, if yes, the second node device acquires the authority of acquiring the target data stream, and if not, the second node device does not have the authority of acquiring the target data stream.
The second node device analyzes the identification code to obtain the key identification data in the target data stream, and generates a corresponding analysis condition according to the corresponding set interpretation permission, the second node device generates a corresponding analysis result by analyzing the identification code of the target data stream, and if the identification code in the analysis result is consistent with the preset interpretation condition of the target data stream, the second node device acquires the interpretation permission of the target data stream, and if the identification code in the analysis result is not consistent with the preset interpretation condition of the target data stream, the second node device generates the second analysis result according to the preset interpretation permission.
For example, the target data stream is battlefield image data shot by a remote sensing satellite, the remote sensing satellite uses a load to detect information of various objects on a battlefield from the outer space to obtain detection data to form a corresponding target data stream, and finally the data is scientifically interpreted and analyzed to form land and feature information required to be obtained by the person, such as the topographic form, the geological structure, the plant classification, the crop growth, the fire distribution, the building appearance and the like of the battlefield.
Further, if the check code in the analysis result meets the preset check condition, the target data stream is interpreted, corresponding battlefield situation perception data is generated, and the data receiving terminal can identify and acquire the key identification data contained in the target data stream according to the identification code corresponding to the target data stream.
According to the battlefield situation awareness method provided by the embodiment, when the second node equipment identifies and acquires a corresponding target data stream, security verification is carried out on verification information sent by the first node equipment, if the verification input information meets the preset verification condition corresponding to the verification information, it is indicated that the second node equipment has the acquisition and analysis permission for acquiring the target data stream, the second node equipment further analyzes the identification code corresponding to the key identification data in the target data stream according to the acquisition and analysis permission and generates a corresponding analysis result, the system immediately judges whether the check code in the analysis result meets the preset check condition, if the check code meets the preset check condition, the second node equipment is a security data receiving terminal and interprets the target data stream to generate corresponding battlefield situation awareness data, and the acquisition and analysis permission are set by combining the target data stream corresponding to the battlefield information, so that the security of the related target information data in the battlefield environment is improved.
In one implementation of this embodiment, as shown in fig. 2, the step S102 of forming a corresponding target data stream and setting an authentication tag corresponding to the target data stream according to the element attribute of the battlefield information includes the following steps:
s201, acquiring data acquisition time and data clustering time corresponding to a target data stream;
s202, combining data acquisition time and data clustering time to form preset verification conditions corresponding to target data streams;
s203, according to preset verification conditions, setting a verification label corresponding to the target data stream.
In practical application, in order to improve the identification and verification security level of a target data stream, a preset verification condition corresponding to the target data stream is formed by combining data acquisition time and data clustering time, wherein the data acquisition time refers to the acquisition time of corresponding battlefield data in the target data stream, and the data clustering time refers to the time for dividing and clustering the target data stream according to corresponding element attributes.
For example, the data acquisition time of the battlefield data corresponding to the target data stream is 8 am, the data clustering time is half of 8 am, and the corresponding preset verification condition is number 8830, wherein the first digit 8 corresponds to the data acquisition time, the last three digits 830 correspond to the data clustering time, the corresponding verification tags are further set according to the preset verification condition, the first node device and the second power saving device are both connected to a shared database set by a system and are both configured with keys for unlocking the shared database, and the shared database stores the preset verification conditions corresponding to the various target data streams.
After the second power saving device identifies the verification tag corresponding to the target data stream, a request instruction for obtaining the target data stream is sent to the first node device, the first node device sends verification information, namely an answer of the target data stream obtaining authority, to the second node device after receiving the request instruction, the second node device unlocks the shared database according to the configured secret key, a preset verification condition corresponding to the target data stream, namely a real answer of the target data stream obtaining authority is retrieved, and then corresponding verification input information is output.
If the verification input information output by the second node device does not accord with the preset verification condition corresponding to the verification information, the second node device obtains the authority of obtaining the target data stream and further obtains the target data stream, and if the verification input information output by the second node device does not accord with the preset verification condition corresponding to the verification information, the second node device is indicated to have network abnormality or be controlled by a third party.
According to the battlefield situation sensing method provided by the embodiment, the preset verification conditions corresponding to the target data stream are formed according to the data acquisition time and the data clustering time, so that the safety level corresponding to the verification label is improved.
In one implementation of this embodiment, as shown in fig. 3, the step S103 of identifying the target data stream, and acquiring the corresponding key identification data and setting the identification code corresponding to the key identification data includes the following steps:
s301, identifying a target data stream and acquiring corresponding key identification data;
s302, analyzing the key identification data to obtain a corresponding target event and an occurrence time period corresponding to the target event;
and S303, setting an identification code corresponding to the key identification data by combining the target event and the occurrence time period corresponding to the target event.
In practical application, in order to improve the efficiency of acquiring and distinguishing various target data streams by the second node device, corresponding key identification data in the target data streams are acquired, the key identification data are further analyzed, and a corresponding target event and an occurrence time period corresponding to the target event are acquired, wherein the target event refers to a core event expressed by the target data streams, and the occurrence time period refers to the occurrence duration of the target event.
For example, the target event is the deployment change of the force a of the battlefield enemy, the corresponding occurrence time period is 10 am to 11 am, and the content of the identification code corresponding to the key identification data is further set according to the information as follows: the deployment of the military force A of the enemy is changed, the military force A of the enemy is 10 am and 11 am, the identification code corresponding to the content of the identification code can be regarded as a bar code, the second node equipment can obtain the content of the bar code corresponding to the bar code by scanning the bar code, and the specific battlefield information type to be expressed by the target data stream can be briefly known according to the content of the bar code.
According to the battlefield situation sensing method provided by the embodiment, the identification code corresponding to the key identification data is set according to the target event of the battlefield situation recorded in the key identification data and the time period of the battlefield situation, so that the identification efficiency of the second node device on the corresponding target data stream is improved.
In one implementation manner of this embodiment, as shown in fig. 4, after the step S302, that is, parsing the key identification data, and acquiring the corresponding target event and the occurrence time period corresponding to the target event, the method further includes the following steps:
s401, acquiring a starting time point and an ending time point corresponding to an occurrence time period;
s402, combining the starting time point and the ending time point to form a corresponding target check code;
and S403, taking the target check code as a preset check condition corresponding to the check code in the corresponding analysis result of the second node equipment.
In practical application, in order to improve the security of the key identification data in the target data stream, a preset verification condition for corresponding interpretation is set, a starting time point and an ending time point in an occurrence time period corresponding to a target event are used as target verification codes which are decryption permission unlocking conditions for obtaining the key identification data, the target verification codes are further used as preset verification conditions for corresponding analysis results of the second node device, and the preset verification conditions are preset verification conditions for unlocking the decryption permission of the key identification data in the target data stream.
For example, the starting time point in the occurrence time period corresponding to the target event is 10 am, the ending time point is 11 am, the corresponding target check code is number 1011, the first two digits of the number 11 represent the starting time, the second two digits of the number represent the ending time, the target check code 1011 is immediately used as a preset check condition corresponding to the check code in the corresponding analysis result of the second node device, if the check code in the analysis result generated by the second node device meets the preset check condition, i.e., the target check code 1011, the second node device unlocks the interpretation permission of the key identification data in the target data stream, and if the check code in the analysis result generated by the second node device does not meet the preset check condition, i.e., the target check code 1011, the second node device cannot obtain the interpretation permission of the key identification data in the target data stream.
The battlefield situation sensing method provided by the embodiment further forms a standard for the second node device to obtain the corresponding interpretation permission of the target data stream according to the starting time point and the ending time point corresponding to the occurrence time period, thereby improving the security of the target data stream.
In one implementation manner of this embodiment, as shown in fig. 5, after the step S104, that is, the second node device identifies the authentication tag corresponding to the target data stream, and acquires the authentication information sent by the first node device, the method further includes the following steps:
s501, if the verification input information corresponding to the second node equipment does not accord with the preset verification condition, acquiring heartbeat information of the second node equipment;
s502, judging whether a communication link between first node equipment and second node equipment is in a connection state or not according to the heartbeat information;
s503, if the communication link between the first node device and the second node device is in a connection state, the first node device sends a target control instruction for outputting verification input information to the second node device.
In actual application, if the verification input information corresponding to the second node device does not meet the preset verification condition, it is indicated that the communication link between the first node device and the second node device is abnormal, heartbeat information of the second node device is further acquired, and whether the communication link between the first node device and the second node device is in a connection state is judged according to the heartbeat information.
The heartbeat information refers to a message sent from a sending source to a receiving source, and the message can enable the receiving source to determine whether and when the sending source fails or terminates, generally, the heartbeat information is sent from the starting of the sending source, the sending source is known to be closed, the sending source can send periodic or repeated messages uninterruptedly, when the receiving source does not receive the messages within a certain message receiving period, the receiving source can be considered to be closed, failed or not available currently, wherein a first node device is the receiving source, and a second node device is the sending source.
Specifically, if the communication link between the first node device and the second node device is in a connected state, it indicates that the communication link between the second node device and the first node device is in a connected state, and if an error occurs in the process of identifying the related instruction sent by the first node device due to a certain network fault of the second node device, and the output verification input information does not meet the corresponding preset verification condition, the first node device sends the target control instruction for outputting the verification input information to the second node device again, so as to reduce the occurrence of misjudgment due to the network fault.
In the battlefield situation awareness method provided by the embodiment, if a communication link between the first node device and the second node device is in a connected state, it is indicated that the check code in the first analysis result of the second node device may have an abnormal error due to network delay or intermittent fault, and the first node device further sends a target control instruction for outputting verification input information to the second node device, so that the occurrence of misjudgment due to the network abnormal error is reduced.
In one implementation manner of this embodiment, as shown in fig. 6, after step S503, that is, if the communication link between the first node device and the second node device is in a connected state, the method further includes, after the first node device sends the control instruction for re-identifying the authentication tag corresponding to the target data flow to the second node device, the following steps:
s601, judging whether the second node equipment outputs verification input information according to a target control instruction;
s602, if the second node equipment does not output verification input information according to the target control instruction, outputting corresponding abnormal warning information;
s603, if the second node equipment outputs verification input information according to the target control instruction, judging whether the verification input information meets a preset verification condition corresponding to the verification information;
s604, if the verification input information does not accord with the preset verification condition corresponding to the verification information, the position information of the second node equipment is obtained, and the second node equipment is checked according to the position information.
In practical application, in order to perform deep analysis on the second node device which outputs the verification input information for the first time and is abnormal, whether the second node device outputs the corresponding verification input information again according to a target control instruction sent by the first node device is immediately judged, if the second node device does not output the verification input information according to the target control instruction, the second node device is in a fault state or a state controlled by a third party at the moment, information leakage possibly occurs, and corresponding abnormal warning information is output to prompt relevant supervisors to respond to the second node device in time.
If the verification input information does not meet the preset verification condition corresponding to the verification information, it is indicated that the second node device is not the cause of the network fault at the moment and other faults may exist, and the second node device is further checked according to the position information of the second node device.
If the verification input information meets the preset verification condition corresponding to the verification information, it is indicated that the first output verification input information abnormality of the second node equipment is due to intermittent interference of some network faults, and the network state of the second node equipment is analyzed to find out the fault reason.
According to the battlefield situation sensing method provided by the embodiment, whether the second node equipment outputs the verification input information according to the target control instruction and whether the re-output verification input information meets the preset verification condition corresponding to the verification information is judged, so that the analysis of the running state of the second node equipment is promoted, and the target data stream leakage caused by the abnormal running of the second node equipment is reduced.
In one implementation manner of this embodiment, as shown in fig. 7, in step S603, that is, if the second node device outputs the verification input information according to the target control instruction, after determining whether the verification input information meets the preset verification condition corresponding to the verification information, the method further includes the following steps:
s701, if the verification input information meets the preset verification condition corresponding to the verification information, acquiring the generation time of the verification input information;
s702, judging whether the generation time of the verification input information meets a preset time standard or not;
and S703, if the generation time of the verification input information does not meet the preset time standard, acquiring the position information of the second node equipment, and checking the second node equipment according to the position information.
In practical application, in order to perform deep analysis on the security state of the second node device, on the basis that the verification input information meets the preset verification condition corresponding to the verification information, whether the generation time of the verification input information meets a preset time standard is judged, wherein the preset time standard refers to standard time for outputting the corresponding verification input information after the second node device receives the target control instruction sent by the first node device.
If the generation time of the verification input information does not meet the preset time standard, the possibility that the second node equipment is controlled by a third party is indicated, the third party can control the operation authority of the second node equipment in a hacker or Trojan virus mode, and a certain time is spent because the check code meeting the preset check condition needs to be obtained, wherein the preset time standard system is set according to the specific situation of the key identification data, so that the preset time standards corresponding to the key identification data are different, therefore, if the generation time of the verification input information does not meet the preset time standard, the suspicion that the second node equipment is controlled by the third party is indicated, the position information of the second node equipment is further obtained to check the position information, and the abnormal state of the second node equipment is checked in time.
The battlefield situation sensing method provided by the embodiment judges whether the generation time of the verification input information meets a preset time standard, if so, the second node device is in a normal identification verification process, and if not, the second node device is in a network fault or controlled by a third party, and then the second node device is temporarily checked according to the corresponding position information, so that the safety of the target data stream in the transmission process is improved.
The embodiment of the application discloses a battlefield situation perception system, as shown in fig. 8, including:
the first acquisition module 1 is used for acquiring battlefield information acquired by first node equipment;
the forming module 2 is used for forming a corresponding target data stream and setting a verification label corresponding to the target data stream according to the element attribute of the battlefield information;
the identification module 3 is used for identifying the target data stream, acquiring corresponding key identification data and setting an identification code corresponding to the key identification data;
the second obtaining module 4 is configured to identify, by the second node device, a verification tag corresponding to the target data stream, and obtain verification information sent by the first node device;
the analysis module 5 is used for the second node device to analyze the identification code corresponding to the key identification data in the target data stream and generate a corresponding analysis result if the verification input information corresponding to the second node device meets the preset verification condition corresponding to the verification information;
the judging module 6 is used for judging whether the check code in the analysis result meets the preset check condition;
and the interpretation module 7 is used for interpreting the target data stream and generating corresponding battlefield situation perception data if the check code in the analysis result meets the preset check condition.
In the battlefield situation awareness system provided in this embodiment, when the second node device identifies and acquires the corresponding target data stream formed in the forming module 2, security verification needs to be performed on the verification information sent by the first node device in the second acquiring module 4, if it is verified that the input information meets the preset verification condition corresponding to the verification information, it is indicated that the second node device has the acquisition and analysis permission to acquire the target data stream, the second node device further analyzes the identification code corresponding to the key identification data in the target data stream according to the acquisition and analysis permission and through the analyzing module 5 and generates a corresponding analysis result, the system immediately judges whether the check code in the analysis result meets the preset check condition through the judging module 6, if so, it is indicated that the second node device is a security data receiving terminal, and decodes the target data stream through the interpreting module 7 to generate the corresponding battlefield situation awareness data, and sets the acquisition, analysis and interpretation permission by combining the target data stream corresponding to the battlefield situation information, thereby improving security of the relevant target information data in the battlefield environment.
It should be noted that the battlefield situation awareness system provided in the embodiment of the present application further includes each module and/or corresponding sub-module corresponding to a logic function or a logic step of any one of the above-mentioned battlefield situation awareness methods, so as to achieve the same effect as each logic function or logic step, which is not described herein again specifically.
The embodiment of the application further discloses a terminal device, which comprises a memory, a processor and a computer instruction which is stored in the memory and can be run on the processor, wherein when the processor executes the computer instruction, any one of the battlefield situation sensing methods in the embodiments is adopted.
The terminal device may adopt a computer device such as a desktop computer, a notebook computer, or a cloud server, and includes but is not limited to a processor and a memory, for example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
The processor may be a Central Processing Unit (CPU), and of course, according to an actual use situation, other general processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like may also be used, and the general processor may be a microprocessor or any conventional processor, and the present application does not limit the present invention.
The memory may be an internal storage unit of the terminal device, for example, a hard disk or a memory of the terminal device, or an external storage device of the terminal device, for example, a plug-in hard disk, a smart card memory (SMC), a secure digital card (SD) or a flash memory card (FC) equipped on the terminal device, and the memory may also be a combination of the internal storage unit of the terminal device and the external storage device, and the memory is used for storing computer instructions and other instructions and data required by the terminal device, and the memory may also be used for temporarily storing data that has been output or will be output, which is not limited in this application.
The terminal device stores any one of the battlefield situation awareness methods in the embodiments in a memory of the terminal device, and the battlefield situation awareness methods are loaded and executed on a processor of the terminal device, so that the terminal device is convenient to use.
The embodiment of the application also discloses a computer-readable storage medium, and the computer-readable storage medium stores computer instructions, wherein when the computer instructions are executed by a processor, any one of the battlefield situation awareness methods in the above embodiments is adopted.
The computer instructions may be stored in a computer readable medium, the computer instructions include computer instruction codes, the computer instruction codes may be in a source code form, an object code form, an executable file or some middleware form, and the computer readable medium includes any entity or device capable of carrying the computer instruction codes, a recording medium, a usb disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a Read Only Memory (ROM), a Random Access Memory (RAM), an electrical carrier signal, a telecommunication signal, a software distribution medium, and the like, and the computer readable medium includes but is not limited to the above components.
The battlefield situation awareness method in the above embodiments is stored in the computer-readable storage medium through the computer-readable storage medium, and is loaded and executed on the processor, so as to facilitate storage and application of the method.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (10)

1. A battlefield situation perception method is characterized by comprising the following steps:
acquiring battlefield information acquired by first node equipment;
forming a corresponding target data stream according to the element attribute of the battlefield information and setting a verification label corresponding to the target data stream;
identifying the target data stream, acquiring corresponding key identification data and setting an identification code corresponding to the key identification data;
the second node equipment identifies the verification label corresponding to the target data stream and acquires verification information sent by the first node equipment;
if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information, the second node equipment analyzes the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result;
judging whether the check code in the analysis result meets a preset check condition or not;
if the check code in the analysis result meets the preset check condition, the target data stream is interpreted, and corresponding battlefield situation perception data is generated.
2. The method as claimed in claim 1, wherein said forming a corresponding target data stream and setting a corresponding verification tag of said target data stream according to the attribute of the element of said battlefield information comprises the following steps:
acquiring data acquisition time and data clustering time corresponding to the target data stream;
combining the data acquisition time and the data clustering time to form the preset verification condition corresponding to the target data stream;
and setting the verification label corresponding to the target data stream according to the preset verification condition.
3. The battlefield situation awareness method according to claim 1, wherein the steps of identifying the target data stream, obtaining corresponding key identification data and setting identification codes corresponding to the key identification data comprise:
identifying the target data stream and acquiring corresponding key identification data;
analyzing the key identification data to obtain a corresponding target event and an occurrence time period corresponding to the target event;
and setting the identification code corresponding to the key identification data by combining the target event and the occurrence time period corresponding to the target event.
4. The battlefield situation awareness method according to claim 3, wherein after said analyzing said key identification data and obtaining corresponding target events and corresponding occurrence time periods of said target events, further comprising the steps of:
acquiring a starting time point and an ending time point corresponding to the occurrence time period;
combining the starting time point and the ending time point to form the corresponding target check code;
and taking the target check code as the preset check condition corresponding to the check code in the analysis result corresponding to the second node equipment.
5. The battlefield situation awareness method according to claim 1, wherein after the second node device identifies the verification tag corresponding to the target data stream and obtains the verification information sent by the first node device, the method further comprises the following steps:
if the verification input information corresponding to the second node equipment does not accord with the preset verification condition, acquiring heartbeat information of the second node equipment;
judging whether a communication link between the first node equipment and the second node equipment is in a connection state or not according to the heartbeat information;
and if the communication link between the first node device and the second node device is in the connection state, the first node device sends a target control instruction for outputting the verification input information to the second node device.
6. The method as claimed in claim 5, further comprising the following steps after the first node device sends the control command to the second node device to re-identify the authentication tag corresponding to the target data stream if the communication link between the first node device and the second node device is in the connection state:
judging whether the second node equipment outputs the verification input information according to the target control instruction;
if the second node equipment does not output the verification input information according to the target control instruction, outputting corresponding abnormal warning information;
if the second node equipment outputs the verification input information according to the target control instruction pair, judging whether the verification input information meets the preset verification condition corresponding to the verification information;
and if the verification input information does not accord with the preset verification condition corresponding to the verification information, acquiring the position information of the second node equipment, and checking the second node equipment according to the position information.
7. The method as claimed in claim 1, wherein after said determining whether the verification input information meets the predetermined verification condition corresponding to the verification information if the verification input information is output by the second node device according to the target control command pair, the method further comprises:
if the verification input information meets the preset verification condition corresponding to the verification information, acquiring the generation time of the verification input information;
judging whether the generation time of the verification input information meets a preset time standard or not;
and if the generation time of the verification input information does not meet the preset time standard, acquiring the position information of the second node equipment, and checking the second node equipment according to the position information.
8. A battlefield situational awareness system, comprising:
the first acquisition module (1) is used for acquiring battlefield information acquired by first node equipment;
the forming module (2) is used for forming a corresponding target data stream and setting a verification tag corresponding to the target data stream according to the element attribute of the battlefield information;
the identification module (3) is used for identifying the target data stream, acquiring corresponding key identification data and setting an identification code corresponding to the key identification data;
a second obtaining module (4) configured to identify, by a second node device, the verification tag corresponding to the target data stream, and obtain verification information sent by the first node device;
the analysis module (5) is used for the second node equipment to analyze the identification code corresponding to the key identification data in the target data stream to generate a corresponding analysis result if the verification input information corresponding to the second node equipment meets the preset verification condition corresponding to the verification information;
the judging module (6) is used for judging whether the check code in the analysis result meets the preset check condition;
and the interpretation module (7) is used for interpreting the target data stream and generating corresponding battlefield situation perception data if the check code in the analysis result accords with the preset check condition.
9. A terminal device comprising a memory and a processor, wherein said memory has stored therein computer instructions capable of being executed on said processor, and wherein said processor when loaded and executing said computer instructions employs a method of battlefield situation awareness as claimed in any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer instructions which, when loaded and executed by a processor, implement a method of battlefield situational awareness as claimed in any one of claims 1 to 7.
CN202211665461.1A 2022-12-23 2022-12-23 Battlefield situation sensing method, system, terminal equipment and storage medium Pending CN115967565A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211665461.1A CN115967565A (en) 2022-12-23 2022-12-23 Battlefield situation sensing method, system, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211665461.1A CN115967565A (en) 2022-12-23 2022-12-23 Battlefield situation sensing method, system, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115967565A true CN115967565A (en) 2023-04-14

Family

ID=87359650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211665461.1A Pending CN115967565A (en) 2022-12-23 2022-12-23 Battlefield situation sensing method, system, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115967565A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451103A (en) * 2023-06-13 2023-07-18 中国电子科技集团公司第二十八研究所 Situation element recommendation method based on label

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451103A (en) * 2023-06-13 2023-07-18 中国电子科技集团公司第二十八研究所 Situation element recommendation method based on label
CN116451103B (en) * 2023-06-13 2023-09-22 中国电子科技集团公司第二十八研究所 Situation element recommendation method based on label

Similar Documents

Publication Publication Date Title
CN104346566A (en) Method, device, terminal, server and system for detecting privacy authority risks
US20100223668A1 (en) Apparatus and method for managing terminal users
CN108256322B (en) Security testing method and device, computer equipment and storage medium
US20170155683A1 (en) Remedial action for release of threat data
US10091223B2 (en) Method for detecting anomalies in network traffic
CN115967565A (en) Battlefield situation sensing method, system, terminal equipment and storage medium
Azam et al. Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective
CN109977644B (en) Hierarchical authority management method under Android platform
CN110191097A (en) Detection method, system, equipment and the storage medium of login page safety
Toman et al. Formal verification for security and attacks in IoT physical layer
CN113626829A (en) Intelligent terminal operating system vulnerability repair method and system based on vulnerability information
CN116089920A (en) Sensitive field early warning method, system, computer equipment and medium
RU2659736C1 (en) System and method of detecting new devices under user interaction with banking services
CN111953633A (en) Access control method and access control device based on terminal environment
CN113949578B (en) Automatic detection method and device for unauthorized loopholes based on flow and computer equipment
CN113360354A (en) User operation behavior monitoring method, device, equipment and readable storage medium
CN114186272A (en) Big data threat protection method and system based on digital office
CN113364766A (en) APT attack detection method and device
Bellini et al. Cyber-resilience
CN116909838B (en) Abnormal log reporting method, system, terminal equipment and storage medium
CN113518062B (en) Attack detection method and device and computer equipment
CN117896186B (en) Vulnerability scanning method, system and storage medium based on log analysis
CN117494185B (en) Database access control method, device, system, equipment and storage medium
CN112637142B (en) Security threat tracing method and system based on power network environment
CN116776344A (en) Unmanned aerial vehicle data management method, system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination