CN116738392A - Software and hardware verification method for main control system of wind generating set - Google Patents

Software and hardware verification method for main control system of wind generating set Download PDF

Info

Publication number
CN116738392A
CN116738392A CN202310703453.XA CN202310703453A CN116738392A CN 116738392 A CN116738392 A CN 116738392A CN 202310703453 A CN202310703453 A CN 202310703453A CN 116738392 A CN116738392 A CN 116738392A
Authority
CN
China
Prior art keywords
main control
software
hardware
control program
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310703453.XA
Other languages
Chinese (zh)
Inventor
张广斌
高若愚
王斌
张翔
王子琼
罗元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfang Electric Xinneng Technology Chengdu Co ltd
Original Assignee
Dongfang Electric Xinneng Technology Chengdu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfang Electric Xinneng Technology Chengdu Co ltd filed Critical Dongfang Electric Xinneng Technology Chengdu Co ltd
Priority to CN202310703453.XA priority Critical patent/CN116738392A/en
Publication of CN116738392A publication Critical patent/CN116738392A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Programmable Controllers (AREA)

Abstract

The invention provides a software and hardware verification method for a main control system of a wind generating set, belongs to the technical field of wind generating sets, and solves the safety problem caused by mismatching of software and hardware of the main control system; comprising the following steps: s1, a main control program acquires a hardware serial number of a PLC module and simultaneously acquires an MAC address of a development computer; s2, binding the hardware serial number with the MAC address; s3, calculating the binding information according to an encryption algorithm to obtain an authorization code ciphertext; s4, when the main control program starts to run, comparing the authorization code ciphertext with a prestored key file ciphertext; s5, if the comparison is consistent, the software and hardware verification process is authorized to pass, and the main control program enters a formal running state; if the comparison is inconsistent, stopping the operation of the main control program; the invention can judge whether the software and the hardware of the control system are matched, determine whether the main control software can normally operate, and ensure the safe operation process of the wind generating set.

Description

Software and hardware verification method for main control system of wind generating set
Technical Field
The invention belongs to the technical field of wind generating sets, and is applied to a main control system of a wind generating set, in particular to a software and hardware verification method of the main control system of the wind generating set.
Background
With the development of wind power generation technology, a main control system in a wind generating set can be put into operation in a large scale. The main control system relates to a hardware part and a software part at the same time, wherein the hardware part is mainly a PLC controller with various types, and the software part is a plurality of versions and types of control software. The problems of too many versions and difficult management of control software are caused by the fact that the types of the PLC controller hardware are numerous, and the problem of matching between the main control hardware and the control software is particularly outstanding in control of the wind generating set, so that the problem is difficult to solve all the time.
In the prior art, the main control hardware of the wind turbine generator is updated through long-term iteration, and the performances and functions of various hardware, particularly the performance and functions of a PLC are different, so that even the hardware products with the same category and model are hard to ensure that the performances are completely consistent. The iterative updating process of the control software is faster, and each version of software can only be tested on 2 to 3 main control hardware platforms at most due to the demands of workload and development cost, so that the software is difficult to ensure to match all main control hardware modules.
In this regard, once the situation that the main control hardware is not matched with the control software occurs, the control software is likely to fail to operate normally, and the hardware operation function is also lost or wrong, so that a series of problems such as control failure, misoperation of a control system and the like are brought, and the problems are serious hidden danger to normal and safe operation of the wind turbine generator; therefore, how to realize the effective matching verification of hardware and software in the main control system of the wind turbine generator by an effective method becomes a research focus of the person skilled in the art.
Disclosure of Invention
The invention aims to solve the problems in the background technology, and provides a verification method special for hardware/software of a main control system in a wind turbine generator; by developing an authorization code encryption module in a software program of the main control system and developing a key generation tool in general software, whether hardware and software of the control system are matched or not can be judged by adopting a mode of comparing the key and the authorization code, so that whether the main control software can normally operate or not is determined, and the safe operation process of the wind generating set is ensured.
The invention adopts the following technical scheme to achieve the purpose:
a software and hardware verification method for a main control system of a wind generating set comprises the following steps:
s1, a main control program acquires a hardware serial number of a PLC module, and simultaneously acquires an MAC address of a development computer corresponding to the main control program;
s2, binding the hardware serial number with the MAC address;
s3, calculating the binding information according to an encryption algorithm to obtain an authorization code ciphertext;
s4, when the main control program starts to run, comparing the authorization code ciphertext with a prestored key file ciphertext;
s5, if the comparison is consistent, the software and hardware verification process is authorized to pass, and the main control program enters a formal running state; if the comparison is inconsistent, the main control program stops running.
The steps can be summarized as an encryption part, a decryption part and a verification part in the software and hardware verification of the main control system.
In the encryption part, mainly involve step S1 to step S3, process to obtain the authorization code ciphertext; the decryption part is the process of obtaining the prestored key file ciphertext in the step S4; the checking part is the comparison process.
Specifically, in step S1, the main control program is developed by a corresponding development computer, and in the development process, the MAC address of the development computer is recorded in the main control program.
Specifically, in step S1, after the developed main control program is loaded in the PLC module of the main control system of the wind turbine generator system, when the main control program is ready for operation, the hardware serial number of the PLC module is read; and storing the hardware serial number under the path of the main control program in a text file mode.
Preferably, in step S3, the calculated cryptogram of the authorization code is stored in an internal variable of the main control program, so that the cryptogram is invisible to the outside.
Specifically, in step S4, the ciphertext of the key file is stored in the path to which the main control program belongs.
Specifically, the decryption part of the cipher text of the key file in the process of checking software and hardware is obtained, and the method specifically comprises the following steps:
s11, developing a key generation tool on a development computer corresponding to the main control program;
s12, the key generation tool reads the hardware serial number of the PLC module obtained by the main control program;
and S13, operating a key generation tool on the development computer according to the content of the hardware serial number, and calculating a key file ciphertext on the basis of an authorization code ciphertext by adopting an encryption algorithm which is the same as that in the main control program after the key generation tool acquires the MAC address of the development computer.
Preferably, in step S13, when the key generating tool is run on the development computer, the development computer performs authority verification operation first, and after the verification is passed, calculates and obtains the ciphertext of the key file.
Preferably, in step S5, when the authorization code ciphertext is inconsistent with the prestored key file ciphertext, the master control system enters a hardware verification failure state, presents failure information, stops running of the program, and waits for manual means to process.
For the algorithm involved in the encryption and decryption of the method, the conventional algorithm in the general key encryption technology can be directly adopted.
In summary, by adopting the technical scheme, the invention has the following beneficial effects:
the method can realize the binding process of software and hardware of the main control system of the wind generating set, and avoids the potential safety hazard risks caused by random copying of software programs and random replacement of hardware equipment in the actual application process. Meanwhile, the method improves the safety of the control system of the wind turbine generator, realizes the copyright protection of control software and programs thereof, has better practical application value, and eliminates the serious problems of control failure and misoperation of the control system.
Drawings
FIG. 1 is a schematic diagram of an authorization process of a main control program;
fig. 2 is a schematic diagram of a generation execution flow of the key generation tool.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
A software and hardware verification method for a main control system of a wind generating set comprises the following steps:
s1, a main control program acquires a hardware serial number of a PLC module, and simultaneously acquires an MAC address of a development computer corresponding to the main control program;
s2, binding the hardware serial number with the MAC address;
s3, calculating the binding information according to an encryption algorithm to obtain an authorization code ciphertext;
s4, when the main control program starts to run, comparing the authorization code ciphertext with a prestored key file ciphertext;
s5, if the comparison is consistent, the software and hardware verification process is authorized to pass, and the main control program enters a formal running state; if the comparison is inconsistent, the main control program stops running.
Details concerning the above method steps will be described in detail in this embodiment.
The process of checking software and hardware of the main control system of the wind generating set can be divided into two parts, wherein one part is realized in a main control program, and the whole software and hardware checking authorization flow can be specifically referred to the schematic diagram of FIG. 1; the other part is the generation process of the cipher text of the key file by development assistance of a computer, and particularly, reference can be made to the schematic diagram of fig. 2.
In this embodiment, the PLC module corresponds to a hardware portion of the main control system of the wind turbine generator, and the main control program corresponds to a software portion of the main control system of the wind turbine generator.
The software and hardware verification authorization flow in the main control program can be realized by setting a software and hardware verification program module in the main control program.
The encryption and decryption processes can be realized through an encryption module arranged in the main control program, and the function aims to generate an authorization code ciphertext in the main control program and verify the authorization code ciphertext with a key file ciphertext; firstly, the main control program is developed by a corresponding development computer, and in the development process, the MAC address of the development computer is recorded in the main control program.
After loading the developed main control program into a PLC module of a main control system of the wind generating set, reading a hardware serial number of the PLC module when the main control program is ready to operate; and storing the hardware serial number under the path of the main control program in a text file mode.
And generating a corresponding authorization code ciphertext through a specific encryption algorithm according to the read hardware serial number and the MAC address of the development computer, thereby completing the whole encryption part.
In a preferred embodiment, the authorization code ciphertext generated at this time is stored in an internal variable of the main control program so as to be invisible to the outside.
Decrypting the cipher text of the key file required by decryption, wherein the cipher text is pre-stored in a path of the main control program in the process of checking software and hardware; the obtaining of the cipher text of the key file comprises the following steps:
s11, developing a key generation tool on a development computer corresponding to the main control program;
s12, the key generation tool reads the hardware serial number of the PLC module obtained by the main control program;
and S13, operating a key generation tool on the development computer according to the content of the hardware serial number, and calculating a key file ciphertext on the basis of an authorization code ciphertext by adopting an encryption algorithm which is the same as that in the main control program after the key generation tool acquires the MAC address of the development computer.
In the reading process in step S12, the hardware serial number of the PLC module obtained by the main control program in step S1 can be directly taken out, and then the key file ciphertext can be generated on the development computer by the key generation tool.
In this embodiment, the security requirement level for the ciphertext of the key file is higher, so when the key generation tool is operated on the development computer, the development computer needs to perform authority verification operation first, and only after verification is passed, the ciphertext of the key file is calculated and obtained; the arrangement ensures that only a person who owns the authority to operate the development computer can obtain the correct cipher text of the key file and complete the whole decryption process.
In the encryption and decryption processes, the related authorization code and key correlation algorithm can directly adopt a conventional algorithm in the general key encryption technology, and will not be described herein.
Finally, when comparing and checking the authorization code ciphertext with the key file ciphertext, if the authorization code ciphertext is inconsistent with the prestored key file ciphertext, the main control system enters a hardware check failure state, presents failure information, stops running of a program and waits for manual means to process; if the comparison is consistent, the main control program judges that the main control program is authorized, and enters a formal running state, and the PLC module is controlled to complete corresponding functional contents.
In summary, the embodiment is designed by a method, so that the hardware part and the software part of the main control system of the wind generating set are subjected to binding verification; meanwhile, the corresponding relation is further clear by binding the hardware serial number of the hardware part PLC module with the MAC address of the development computer; the key development tool developed on the development computer is used as another set of software to realize the decryption process, so that the verification safety and effectiveness between the PLC module and the main control software are ensured, and the corresponding software can be completely and smoothly operated on the corresponding hardware only if the verification is passed; therefore, the method of the embodiment brings a good solution to the problems of mismatching of software and hardware, control failure, misoperation and the like possibly existing in the main control system of the wind generating set, and achieves the due effect.

Claims (10)

1. A software and hardware verification method of a main control system of a wind generating set is characterized by comprising the following steps:
s1, a main control program acquires a hardware serial number of a PLC module, and simultaneously acquires an MAC address of a development computer corresponding to the main control program;
s2, binding the hardware serial number with the MAC address;
s3, calculating the binding information according to an encryption algorithm to obtain an authorization code ciphertext;
s4, when the main control program starts to run, comparing the authorization code ciphertext with a prestored key file ciphertext;
s5, if the comparison is consistent, the software and hardware verification process is authorized to pass, and the main control program enters a formal running state; if the comparison is inconsistent, the main control program stops running.
2. The software and hardware verification method for a main control system of a wind generating set according to claim 1, wherein the method comprises the following steps: in step S1, the PLC module corresponds to a hardware portion of the wind turbine generator system main control system, and the main control program corresponds to a software portion of the wind turbine generator system main control system.
3. The software and hardware verification method for a main control system of a wind generating set according to claim 1, wherein the method comprises the following steps: in step S1, the main control program is developed by a corresponding development computer, and in the development process, the MAC address of the development computer is recorded in the main control program.
4. A method for verifying software and hardware of a main control system of a wind generating set according to claim 3, wherein: in step S1, after a developed main control program is loaded in a PLC module of a main control system of a wind generating set, reading a hardware serial number of the PLC module when the main control program is ready to operate; and storing the hardware serial number under the path of the main control program in a text file mode.
5. The software and hardware verification method for a main control system of a wind generating set according to claim 1, wherein the method comprises the following steps: in step S3, the calculated cryptogram of the authorization code is stored in an internal variable of the main control program, so that the cryptogram is invisible to the outside.
6. The software and hardware verification method for a main control system of a wind generating set according to claim 1, wherein the method comprises the following steps: in step S4, the key file ciphertext is stored in the path to which the main control program belongs.
7. The software and hardware verification method for the main control system of the wind generating set according to claim 6, wherein the software and hardware verification method comprises the following steps: in step S4, the key file ciphertext is obtained by a decryption part in the process of checking software and hardware, and specifically includes the following steps:
s11, developing a key generation tool on a development computer corresponding to the main control program;
s12, the key generation tool reads the hardware serial number of the PLC module obtained by the main control program;
and S13, operating a key generation tool on the development computer according to the content of the hardware serial number, and calculating a key file ciphertext on the basis of an authorization code ciphertext by adopting an encryption algorithm which is the same as that in the main control program after the key generation tool acquires the MAC address of the development computer.
8. The software and hardware verification method for the main control system of the wind generating set according to claim 7, wherein the software and hardware verification method comprises the following steps: the encryption algorithm employs a conventional algorithm in the general key encryption technology.
9. The software and hardware verification method for the main control system of the wind generating set according to claim 7, wherein the software and hardware verification method comprises the following steps: in step S13, when the key generation tool is run on the development computer, the development computer performs authority verification operation first, and after the verification is passed, the key file ciphertext is calculated and obtained.
10. The software and hardware verification method for a main control system of a wind generating set according to claim 1, wherein the method comprises the following steps: in step S5, when the authorization code ciphertext is inconsistent with the prestored key file ciphertext, the master control system enters a hardware verification failure state, presents failure information, stops running of the program, and waits for manual means to process.
CN202310703453.XA 2023-06-14 2023-06-14 Software and hardware verification method for main control system of wind generating set Pending CN116738392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310703453.XA CN116738392A (en) 2023-06-14 2023-06-14 Software and hardware verification method for main control system of wind generating set

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310703453.XA CN116738392A (en) 2023-06-14 2023-06-14 Software and hardware verification method for main control system of wind generating set

Publications (1)

Publication Number Publication Date
CN116738392A true CN116738392A (en) 2023-09-12

Family

ID=87902365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310703453.XA Pending CN116738392A (en) 2023-06-14 2023-06-14 Software and hardware verification method for main control system of wind generating set

Country Status (1)

Country Link
CN (1) CN116738392A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system
CN117472035B (en) * 2023-12-27 2024-03-08 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Similar Documents

Publication Publication Date Title
US9792440B1 (en) Secure boot for vehicular systems
CN103530534B (en) A kind of Android program ROOT authorization method based on signature verification
US7236958B2 (en) Electronic software license with software product installer identifier
Hohl A framework to protect mobile agents by using reference states
JPH10282884A (en) Data processing method and its system
CN110363010B (en) System safety starting method based on MPSoC chip
CN111327490B (en) Byzantine fault-tolerant detection method of block chain and related device
US20060101310A1 (en) Device, system and method for verifying integrity of software programs
CN116738392A (en) Software and hardware verification method for main control system of wind generating set
US20090287917A1 (en) Secure software distribution
CN104866768A (en) Startup control method and device for ATM (Automatic Teller Machine) operating system
CN106570353A (en) WEB-based license verification method, apparatus and system
Julliand et al. Generating security tests in addition to functional tests
Ubayashi et al. Context-dependent product line practice for constructing reliable embedded systems
US7526811B1 (en) Methods for detecting executable code which has been altered
CN104462932B (en) Method for generating and verifying maintenance password of embedded device
CN102045170B (en) Method and system for protecting safety of password
US5751595A (en) Method for building and verifying authenticity of a rule system
CN116662050A (en) Error injection support function verification method, device, terminal and medium
CN114764347A (en) Program verification system and method of multi-core controller and storage medium
CN108810002A (en) The more CA application systems and method of safety chip
CN107330318A (en) A kind of binding encryption method of digital signal panel card and its debugging system
CN112363776A (en) Terminal control method and device and terminal
Devanbu et al. Cryptographic verification of test coverage claims
CN109167785A (en) A kind of call method and service server of virtual credible root

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination