CN105450622A - Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment - Google Patents
Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment Download PDFInfo
- Publication number
- CN105450622A CN105450622A CN201410538241.1A CN201410538241A CN105450622A CN 105450622 A CN105450622 A CN 105450622A CN 201410538241 A CN201410538241 A CN 201410538241A CN 105450622 A CN105450622 A CN 105450622A
- Authority
- CN
- China
- Prior art keywords
- data
- data center
- pda mobile
- mobile device
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention provides a transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment. Data is safety transmitted between the PDA mobile equipment and a data center by means of an asymmetric encryption algorithm. The method comprises the following steps that: firstly, the data center provides a resource list to the PDA mobile equipment; then the PDA mobile equipment sends a request message to the data center according to protocol standards and is allowed to send data to the data center only after the message is verified; then the PDA mobile equipment sends registration information verification to the data center and is allowed to send a large amount of data to the data center only by the registration information verification; and finally, the PDA mobile equipment carries out primary arrangement and encryption on data according to coal mine exploitation subsidence information, the information after encryption is sent to the data center, then the data center receives the data and carried out decryption, filtering is carried out according to a coal mine exploitation information transmission protocol, and effective data is obtained. According to the invention, the normalization and safety of the data are ensured, and the stable and safe data transmission environment and protocols are provided to the coal mine exploitation information PDA mobile equipment system.
Description
Technical field
The invention belongs to the host-host protocol method field of Data Security Control, be specially coal mining surface movement and deformation PDA mobile device host-host protocol method.
Background technology
Current coal mining surface movement and deformation terminal combines multiple environmental data measuring instrument, and utilize wireless network that the data measured by measuring instrument and map are reached control data corporation by acquisition terminal equipment, operating efficiency is measured to accelerate Sbusidence Damage, but this system mainly adopts ICP/IP protocol directly to transmit in data transmission, does not take any measure in data encryption.In the paper " the mobile data acquisition system research and apply based on PDA/GPS " that Huang is quick, apply GSM mobile radio communication, do not relate to transfer of data encryption equally.
Above-mentioned technology is the state-of-the-art technology of current Sbusidence Damage mobile device data Radio Transmission Technology aspect, but does not all relate to wireless network transmissions data encryption.Therefore, be necessary to provide a kind of wireless network transmissions data ciphering method with normalization, safety and stability, guarantee the transmission that Sbusidence Damage mobile device data can be safe in a large number.
Summary of the invention
The technical problem that the present invention solves is the method for the Data Transport Protocol providing a kind of wireless network to encrypt for Sbusidence Damage terminal;
For solving the problems of the technologies described above, the technical solution adopted in the present invention is:
A kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal provides wireless network to encrypt, PDA mobile device comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, Gains resources list.Request message is as follows:
GET/HTTP/1.1\r\n
User-Agent:<NtripVersion>\r\n
Accept:*/*\r\n
Connection:close\r\n
Data center returns response message after receiving this request message immediately, comprises the Resources list in response message:
The Resources list sent comprises the length of version number, time, the Resources list.
Message content below can not arbitrarily be deleted, otherwise data center can not identify.
SOURCETABLE200OK\r\n
Server:<NtripVersion>\r\n
Date:<Day/Mon/Year:HH:MM:SSUTC>\r\n
Content-Type:text/plain\r\n
Content-Length:<Content-Length>\r\n
<SourceTable>\r\n
Wherein <NtripVersion> is version number, <Day/Mon/Year:HH:MM:SSUTC> is the UTC time, <Content-Length> is the length of the Resources list, and <SourceTable> is the Resources list needing to return.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
Described PDA mobile device sends log-on message checking form to data center:
$ILLTS,<user>,<password>*hh\r\n
What $ ILLTS represented transmission is log-on message or logging status information, and <user> is user name, and <password> is password.
Data center receives the log-on message of PDA mobile device, and data center returns log-on message, returns log-on message as follows:
The correct response of log-on message checking: $ CALOA, T, * hh<CR><LFGreatT. GreaT.GT
Log-on message authentication error responds: $ CALOA, F, * hh<CR><LFGreatT. GreaT.GT
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
Described PDA mobile device to data center's form that sends datagram is:
$CPROJ,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSD,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$MININ,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein CPROJ, CORSI, CORSD, TOTDA, TOTIN, LEVIN, LEVDA, MININ represent operation essential information, CORS metrical information, CORS measurement data, total station survey data, total station survey information, spirit level metrical information, spirit level measurement data, mining information respectively.
In the present invention, cryptographic algorithm is rivest, shamir, adelman, encryption principle: first PDA mobile device and data center all produce a pair PKI for encryption and decryption and private key; Wherein, the private keys secret of PDA mobile device, the PKI of PDA mobile device tells data center; The private keys secret of data center, the PKI of data center tells PDA mobile device.Then, when PDA mobile device will send information to data center, PDA mobile device is by the public key encryption information of data center and this message is issued data center.After data center receives this message, data center's message of the private key deciphering PDA mobile device of oneself.
Further, a kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal of the present invention provides wireless network to encrypt, uses GPRS network, 3G network or wlan network to carry out data communication between described PDA mobile device and data center.
The present invention adopts above technical scheme compared with prior art, and tool has the following advantages:
The present invention devises the host-host protocol method of a kind of wireless network data encryption, for Sbusidence Damage mobile device data long range radio transmissions method of controlling security, ensure that normalization and the fail safe of data, for coal mining information PAD mobile device system provides data transmission environments and the agreement of stability and safety.
Accompanying drawing explanation
Fig. 1 is Data Encryption Transmission basic flow sheet.
Embodiment
Below in conjunction with concrete accompanying drawing, scheme of the invention is described in detail:
As shown in Figure 1, in the present invention, acquisition terminal comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, Gains resources list.Request message is as follows:
GET/HTTP/1.1\r\n
User-Agent:<NtripVersion>\r\n
Accept:*/*\r\n
Connection:close\r\n
Data center returns response message after receiving this request message immediately, comprises the Resources list in response message:
The Resources list sent comprises the length of version number, time, the Resources list.
Message content below can not arbitrarily be deleted, otherwise data center can not identify.
SOURCETABLE200OK\r\n
Server:<NtripVersion>\r\n
Date:<Day/Mon/Year:HH:MM:SSUTC>\r\n
Content-Type:text/plain\r\n
Content-Length:<Content-Length>\r\n
<SourceTable>\r\n
Wherein <NtripVersion> is version number, <Day/Mon/Year:HH:MM:SSUTC> is the UTC time, <Content-Length> is the length of the Resources list, and <SourceTable> is the Resources list needing to return.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
Described PDA mobile device sends log-on message checking form to data center:
$ILLTS,<user>,<password>*hh\r\n
What $ ILLTS represented transmission is log-on message or logging status information, and <user> is user name, and <password> is password.
Data center receives the log-on message of PDA mobile device, and data center returns log-on message, returns log-on message as follows:
The correct response of log-on message checking: $ CALOA, T, * hh<CR><LFGreatT. GreaT.GT
Log-on message authentication error responds: $ CALOA, F, * hh<CR><LFGreatT. GreaT.GT
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
Described PDA mobile device to data center's form that sends datagram is:
$CPROJ,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSD,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$MININ,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein CPROJ, CORSI, CORSD, TOTDA, TOTIN, LEVIN, LEVDA, MININ represent operation essential information, CORS metrical information, CORS measurement data, total station survey data, total station survey information, spirit level metrical information, spirit level measurement data, mining information respectively.
In the present invention, cryptographic algorithm is rivest, shamir, adelman, encryption principle: first PDA mobile device and data center all produce a pair PKI for encryption and decryption and private key; Wherein, the private keys secret of PDA mobile device, the PKI of PDA mobile device tells data center; The private keys secret of data center, the PKI of data center tells PDA mobile device.Then, when PDA mobile device will send information to data center, PDA mobile device is by the public key encryption information of data center and this message is issued data center.After data center receives this message, data center's message of the private key deciphering PDA mobile device of oneself.
Further, a kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal of the present invention provides wireless network to encrypt, uses GPRS network, 3G network or wlan network to carry out data communication between described PDA mobile device and data center.
Claims (5)
1. coal mining surface movement and deformation PDA mobile device host-host protocol method, is characterized in that: acquisition terminal comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, by checking message, just allows to send data to data center.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
2. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 1) described in the Resources list, the Resources list comprises the length of version number, time, the Resources list.
3. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 2) described in request message, comprising password, corresponding mount point, version number, in response message, comprise the Resources list.
4. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 3) described in log-on message checking.
5. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, it is characterized in that: step 4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, and data center receives the deciphering of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410538241.1A CN105450622A (en) | 2014-09-25 | 2014-09-25 | Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410538241.1A CN105450622A (en) | 2014-09-25 | 2014-09-25 | Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105450622A true CN105450622A (en) | 2016-03-30 |
Family
ID=55560401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410538241.1A Pending CN105450622A (en) | 2014-09-25 | 2014-09-25 | Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105450622A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517196A (en) * | 2016-06-16 | 2017-12-26 | 南京科博空间信息科技有限公司 | CORS value-added service cloud platform soft communication agreements |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102042030A (en) * | 2010-12-17 | 2011-05-04 | 华中科技大学 | Construction tunnel safety protection method based on wireless sensor network and a monitoring system thereof |
CN201860173U (en) * | 2010-11-16 | 2011-06-08 | 江苏省电力公司 | Multifunctional intelligent interaction terminal |
CN202300530U (en) * | 2011-10-12 | 2012-07-04 | 孙鲁东 | Mineral PDA recorder with radio frequency identification function |
CN202331472U (en) * | 2011-10-12 | 2012-07-11 | 孙鲁东 | Mine PDA (personal digital assistant) recorder with functions of fingerprint identification and encryption |
CN101997877B (en) * | 2010-11-16 | 2013-11-27 | 江苏省电力公司 | Embedded intelligent interactive terminal and communication method thereof |
CN103558827A (en) * | 2013-11-06 | 2014-02-05 | 中煤科工集团重庆研究院有限公司 | Mine emergency command communication and management information system |
-
2014
- 2014-09-25 CN CN201410538241.1A patent/CN105450622A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201860173U (en) * | 2010-11-16 | 2011-06-08 | 江苏省电力公司 | Multifunctional intelligent interaction terminal |
CN101997877B (en) * | 2010-11-16 | 2013-11-27 | 江苏省电力公司 | Embedded intelligent interactive terminal and communication method thereof |
CN102042030A (en) * | 2010-12-17 | 2011-05-04 | 华中科技大学 | Construction tunnel safety protection method based on wireless sensor network and a monitoring system thereof |
CN202300530U (en) * | 2011-10-12 | 2012-07-04 | 孙鲁东 | Mineral PDA recorder with radio frequency identification function |
CN202331472U (en) * | 2011-10-12 | 2012-07-11 | 孙鲁东 | Mine PDA (personal digital assistant) recorder with functions of fingerprint identification and encryption |
CN103558827A (en) * | 2013-11-06 | 2014-02-05 | 中煤科工集团重庆研究院有限公司 | Mine emergency command communication and management information system |
Non-Patent Citations (2)
Title |
---|
余学祥等: "GNSS/GIS集成的采煤沉陷区铁路自动化监测系统研究", 《现代测绘》 * |
褚世仙等: "集成GPS/PDA/TS的地下管网信息采集系统的设计与开发", 《测绘通报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517196A (en) * | 2016-06-16 | 2017-12-26 | 南京科博空间信息科技有限公司 | CORS value-added service cloud platform soft communication agreements |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2019003356A (en) | Secure communication of network traffic. | |
MX354833B (en) | Data encryption protocols for mobile satellite communications. | |
CN102082796B (en) | Method for encrypting channels and simplified method and system for encrypting channels based on HTTP (hyper text transport protocol) | |
GB201215461D0 (en) | Secure wireless link between two devices using probes | |
WO2009087544A3 (en) | Multi-factor authentication and certification system for electronic transactions | |
RU2015118109A (en) | Wireless communication system | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
CN104219228A (en) | User registration and user identification method and user registration and user identification system | |
IN2014KN02750A (en) | ||
EP2827552A3 (en) | Apparatus and method for transmitting secure data in wireless communication system | |
WO2018016713A3 (en) | Method for security of user equipment connection identifier in wireless communication system and apparatus therefor | |
CN103826221A (en) | Bluetooth based encryption communication method, and correlation systems and methods | |
CN101707767B (en) | Data transmission method and devices | |
CN105163309A (en) | Method for secure communication of wireless sensor network based on combined password | |
CN106209373B (en) | Key generation system, data stamped signature and encryption system and method | |
CN102655643A (en) | Wireless data encryption method and wireless data decryption method | |
CN103795780A (en) | Cloud storage data protection method and device | |
CN104219054A (en) | NFC (near field communication)-based point-to-point data transmission method | |
CN102143492A (en) | Method for establishing virtual private network (VPN) connection, mobile terminal and server | |
TWI590675B (en) | Power providing equipment, mobile device, operating method of mobile device | |
CN105554008A (en) | User terminal, authentication server, middle server, system and transmission method | |
CN103354637B (en) | A kind of internet-of-things terminal M2M communication encrypting method | |
JP2017118312A (en) | Radio communication system, server, terminal, radio communication method, and program | |
WO2015186072A9 (en) | Encryption and decryption of data between a communications device and smart card with near field communication function | |
CN102624892A (en) | Method for preventing plug-in client from simulating hyper text transmission protocol (HTTP) request |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160330 |