CN105450622A - Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment - Google Patents

Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment Download PDF

Info

Publication number
CN105450622A
CN105450622A CN201410538241.1A CN201410538241A CN105450622A CN 105450622 A CN105450622 A CN 105450622A CN 201410538241 A CN201410538241 A CN 201410538241A CN 105450622 A CN105450622 A CN 105450622A
Authority
CN
China
Prior art keywords
data
data center
pda mobile
mobile device
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410538241.1A
Other languages
Chinese (zh)
Inventor
柯福阳
王星
陈灿东
姚佩超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING KEBO SPATIAL INFORMATION TECHNOLOGY Co Ltd
Original Assignee
NANJING KEBO SPATIAL INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING KEBO SPATIAL INFORMATION TECHNOLOGY Co Ltd filed Critical NANJING KEBO SPATIAL INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410538241.1A priority Critical patent/CN105450622A/en
Publication of CN105450622A publication Critical patent/CN105450622A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment. Data is safety transmitted between the PDA mobile equipment and a data center by means of an asymmetric encryption algorithm. The method comprises the following steps that: firstly, the data center provides a resource list to the PDA mobile equipment; then the PDA mobile equipment sends a request message to the data center according to protocol standards and is allowed to send data to the data center only after the message is verified; then the PDA mobile equipment sends registration information verification to the data center and is allowed to send a large amount of data to the data center only by the registration information verification; and finally, the PDA mobile equipment carries out primary arrangement and encryption on data according to coal mine exploitation subsidence information, the information after encryption is sent to the data center, then the data center receives the data and carried out decryption, filtering is carried out according to a coal mine exploitation information transmission protocol, and effective data is obtained. According to the invention, the normalization and safety of the data are ensured, and the stable and safe data transmission environment and protocols are provided to the coal mine exploitation information PDA mobile equipment system.

Description

Coal mining surface movement and deformation PDA mobile device host-host protocol method
Technical field
The invention belongs to the host-host protocol method field of Data Security Control, be specially coal mining surface movement and deformation PDA mobile device host-host protocol method.
Background technology
Current coal mining surface movement and deformation terminal combines multiple environmental data measuring instrument, and utilize wireless network that the data measured by measuring instrument and map are reached control data corporation by acquisition terminal equipment, operating efficiency is measured to accelerate Sbusidence Damage, but this system mainly adopts ICP/IP protocol directly to transmit in data transmission, does not take any measure in data encryption.In the paper " the mobile data acquisition system research and apply based on PDA/GPS " that Huang is quick, apply GSM mobile radio communication, do not relate to transfer of data encryption equally.
Above-mentioned technology is the state-of-the-art technology of current Sbusidence Damage mobile device data Radio Transmission Technology aspect, but does not all relate to wireless network transmissions data encryption.Therefore, be necessary to provide a kind of wireless network transmissions data ciphering method with normalization, safety and stability, guarantee the transmission that Sbusidence Damage mobile device data can be safe in a large number.
Summary of the invention
The technical problem that the present invention solves is the method for the Data Transport Protocol providing a kind of wireless network to encrypt for Sbusidence Damage terminal;
For solving the problems of the technologies described above, the technical solution adopted in the present invention is:
A kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal provides wireless network to encrypt, PDA mobile device comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, Gains resources list.Request message is as follows:
GET/HTTP/1.1\r\n
User-Agent:<NtripVersion>\r\n
Accept:*/*\r\n
Connection:close\r\n
Data center returns response message after receiving this request message immediately, comprises the Resources list in response message:
The Resources list sent comprises the length of version number, time, the Resources list.
Message content below can not arbitrarily be deleted, otherwise data center can not identify.
SOURCETABLE200OK\r\n
Server:<NtripVersion>\r\n
Date:<Day/Mon/Year:HH:MM:SSUTC>\r\n
Content-Type:text/plain\r\n
Content-Length:<Content-Length>\r\n
<SourceTable>\r\n
Wherein <NtripVersion> is version number, <Day/Mon/Year:HH:MM:SSUTC> is the UTC time, <Content-Length> is the length of the Resources list, and <SourceTable> is the Resources list needing to return.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
Described PDA mobile device sends log-on message checking form to data center:
$ILLTS,<user>,<password>*hh\r\n
What $ ILLTS represented transmission is log-on message or logging status information, and <user> is user name, and <password> is password.
Data center receives the log-on message of PDA mobile device, and data center returns log-on message, returns log-on message as follows:
The correct response of log-on message checking: $ CALOA, T, * hh<CR><LFGreatT. GreaT.GT
Log-on message authentication error responds: $ CALOA, F, * hh<CR><LFGreatT. GreaT.GT
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
Described PDA mobile device to data center's form that sends datagram is:
$CPROJ,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSD,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$MININ,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein CPROJ, CORSI, CORSD, TOTDA, TOTIN, LEVIN, LEVDA, MININ represent operation essential information, CORS metrical information, CORS measurement data, total station survey data, total station survey information, spirit level metrical information, spirit level measurement data, mining information respectively.
In the present invention, cryptographic algorithm is rivest, shamir, adelman, encryption principle: first PDA mobile device and data center all produce a pair PKI for encryption and decryption and private key; Wherein, the private keys secret of PDA mobile device, the PKI of PDA mobile device tells data center; The private keys secret of data center, the PKI of data center tells PDA mobile device.Then, when PDA mobile device will send information to data center, PDA mobile device is by the public key encryption information of data center and this message is issued data center.After data center receives this message, data center's message of the private key deciphering PDA mobile device of oneself.
Further, a kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal of the present invention provides wireless network to encrypt, uses GPRS network, 3G network or wlan network to carry out data communication between described PDA mobile device and data center.
The present invention adopts above technical scheme compared with prior art, and tool has the following advantages:
The present invention devises the host-host protocol method of a kind of wireless network data encryption, for Sbusidence Damage mobile device data long range radio transmissions method of controlling security, ensure that normalization and the fail safe of data, for coal mining information PAD mobile device system provides data transmission environments and the agreement of stability and safety.
Accompanying drawing explanation
Fig. 1 is Data Encryption Transmission basic flow sheet.
Embodiment
Below in conjunction with concrete accompanying drawing, scheme of the invention is described in detail:
As shown in Figure 1, in the present invention, acquisition terminal comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, Gains resources list.Request message is as follows:
GET/HTTP/1.1\r\n
User-Agent:<NtripVersion>\r\n
Accept:*/*\r\n
Connection:close\r\n
Data center returns response message after receiving this request message immediately, comprises the Resources list in response message:
The Resources list sent comprises the length of version number, time, the Resources list.
Message content below can not arbitrarily be deleted, otherwise data center can not identify.
SOURCETABLE200OK\r\n
Server:<NtripVersion>\r\n
Date:<Day/Mon/Year:HH:MM:SSUTC>\r\n
Content-Type:text/plain\r\n
Content-Length:<Content-Length>\r\n
<SourceTable>\r\n
Wherein <NtripVersion> is version number, <Day/Mon/Year:HH:MM:SSUTC> is the UTC time, <Content-Length> is the length of the Resources list, and <SourceTable> is the Resources list needing to return.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
Described PDA mobile device sends log-on message checking form to data center:
$ILLTS,<user>,<password>*hh\r\n
What $ ILLTS represented transmission is log-on message or logging status information, and <user> is user name, and <password> is password.
Data center receives the log-on message of PDA mobile device, and data center returns log-on message, returns log-on message as follows:
The correct response of log-on message checking: $ CALOA, T, * hh<CR><LFGreatT. GreaT.GT
Log-on message authentication error responds: $ CALOA, F, * hh<CR><LFGreatT. GreaT.GT
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
Described PDA mobile device to data center's form that sends datagram is:
$CPROJ,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$CORSD,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$TOTIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$LEVDA,<1>,<2>,……,<n-1>,<n>*hh\r\n
$MININ,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein CPROJ, CORSI, CORSD, TOTDA, TOTIN, LEVIN, LEVDA, MININ represent operation essential information, CORS metrical information, CORS measurement data, total station survey data, total station survey information, spirit level metrical information, spirit level measurement data, mining information respectively.
In the present invention, cryptographic algorithm is rivest, shamir, adelman, encryption principle: first PDA mobile device and data center all produce a pair PKI for encryption and decryption and private key; Wherein, the private keys secret of PDA mobile device, the PKI of PDA mobile device tells data center; The private keys secret of data center, the PKI of data center tells PDA mobile device.Then, when PDA mobile device will send information to data center, PDA mobile device is by the public key encryption information of data center and this message is issued data center.After data center receives this message, data center's message of the private key deciphering PDA mobile device of oneself.
Further, a kind of Data Transport Protocol method that Sbusidence Damage PDA mobile terminal of the present invention provides wireless network to encrypt, uses GPRS network, 3G network or wlan network to carry out data communication between described PDA mobile device and data center.

Claims (5)

1. coal mining surface movement and deformation PDA mobile device host-host protocol method, is characterized in that: acquisition terminal comprises the following steps to data center's transmission data:
(1) data center provides the Resources list to PDA mobile device.
(2) PDA mobile device sends request message according to consensus standard to data center, by checking message, just allows to send data to data center.
(3) PDA mobile device sends log-on message checking to data center, is verified by log-on message, just allows to send mass data to data center.
(4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, after encryption, information sends to data center, then data center receives decrypt data, carries out filtration obtain valid data according to coal mining information transmission protocol.
2. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 1) described in the Resources list, the Resources list comprises the length of version number, time, the Resources list.
3. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 2) described in request message, comprising password, corresponding mount point, version number, in response message, comprise the Resources list.
4. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, is characterized in that: step 3) described in log-on message checking.
5. coal mining surface movement and deformation PDA mobile device host-host protocol method as claimed in claim 1, it is characterized in that: step 4) PDA mobile device tentatively to arrange data according to Sbusidence Damage information and encrypts, and data center receives the deciphering of data.
CN201410538241.1A 2014-09-25 2014-09-25 Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment Pending CN105450622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410538241.1A CN105450622A (en) 2014-09-25 2014-09-25 Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410538241.1A CN105450622A (en) 2014-09-25 2014-09-25 Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment

Publications (1)

Publication Number Publication Date
CN105450622A true CN105450622A (en) 2016-03-30

Family

ID=55560401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410538241.1A Pending CN105450622A (en) 2014-09-25 2014-09-25 Transmission protocol method of coal mine exploitation ground displacement and deformation PDA mobile equipment

Country Status (1)

Country Link
CN (1) CN105450622A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517196A (en) * 2016-06-16 2017-12-26 南京科博空间信息科技有限公司 CORS value-added service cloud platform soft communication agreements

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102042030A (en) * 2010-12-17 2011-05-04 华中科技大学 Construction tunnel safety protection method based on wireless sensor network and a monitoring system thereof
CN201860173U (en) * 2010-11-16 2011-06-08 江苏省电力公司 Multifunctional intelligent interaction terminal
CN202300530U (en) * 2011-10-12 2012-07-04 孙鲁东 Mineral PDA recorder with radio frequency identification function
CN202331472U (en) * 2011-10-12 2012-07-11 孙鲁东 Mine PDA (personal digital assistant) recorder with functions of fingerprint identification and encryption
CN101997877B (en) * 2010-11-16 2013-11-27 江苏省电力公司 Embedded intelligent interactive terminal and communication method thereof
CN103558827A (en) * 2013-11-06 2014-02-05 中煤科工集团重庆研究院有限公司 Mine emergency command communication and management information system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201860173U (en) * 2010-11-16 2011-06-08 江苏省电力公司 Multifunctional intelligent interaction terminal
CN101997877B (en) * 2010-11-16 2013-11-27 江苏省电力公司 Embedded intelligent interactive terminal and communication method thereof
CN102042030A (en) * 2010-12-17 2011-05-04 华中科技大学 Construction tunnel safety protection method based on wireless sensor network and a monitoring system thereof
CN202300530U (en) * 2011-10-12 2012-07-04 孙鲁东 Mineral PDA recorder with radio frequency identification function
CN202331472U (en) * 2011-10-12 2012-07-11 孙鲁东 Mine PDA (personal digital assistant) recorder with functions of fingerprint identification and encryption
CN103558827A (en) * 2013-11-06 2014-02-05 中煤科工集团重庆研究院有限公司 Mine emergency command communication and management information system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
余学祥等: "GNSS/GIS集成的采煤沉陷区铁路自动化监测系统研究", 《现代测绘》 *
褚世仙等: "集成GPS/PDA/TS的地下管网信息采集系统的设计与开发", 《测绘通报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517196A (en) * 2016-06-16 2017-12-26 南京科博空间信息科技有限公司 CORS value-added service cloud platform soft communication agreements

Similar Documents

Publication Publication Date Title
MX2019003356A (en) Secure communication of network traffic.
MX354833B (en) Data encryption protocols for mobile satellite communications.
CN102082796B (en) Method for encrypting channels and simplified method and system for encrypting channels based on HTTP (hyper text transport protocol)
GB201215461D0 (en) Secure wireless link between two devices using probes
WO2009087544A3 (en) Multi-factor authentication and certification system for electronic transactions
RU2015118109A (en) Wireless communication system
GB2528226A (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end
CN104219228A (en) User registration and user identification method and user registration and user identification system
IN2014KN02750A (en)
EP2827552A3 (en) Apparatus and method for transmitting secure data in wireless communication system
WO2018016713A3 (en) Method for security of user equipment connection identifier in wireless communication system and apparatus therefor
CN103826221A (en) Bluetooth based encryption communication method, and correlation systems and methods
CN101707767B (en) Data transmission method and devices
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN106209373B (en) Key generation system, data stamped signature and encryption system and method
CN102655643A (en) Wireless data encryption method and wireless data decryption method
CN103795780A (en) Cloud storage data protection method and device
CN104219054A (en) NFC (near field communication)-based point-to-point data transmission method
CN102143492A (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
TWI590675B (en) Power providing equipment, mobile device, operating method of mobile device
CN105554008A (en) User terminal, authentication server, middle server, system and transmission method
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
JP2017118312A (en) Radio communication system, server, terminal, radio communication method, and program
WO2015186072A9 (en) Encryption and decryption of data between a communications device and smart card with near field communication function
CN102624892A (en) Method for preventing plug-in client from simulating hyper text transmission protocol (HTTP) request

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330