CN107332895A - The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence - Google Patents

The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence Download PDF

Info

Publication number
CN107332895A
CN107332895A CN201710489537.2A CN201710489537A CN107332895A CN 107332895 A CN107332895 A CN 107332895A CN 201710489537 A CN201710489537 A CN 201710489537A CN 107332895 A CN107332895 A CN 107332895A
Authority
CN
China
Prior art keywords
mrow
msub
data
module
mtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710489537.2A
Other languages
Chinese (zh)
Inventor
吴衡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Infinite Technology Co Ltd
Original Assignee
Wuhan Infinite Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Infinite Technology Co Ltd filed Critical Wuhan Infinite Technology Co Ltd
Priority to CN201710489537.2A priority Critical patent/CN107332895A/en
Publication of CN107332895A publication Critical patent/CN107332895A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/4185Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3026Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Algebra (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Data processing equipment technical field of the present invention, disclosing a kind of industrial data collection control system of BOUND communication plug-in unit after intelligence includes:Detection module, mobile terminal detection module, the data read module being connected with industry monitoring master station;Detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit and alarm, and mobile terminal detection module includes the data in mobile phone sharing module for being used to wirelessly share cell phone customer end data being connected with described detection module;Data read module includes:Network data download module, cipher key store, operator database, the network data authentication module being connected respectively with the cipher key store, operator database and the network data download module etc..The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial to the industrial data collection in industrial applications;Make the communication compatibility between master station and acquisition module strong.

Description

The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence
Technical field
The invention belongs to a kind of industrial number of BOUND communication plug-in unit after data processing equipment technical field, more particularly to intelligence According to acquisition control system.
Background technology
A kind of prior art, system that communication plug-in unit is dynamically added to industrial data acquisition system, belongs to industrial automation. Industrial data acquisition system is made up of sensor, instrument, computer communication interface and industrial computer;The output end of sensor connects Instrument is connect, instrument is connected by computer communication interface with industrial computer.Using " rear binding " method, after software translating Carry out corresponding communication plug-in unit in operation to call, communication software plug-in unit can be developed after the completion of systemic software development, be carried The high dynamically adapting ability of system, has larger application reference value for industrial data collection;
, it is necessary to gather various sensor parameters, such as gas in the automatic measurement of accurate (micron order) component of machine product Dynamic sensor, inductive displacement transducer, current type sensor etc..In conventional technique scheme, various sensor parameters are point Do not gather not individually, transmit, cause three problems, one is while when needing some parameters, it is impossible to obtain in time;Two be configuration It is sufficiently complex, serious waste cost;Three, application flexibility is poor, it is impossible to the product of compatible each producer on the market.
In summary, the problem of prior art is present be:Although some layouts to circuit of prior art are optimized, But because sensor parameters can not be directly transferred to user terminal, thus timely and effectively sensor parameters can not be divided Analysis, has a strong impact on automation collection and the measurement of industrial data.
The content of the invention
To solve the problem of prior art is present, it is an object of the invention to provide BOUND communication plug-in unit after a kind of intelligence Industrial data collection control system.
The present invention is achieved in that a kind of industrial data collection control system of BOUND communication plug-in unit after intelligence, described The industrial data collection control system of BOUND communication plug-in unit includes after intelligence:Detection module, mobile terminal detection module and industry Monitor the data read module of master station's connection;
Described detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit And alarm, described microcontroller is connected with described air cleaning member, and the power module receives the electricity of outside input Source voltage and respectively output services voltage are to microcontroller and sensor assembly, and the sensor assembly connects the microcontroller Device, display module and the audio alarm circuit connects the microcontroller respectively, and the alarm connects audio alarm circuit, Sensor assembly is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to micro- Controller, the microcontroller controls display module to show detected air quality according to the detection signal of sensor assembly And when the air quality detected is poor audio alarm circuit and alarm can be controlled to be alarmed;
Described mobile terminal detection module with described detection module including being connected for wirelessly sharing cell phone customer The data in mobile phone sharing module of end data;
Described data read module includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption Network configuration data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module According to authentication module, for obtain in the cipher key store with the private key corresponding to the public key, after the private key pair encryption Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out Network authentication data and network configuration data are stored in shown operator database by certification, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for being reflected using the network in the operator database Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module Explanation module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation It is interior;The interface communication module being connected with the command interpretation module, for being communicated with the mobile terminal;
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described Intelligent management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules;
Sensor assembly includes several sensors, processor, communication module;Several described sensors pass through the mould that communicates Block connects processor;The processor is connected by communication module with microcontroller;
In the private key that the public key of the key library storage and the carrier server matches, in addition to private key plus Close, the encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is choosing The private key taken;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
Further, the sensor measurement model is as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local flute card at moment Measuring value under your coordinate system, be respectively:
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local flute at moment Actual position under karr coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor; For system noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance Matrix is respectively RA(k-1)、RA(k)、RA(k+1)。
Further, the data sharing method of data in mobile phone sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media Agreement results in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to described Address information obtains the stream medium data;
Based on the streaming media service, after the confirmation of the controller is received, exported to the detection module The stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request, It is the first data for sharing to determine any data file;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Further, before the stream medium data is exported to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file It is partially converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one institute is resulted in by stream media protocol State the address information of stream medium data.
Further, request is shared in the acquisition includes:
If detecting the operation information that detection module performs setting operation, being shared according to operation information generation please Ask;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described The first data inputted in real time are converted into stream medium data by service.
Further, the industrial data collection control system of BOUND communication plug-in unit also includes signal acquisition mould after the intelligence Block;The signal acquisition method of the signal acquisition module includes:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes pair Signal carries out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed; Wherein t is sampling instant, and i is the signal sequence after quantifying.
Further, dimensionality reduction is carried out to the signal after quantization, is specifically that the signal after quantization is filtered by finite impulse response (FIR) The difference equation of ripple deviceI=1 ..., M, wherein h (0) ..., h (L-1) are filter coefficient, design Compressed sensing signal acquisition framework based on filtering, constructs following Teoplitz calculation matrix:
Then observeI=1 ..., M, wherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT Singular value be gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λs i∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal, with openness, pass through and solved such as following formula optimization problem, accurate weight on conversion basic matrix Ψ Structure goes out original signal:
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial in industrial applications Industrial data collection;It is sequentially connected between acquisition module, the transmission that the data of collection can be made up of acquisition module Analysis storage is carried out to master station, relative to acquisition module is separately provided, can effectively simplify configuration;The mould of acquisition module collection Intend signal or data signal to send to communication module according to default communication protocol, communication module with the communication protocol of standard by its Send to master station, the communication protocol of standard can be USB communication protocol, wireless communication protocol etc., make master station and acquisition module it Between communication compatibility it is strong.
The encrypting and decrypting method of the present invention, implementation is simple, and safe, flexibility is strong.
The property of multivariable polynomial equation can be conveniently solved in finite field of the present invention, using the method for internal disturbance, A kind of new centralizing mapping is constructed, so as to improve the security of multivariate public key cryptography encryption and decryption scheme, the program is not only With higher efficiency, moreover it is possible to the attack of effective resistance lienarized equation, while can also resist order attack, differential attack and straight Connect attack.
The data sampling and processing of the present invention, and the method such as data sharing, have fully ensured that control system real time data It is accurate to obtain, it is ensured that the intellectuality used, it the composite can be widely applied to home intelligent equipment, communication apparatus, communication system Field.
Brief description of the drawings
Fig. 1 is the industrial data collection control system signal of BOUND communication plug-in unit after intelligence provided in an embodiment of the present invention Figure.
In figure:1st, detection module;2nd, mobile terminal detection module;3rd, industry monitoring master station;4th, data read module;5th, believe Number acquisition module.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The application principle of the present invention is described in detail below in conjunction with the accompanying drawings.
As shown in figure 1, after intelligence provided in an embodiment of the present invention BOUND communication plug-in unit industrial data collection control system, Including:Detection module 1, mobile terminal detection module 2, the data read module 4 being connected with industry monitoring master station 3;
Described detection module 1 includes power module, sensor assembly, microcontroller, display module, audio alarm circuit And alarm, described microcontroller is connected with described air cleaning member, and the power module receives the electricity of outside input Source voltage and respectively output services voltage are to microcontroller and sensor assembly, and the sensor assembly connects the microcontroller Device, display module and the audio alarm circuit connects the microcontroller respectively, and the alarm connects audio alarm circuit, Sensor assembly is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to micro- Controller, the microcontroller controls display module to show detected air quality according to the detection signal of sensor assembly And when the air quality detected is poor audio alarm circuit and alarm can be controlled to be alarmed;
Described mobile terminal detection module 2 with described detection module including being connected for wirelessly sharing cell phone customer The data in mobile phone sharing module of end data;
Described data read module 4 includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption Network configuration data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module According to authentication module, for obtain in the cipher key store with the private key corresponding to the public key, after the private key pair encryption Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out Network authentication data and network configuration data are stored in shown operator database by certification, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for being reflected using the network in the operator database Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module Explanation module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation It is interior;The interface communication module being connected with the command interpretation module, for being communicated with the mobile terminal.
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described Intelligent management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules.
Sensor assembly includes several sensors, processor, communication module;Several described sensors pass through the mould that communicates Block connects processor;The processor is connected by communication module with microcontroller.
In the private key that the public key of the key library storage and the carrier server matches, in addition to private key plus Close, the encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is choosing The private key taken;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
The sensor measurement model is as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local flute card at moment Measuring value under your coordinate system, be respectively:
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local flute at moment Actual position under karr coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor; For system noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance Matrix is respectively RA(k-1)、RA(k)、RA(k+1)。
The data sharing method of data in mobile phone sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by Streaming Media Agreement results in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to described Address information obtains the stream medium data;
Based on the streaming media service, after the confirmation of the controller is received, exported to the detection module The stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request, It is the first data for sharing to determine any data file;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Before the stream medium data is exported to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control Information determines to perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file It is partially converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one institute is resulted in by stream media protocol State the address information of stream medium data.
Request is shared in the acquisition to be included:
If detecting the operation information that detection module performs setting operation, being shared according to operation information generation please Ask;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, Streaming Media is called based on described The first data inputted in real time are converted into stream medium data by service.
The industrial data collection control system of BOUND communication plug-in unit also includes signal acquisition module 5 after the intelligence;It is described The signal acquisition method of signal acquisition module includes:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes pair Signal carries out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed; Wherein t is sampling instant, and i is the signal sequence after quantifying.
Dimensionality reduction is carried out to the signal after quantization, is specifically the difference that finite impulse response filter is passed through to the signal after quantization Divide equationI=1 ..., M, wherein h (0) ..., h (L-1) are filter coefficient, and design is based on filtering Compressed sensing signal acquisition framework, construct following Teoplitz calculation matrix:
Then observeI=1 ..., M, wherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT Singular value be gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λs i∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal, with openness, pass through and solved such as following formula optimization problem, accurate weight on conversion basic matrix Ψ Structure goes out original signal:
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
The quantity for the signal acquisition module that the present invention is provided can be assembled freely as needed, beneficial in industrial applications Industrial data collection;It is sequentially connected between acquisition module, the transmission that the data of collection can be made up of acquisition module Analysis storage is carried out to master station, relative to acquisition module is separately provided, can effectively simplify configuration;The mould of acquisition module collection Intend signal or data signal to send to communication module according to default communication protocol, communication module with the communication protocol of standard by its Send to master station, the communication protocol of standard can be USB communication protocol, wireless communication protocol etc., make master station and acquisition module it Between communication compatibility it is strong.
The encrypting and decrypting method of the present invention, implementation is simple, and safe, flexibility is strong.
The property of multivariable polynomial equation can be conveniently solved in finite field of the present invention, using the method for internal disturbance, A kind of new centralizing mapping is constructed, so as to improve the security of multivariate public key cryptography encryption and decryption scheme, the program is not only With higher efficiency, moreover it is possible to the attack of effective resistance lienarized equation, while can also resist order attack, differential attack and straight Connect attack.
The data sampling and processing of the present invention, and the method such as data sharing, have fully ensured that control system real time data It is accurate to obtain, it is ensured that the intellectuality used, it the composite can be widely applied to home intelligent equipment, communication apparatus, communication system Field.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.

Claims (7)

1. the industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence, it is characterised in that bound after the intelligence The industrial data collection control system of communication plug-in unit includes:Detection module, mobile terminal detection module and industry monitoring master station connect The data read module connect;
Described detection module includes power module, sensor assembly, microcontroller, display module, audio alarm circuit and report Alert device, described microcontroller is connected with described air cleaning member, and the power module receives the power supply electricity of outside input Press and distinguish output services voltage to microcontroller and sensor assembly, the sensor assembly connects the microcontroller, institute State display module and audio alarm circuit connects the microcontroller respectively, the alarm connects audio alarm circuit, sensing Device module is used to detect ambient air quality and according to the corresponding detection signal of the air quality result of detection output to microcontroller Device, the microcontroller shows detected air quality according to the detection signal of sensor assembly control display module and can Audio alarm circuit and alarm is controlled to be alarmed when the air quality detected is poor;
Described mobile terminal detection module with described detection module including being connected for wirelessly sharing cell-phone customer terminal number According to data in mobile phone sharing module;
Described data read module includes:
Network data download module, is matched somebody with somebody for being downloaded from carrier server by the Network authentication data and network after public key encryption Put data;
Cipher key store, for storing the private key matched with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network data being connected respectively with the cipher key store, the operator database and the network data download module is recognized Demonstrate,prove module, for obtain in the cipher key store with the private key corresponding to the public key, pass through the network after the private key pair encryption Authorization data and network configuration data are decrypted, and the Network authentication data and network configuration data after decryption are recognized Network authentication data and network configuration data are stored in shown operator database by card, certification after;
Described data read module also includes:
The authentication module being connected with the operator database, for using the network authentication number in the operator database According to completion authentication request;
The network selection module being connected with the operator database, for by setting the Network authentication data and network Configuration data;
The command interpretation being connected respectively with the network data download module, the authentication module and the network selection module Module, sends to corresponding functional module for explaining the order from the mobile terminal, and by the order after explanation;With The interface communication module that the command interpretation module is connected, for being communicated with the mobile terminal;
The industrial data collection control system of BOUND communication plug-in unit also includes intelligent management system after the intelligence;Described intelligence Management system is connected with described data read module;And it is provided with mobile phone terminal APP data reception modules;
Sensor assembly includes several sensors, processor, communication module;Several described sensors are connected by communication module Connect processor;The processor is connected by communication module with microcontroller;
In the private key that the public key of the key library storage and the carrier server matches, include the encryption of private key, institute Stating encryption method includes:
Public key is generated:Public key is by finite field k, and the secondary multinomial composition of its addition and multiplication structure and n;
Private key is generated:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], a point Collect P, two reversible affine transformation L1And L2And their inverse composition;
Ciphering process is given plaintext M '=(x '1,…,x′n), it is encrypted with the public key of selection, formation ciphertext Z '= (z′1,…,z′n);
The process that centralizing mapping is reconfigured comprises the following steps:
First, selection r is a smaller integer, randomly chooses r Line independent equation
<mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mn>1</mn> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mtable> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> <mtr> <mtd> <mo>.</mo> </mtd> </mtr> </mtable> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mi>r</mi> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mi>r</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForWith being combined for Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*The original centralizing mapping of disturbanceNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingI.e. two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
<mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>,</mo> <mi>&amp;lambda;</mi> <mo>)</mo> </mrow> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&amp;lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x '1,…,x′n);
Plaintext is encrypted with the public key of selection, the ciphertext after encryption is:
Z '=(z '1,…,z′n), wherein
The decrypting process of the network data authentication module is the inverse process of cipher key store encryption, and decryption key used is selection Private key;Described decrypting process comprises the following steps:
Obtaining ciphertext Z '=(z '1,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y '1,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
<mrow> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> </mrow> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mrow> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&amp;prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&amp;lambda;</mi> <mo>)</mo> </mrow> <mo>,</mo> </mrow>
Then Z (y " are verified1,…,y2l")=μ, if invalid, abandons this class value;Otherwise next step is carried out;
Finally calculate:
M '=L1 -1(y″1,…,y2l")=(m '1,…,m2l'),
If only unique one group of (m '1,…,m2l'), then M ' just must be corresponding plaintext, if obtained more than one group (m '1,…,m2l'), then verify the mode of equation to determine unique plaintext with Hash functions or increase.
2. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that institute State sensor measurement model as follows:
YA(tk-1)、YA(tk)、YA(tk+1) be respectively temperature sensor A to target in tk-1,tk,tk+1The local Descartes at moment sits Measuring value under mark system, be respectively:
<mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>-</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <msub> <msup> <mi>Y</mi> <mo>&amp;prime;</mo> </msup> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>-</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>C</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>-</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <msub> <mi>&amp;xi;</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>-</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>n</mi> <mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>-</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </msub> <mo>;</mo> </mrow>
<mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mi>k</mi> </msub> <mo>)</mo> </mrow> <mo>=</mo> <msub> <msup> <mi>Y</mi> <mo>&amp;prime;</mo> </msup> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mi>k</mi> </msub> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>C</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mi>k</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>&amp;xi;</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mi>k</mi> </msub> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>n</mi> <mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mi>k</mi> </msub> <mo>)</mo> </mrow> </mrow> </msub> <mo>;</mo> </mrow>
<mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <msub> <msup> <mi>Y</mi> <mo>&amp;prime;</mo> </msup> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <msub> <mi>C</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <msub> <mi>&amp;xi;</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>n</mi> <mrow> <msub> <mi>Y</mi> <mi>A</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>t</mi> <mrow> <mi>k</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </msub> <mo>;</mo> </mrow>
Wherein, Y'A(tk-1)、Y'A(tk)、Y'A(tk+1) it is respectively temperature sensor A in tk-1,tk,tk+1The local Descartes at moment Actual position under coordinate system;CA(t) it is the transformation matrix of error;ξA(t) it is the systematic error of temperature sensor;To be System noise, it is assumed thatFor zero-mean, separate Gaussian stochastic variable, noise covariance matrix Respectively RA(k-1)、RA(k)、RA(k+1)。
3. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that hand The data sharing method of machine data sharing module, is specifically included:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one by stream media protocol Result in the address information of the stream medium data;
The address information is sent to controller;Wherein, the address information is used to make the detection module according to the address Stream medium data described in information acquisition;
Based on the streaming media service, after the confirmation of the controller is received, export described to the detection module Stream medium data.
4. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that root Include according to first data for sharing request determination for sharing:
If from it is described share the fileinfo of any data file stored on the detection module is got in request, it is determined that Any data file is the first data for sharing;
If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as For the first data shared.
5. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that Before exporting the stream medium data to the detection module, further comprise:
Control information is sent to the detection module, the control information is used to make the detection module according to the control information It is determined that performing the stream medium data application program;
When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one by stream media protocol results in institute Stating the address information of stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Obtain the currently processed positional information of any data file, and by untreated part in any data file Be converted to stream medium data and generation one results in the address information of the stream medium data by stream media protocol;
Any data file is converted into stream medium data and generation one stream is resulted in by stream media protocol The address information of media data.
6. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 3, it is characterised in that institute Stating acquisition and sharing request includes:
If detecting the operation information that detection module performs setting operation, request is shared according to operation information generation;
The handling process that any data file is terminated after the confirmation of the detection module is received;
Share described in obtaining after request, using the data inputted in real time as the first data, streaming media service is called based on described The first data inputted in real time are converted into stream medium data.
7. the industrial data collection control system of BOUND communication plug-in unit after intelligence as claimed in claim 1, it is characterised in that institute Stating the industrial data collection control system of BOUND communication plug-in unit after intelligence also includes signal acquisition module;The signal acquisition module Signal acquisition method include:
First, echo signal x (t) is acquired within the independent sampling period with awareness apparatus, and with A/D modes to signal Carry out digital quantization;Then, dimensionality reduction is carried out to the signal x (i) after quantization;Finally, the signal after dimensionality reduction is reconstructed;Wherein T is sampling instant, and i is the signal sequence after quantifying.
Dimensionality reduction is carried out to the signal after quantization, is specifically the difference side that finite impulse response filter is passed through to the signal after quantization JourneyWherein h (0) ..., h (L-1) are filter coefficient, are designed based on filtering Compressed sensing signal acquisition framework, constructs following Teoplitz calculation matrix:
Then observeWherein b1,…,bLRegard filter coefficient as;Submatrix ΦFT's Singular value is gram matrix G (ΦF, T) and=Φ 'FTΦFTThe arithmetic root of characteristic value, checking G (Φ F, T) all eigenvalue λ i ∈(1-δK,1+δK), i=1 ..., T, then ΦFRIP is met, and original signal is reconstructed by solving such as following formula optimization problem:
<mfenced open = "" close = ""> <mtable> <mtr> <mtd> <munder> <mrow> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> <mi>x</mi> </munder> </mtd> <mtd> <mrow> <mo>|</mo> <mo>|</mo> <mi>x</mi> <mo>|</mo> <msub> <mo>|</mo> <mn>1</mn> </msub> </mrow> </mtd> <mtd> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> </mrow> </mtd> <mtd> <mrow> <mi>y</mi> <mo>=</mo> <msub> <mi>&amp;Phi;</mi> <mi>x</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced>
Original signal, that is, BP algorithm are reconstructed by linear programming method;
For actual compression signal, Φ is then changed in the collection of such as voice or picture signalFFor following form:
If signal has openness on conversion basic matrix Ψ, by solving such as following formula optimization problem, Accurate Reconstruction goes out Original signal:
<mrow> <mtable> <mtr> <mtd> <munder> <mi>min</mi> <mi>&amp;alpha;</mi> </munder> </mtd> <mtd> <mrow> <mo>|</mo> <mo>|</mo> <mi>&amp;alpha;</mi> <mo>|</mo> <msub> <mo>|</mo> <mn>1</mn> </msub> </mrow> </mtd> <mtd> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> </mrow> </mtd> <mtd> <mrow> <mi>y</mi> <mo>=</mo> <msub> <mi>&amp;Phi;</mi> <mi>x</mi> </msub> <mo>=</mo> <mi>&amp;Phi;</mi> <mi>&amp;Psi;</mi> <mi>&amp;alpha;</mi> <mo>=</mo> <mi>&amp;Xi;</mi> <mi>&amp;alpha;</mi> </mrow> </mtd> </mtr> </mtable> <mo>;</mo> </mrow>
Wherein Φ is uncorrelated to Ψ, and Ξ is referred to as CS matrixes.
CN201710489537.2A 2017-06-24 2017-06-24 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence Pending CN107332895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710489537.2A CN107332895A (en) 2017-06-24 2017-06-24 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710489537.2A CN107332895A (en) 2017-06-24 2017-06-24 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence

Publications (1)

Publication Number Publication Date
CN107332895A true CN107332895A (en) 2017-11-07

Family

ID=60194655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710489537.2A Pending CN107332895A (en) 2017-06-24 2017-06-24 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence

Country Status (1)

Country Link
CN (1) CN107332895A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819673A (en) * 2017-11-24 2018-03-20 安徽省雨龙家具有限公司 It is a kind of based on the intelligent home furnishing control method to communicate in time
CN110362055A (en) * 2019-08-05 2019-10-22 广东省智能制造研究所 A kind of industrial data acquisition system that terminal is expansible and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201616012U (en) * 2010-04-03 2010-10-27 东方电子股份有限公司 Main controller device used for high-voltage frequency converter modular design
CN103034206A (en) * 2012-12-14 2013-04-10 昆明理工大学 Industrial data collection system adopting late binding communication plug-in unit
CN103036573A (en) * 2012-12-03 2013-04-10 南京工业大学 compressed sensing signal acquisition method based on filtering
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN105381556A (en) * 2015-11-19 2016-03-09 宁波祖创电子科技有限公司 Intelligent wearable type air purifier
CN106667273A (en) * 2017-03-06 2017-05-17 王思琪 Water dispenser with ultraviolet sterilization function

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201616012U (en) * 2010-04-03 2010-10-27 东方电子股份有限公司 Main controller device used for high-voltage frequency converter modular design
CN103036573A (en) * 2012-12-03 2013-04-10 南京工业大学 compressed sensing signal acquisition method based on filtering
CN103034206A (en) * 2012-12-14 2013-04-10 昆明理工大学 Industrial data collection system adopting late binding communication plug-in unit
CN103501227A (en) * 2013-10-23 2014-01-08 西安电子科技大学 Improved multi-variable public key cryptogram encryption and decryption scheme
CN105381556A (en) * 2015-11-19 2016-03-09 宁波祖创电子科技有限公司 Intelligent wearable type air purifier
CN106667273A (en) * 2017-03-06 2017-05-17 王思琪 Water dispenser with ultraviolet sterilization function

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819673A (en) * 2017-11-24 2018-03-20 安徽省雨龙家具有限公司 It is a kind of based on the intelligent home furnishing control method to communicate in time
CN110362055A (en) * 2019-08-05 2019-10-22 广东省智能制造研究所 A kind of industrial data acquisition system that terminal is expansible and method

Similar Documents

Publication Publication Date Title
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN106534313B (en) The frequency measuring method and system of facing cloud end data publication protection safety and privacy
JP5311459B2 (en) Information collection system and external access device
CN101873587B (en) Wireless communication device and method for realizing service security thereof
CN107770405A (en) Image encryption method and device
CN106330856A (en) Hearing device and method of hearing device communication
CN107666386B (en) Data secure transmission method and device
CN107064428A (en) A kind of room air monitor and alarm system
CN106888452A (en) The wireless encryption transceiver and method of data are transmitted wirelessly from computer at least one field apparatus
CN115085923A (en) Data processing-based applet data encryption method
CN104937382A (en) Systems and methods for providing a cloud flowmeter
CN107332895A (en) The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence
CN106301793A (en) A kind of PLC certification and the method for secure communication
CN110213300A (en) A kind of intelligence edge Internet of Things agent apparatus
CN113901412A (en) Power quality disturbance detection method and device, electronic equipment and storage medium
CN106686006A (en) Big data implementation control system based on Internet network security
CN115459919A (en) Internet of things universal terminal security authentication system, method and device and Internet of things communication terminal
CN102394746B (en) Data transmission method of weighing system based on digital sensor
CN116208632A (en) Fire-fighting product tracing system and method based on blockchain, internet of things and IPFS
CN104735136A (en) Novel mathematics learning system based on network
TWI707573B (en) Apparatus for adding data to blockchain, data verification apparatus, and data verification method
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN109802948A (en) Data processing equipment and transaction system
CN107547516A (en) The encryption method at times and device of internet-of-things terminal data
CN116743341A (en) Measurement data secure sharing method based on homomorphic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171107