CN108183553A - A kind of data test and acquisition monitoring device, intelligent grid and its user terminal - Google Patents

A kind of data test and acquisition monitoring device, intelligent grid and its user terminal Download PDF

Info

Publication number
CN108183553A
CN108183553A CN201810006240.0A CN201810006240A CN108183553A CN 108183553 A CN108183553 A CN 108183553A CN 201810006240 A CN201810006240 A CN 201810006240A CN 108183553 A CN108183553 A CN 108183553A
Authority
CN
China
Prior art keywords
data
wireless
acquisition terminal
monitoring
wireless data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810006240.0A
Other languages
Chinese (zh)
Other versions
CN108183553B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningxia LGG Instrument Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810006240.0A priority Critical patent/CN108183553B/en
Publication of CN108183553A publication Critical patent/CN108183553A/en
Application granted granted Critical
Publication of CN108183553B publication Critical patent/CN108183553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B70/00Technologies for an efficient end-user side electric power management and consumption
    • Y02B70/30Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S20/00Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
    • Y04S20/20End-user application control systems
    • Y04S20/242Home appliances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/126Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of data test and acquisition monitoring device, intelligent grid and its user terminals, which includes data monitoring and processing module, for the data that wireless data acquisition terminal is sent to be handled and monitored;Control centre, for controlling the operation of whole system;Client control module, for monitoring wireless sensor network node;Display terminal is used to implement monitoring system and the human-computer interaction of administrator.The system can realize the radio detection and transmission to the power information of smart power grid user, can ensure the detection continuity and accuracy of user power utilization data, and can greatly ensure confidentiality and the safety of power information transmission.

Description

A kind of data test and acquisition monitoring device, intelligent grid and its user terminal
The application be application No. is:201510586655.6 the applying date:It is on 09 15th, 2015, entitled " a kind of The divisional application of the patent of invention of the monitoring device of wireless test and data transmission system ".
Technical field
The present invention relate to data test and acquisition monitoring field, and in particular to a kind of wireless test at smart power grid user end and The monitoring device of data transmission system.
Background technology
Intelligent grid, also known as knowledge type power grid or modern power network are by modern advanced sensing and measuring technique, letter Message communication technology, control technology and original power transmission and distribution infrastructure it is highly integrated and formed novel power grid.Intelligent distribution network Opening cause a large amount of collecting terminals and mobile terminal extensive use and access, this just passes data in intelligent distribution network The problems such as defeated integrality, confidentiality, attack tolerant and secret protection, proposes new challenge.Intelligent electric energy meter is intelligent electricity The intelligent terminal of net, it has not been traditional electric energy meter, and intelligent electric energy meter is used substantially in addition to having traditional electric energy meter Other than the function of measuring of electricity, in order to adapt to the use of intelligent grid and new energy, it also has two-way a variety of rate metering work( The intelligentized work(such as energy, user terminal control function, the bidirectional data communication function of plurality of data transmission modes, anti-stealing electricity function Can, intelligent electric energy meter represents the developing direction of following energy-conserving intelligent power grid end user's intelligent terminal.
In recent years, it with the development and mutually fusion of sensor, computer, wireless communication and the technologies such as micro electronmechanical, generates Wireless sensor network (WSN).Wireless sensor network by all kinds of integrated microsensors collaboratively in real time monitoring, The information of various environment or monitored object is perceived and acquired, is widely used in environmental monitoring, health care, military defense, anti-terrorism The every field such as the disaster relief.Wireless sensor network is considered as one of 21 century most important technology, is current built-in field The hot spot of research has the boundless market space and researching value.Wireless sensor network is increasingly becoming intelligent power distribution Most important user terminal data collecting system in net.
At present, the problems such as integrality transmitted both at home and abroad to wireless sensor network data, confidentiality, attack tolerant, carries out Certain research, it is proposed that a variety of different Broadcast authentication protocols.One kind is μ TESLA Broadcast authentication protocols, and the agreement is right It is using the shared key between base station and node, by way of unicast when the initiation parameter of broadcast authentication is allocated Come what is completed.It sends authentication key by delay and judges delay duration and determine the integrality of transmitted data packet.The party Case safety is preferable, but message authentication has delay, and this delay can lead to the generation of dos attack.Later researcher is to μ TESLA A series of improvement are carried out, it is proposed that multistage μ TESLA schemes, the μ TESLA schemes of more base stations, the μ TESLA for certification drift Prioritization scheme and μ TESLA certificate schemes based on message-driven etc..These prioritization schemes are all on basic μ TESLA bases The improvement of upper progress, essential idea do not change, therefore it is the problem of always existing to be delayed, they still cannot resist DOS Attack.Other researchers propose a kind of certificate scheme of once signed in intelligent grid, but the program is to reaching very Good safety will consume very big signature and certification expense.Later researcher proposes the broadcast authentication based on Merkle trees again Agreement, the method which uses direct certification, does not postpone, efficiently solve the problems, such ass dos attack, while realize more The certification together of a node, the function being mutually authenticated.But it will result in node storage overhead when number of nodes is excessive and communication opened The problem of pin is all excessive.Therefore researcher proposes a kind of broadcast for being classified Merkle trees on the basis of basic Merkle trees again Strategy, this method are designed for great deal of nodes, substantially reduce storage and the communication overhead of node.Recent study persons propose Merkle authentication tree agreements are applied to the scheme of intelligent grid, the safety which is applied to user and community portal is led to The safety of communication is improved in letter.But effective secret protection is not carried out to user data, attacker intercepts user's hair The information sent can also interpret useful data.The leakage of the privacies such as the power information and electricity consumption rule of user will cause into The event that room theft etc. endangers people's lives safety occurs.
Invention content
The present invention provides a kind of wireless test and the monitoring device of data transmission system, the monitoring device and can realize to intelligence The radio detection of the power information of power grid user and transmission can ensure the detection continuity and accuracy of user power utilization data, And it can greatly ensure confidentiality and the safety of power information transmission.
To achieve these goals, the present invention provides a kind of wireless test and the monitoring device of data transmission system, wherein The system has wireless sensor network node, monitoring device and wireless data transfer module, wherein, the wireless sensor network The wireless data acquisition terminal of network node passes through wireless data transfer module wireless connection with monitoring device;
The monitoring device includes:
Data monitoring and processing module, for the data that wireless data acquisition terminal is sent to be handled and monitored;
Control centre, for controlling the operation of whole system;
Client control module, for monitoring wireless sensor network node;
Display terminal is used to implement monitoring system and the human-computer interaction of administrator.
Preferably, the control centre is low-power scm, it is preferred to use MSP430F149 microcontrollers certainly can also Using other microcontrollers, such as ARM microcontrollers either AVR single chip.
Preferably, the data monitoring and processing module and wireless data transfer module can build secure communication jointly and lead to Road, is bi-directionally connected wireless data acquisition terminal and control centre, control centre to the data into monitoring device at Reason and control.
Preferably, control centre is completed by secured communication channel to the safety verification of wireless data acquisition terminal, if Acquisition terminal is dangerous, then the acquisition terminal is prevented to enter monitoring device and carries out data storage with exchanging, if acquisition terminal is pacified Entirely, then the wireless data acquisition terminal is allowed to carry out data storage with exchanging.
Preferably, the storage and exchange process that control centre can be to data all in system, are encrypted.
Preferably, the client control module can be sent out the control instruction of control centre by the form of wireless transmission Wireless data acquisition terminal is given, the data of wireless data acquisition terminal to be controlled to acquire.
The present invention has the following advantages and beneficial effect:(1) wireless sensor network node can be realized in real time to intelligent electricity The acquisition of the environment temperatures of network users, humidity, voltage, electric current, active and idle etc. information;(2) it uses and wirelessly carries out Networking greatly reduces the stock number occupied in data transmission procedure, reduces implementation cost, and be easily installed, safeguard, is controlling Room processed carries out the power information of the multiple smart power grid users of unified monitoring, improves monitoring efficiency, has saved human cost;(3) Improved data collection station and data processing module can ensure the monitoring continuity and accuracy of climatic data, accurate to instruct Agricultural production;(4) it by establishing secured communication channel, to the data storage in system and exchange process, is encrypted, It can ensure the safety and reliability of system communication, avoid user power utilization information leakage.
Description of the drawings
Fig. 1 shows a kind of wireless test of monitoring device and the block diagram of data transmission system with the present invention.
Fig. 2 shows a kind of wireless test of the present invention and the monitoring methods of data transmission system.
Specific embodiment
Fig. 1 is a kind of wireless test and data transmission system for showing the monitoring device with the present invention.The system packet It includes:Wireless sensor network node 1, for detecting and acquiring smart power grid user client information;Monitoring device 3, it is whole for controlling The operation and data processing of a system;Wireless data transfer module 2, for the user data of wireless sensor network node acquisition Radio to monitoring device;The wireless sensor network node 1 includes multiple sensor nodes 11 and data acquisition Terminal 12;Wherein, the wireless data acquisition terminal 12 of the wireless sensor network node 1 leads to 3 mistake nothings with monitoring device
2 wireless connection of line data transmission module.
The monitoring device 3 includes:Data monitoring and processing module 31, control centre 32,33 He of client control module Display terminal 34.Preferably, the control centre 32 is low-power scm, it is preferred to use MSP430F149 microcontrollers, certainly Other microcontrollers, such as ARM microcontrollers either AVR single chip can also be used.
The data monitoring and processing module 31 and wireless data transfer module 2 can build secured communication channel jointly, double To connection wireless data acquisition terminal 12 and control centre 32, control centre 32 carries out the data into monitoring device 3 Processing and control.
Control centre 32 completes the safety verification to wireless data acquisition terminal by secured communication channel, if acquisition is eventually Hold it is dangerous, then prevent the acquisition terminal 12 enter monitoring device 3 carry out data storage with exchanging, if acquisition terminal 12 is pacified Entirely, then the wireless data acquisition terminal 12 is allowed to carry out data storage with exchanging.
Control centre 32 can be to data all in system storage and exchange process, be encrypted.
The client control module 34 can be sent the control instruction of control centre 32 by the form of wireless transmission To wireless data acquisition terminal 12, the data of wireless data acquisition terminal 12 to be controlled to acquire.
Control centre 32 is equipped with monitoring software and is configured with backstage real-time data base, and the monitoring software has monitoring work( Software format can and can be stored data as.The monitoring software of middle control module installation customized development, realizes the company to monitoring data Continuous acquisition is checked and is preserved.The software has a variety of monitoring functions, and such as real time monitoring, real-time curve is shown, history curve is shown Show, alarm.Software configuration backstage real-time data base, can store acquired data according to actual demand, and such as timing storage becomes Change storage etc.;Software support stores data as the popular softwares form such as Excel simultaneously, convenient for subsequently to the use of data.
The wireless data acquisition terminal 12 is provided with firewall module, and wireless data acquisition terminal 12 and wireless data pass It send and an encrypting module is each provided in module 2, also set up in Wireless data transmission module there are one authentication module, data Mutually independent binary channels link block is provided between delivery module and firewall module.
The wireless data acquisition terminal 12 includes:Including MCU, analog input unit, On-off signal unit, relay Device output unit, digital output unit, sram cell, RTC units, watchdog unit, RS232/RS485/RS422 units, Radio-cell and power supply unit;Wherein analog input unit, On-off signal unit are connect with MCU, and MCU is defeated with relay Go out unit, digital output modular unit, at the same MCU also with sram cell, RTC units, watchdog unit, RS232/RS485/ RS422 units, radio-cell and LED light unit;RS232/RS485/RS422 units are connect with user interface circuit, Radio-cell connects ZigBee transmission antennas and adapter circuit.
The wireless data transfer module 2 includes ZigBee reception antennas, adapter circuit and data/address bus, for receiving Data collection station wireless signal, and give the data processing module via data bus transmission.
The sensor node 11 may include:Include air temperature sensor, air humidity sensor, voltage sensor, electricity One or both of flow sensor, active sensor, idle sensor and above combination.
At the use High performance industrial grade of wireless data acquisition terminal 12 wireless module, 32 bit walk of High performance industrial grade Device is managed, supports multistage suspend mode and awakening mode, reduces power consumption to greatest extent, built-in real-time clock (RTC) supports time switch Machine.It is preferred that using metal shell, protection class IP30, metal shell and system security isolation, particularly suitable for industry control scene Using.The wireless data acquisition terminal is designed using WDT house dogs, ensures that system is stablized, using the complete anti-mechanism that goes offline, Ensure that data terminal is always online, 15KVESD built in S232/RS485 interfaces is protected, antennal interface lightning protection.
Fig. 2 shows a kind of wireless test of the present invention and the monitoring methods of data transmission system.This method specifically includes Following steps:
S1. the communication including control centre, wireless data acquisition terminal and wireless data transfer module is built System, wireless data acquisition terminal can send and receive data to the wireless data transfer module;
S2. secured communication channel is established, is bi-directionally connected wireless data acquisition terminal and control centre, control centre is to described Data into the wireless data acquisition terminal of system are handled and are controlled;
S3. control centre completes the safety verification of wireless data acquisition terminal by secured communication channel, if acquisition is eventually Hold it is dangerous, then prevent the wireless data acquisition terminal enter system carry out data encryption storage with exchanging, if acquisition terminal Safety then allows the acquisition terminal to carry out data encryption storage with exchanging.
The foundation of secured communication channel is completed using following steps in S2:
S21. when wireless data acquisition terminal sends connection application to control centre, wireless data acquisition terminal is looked into first The session connection information whether cached with control centre is ask, is, using the digest algorithm cached in session connection information to meeting It talks about key and carries out digest calculations, it will words number and the session id and session cipher key digest field of abstract result write-in connection application packet In;Whether buffer control center certificate is inquired again, is then by the control of the certificate serial number of control centre write-in connection application packet In center certificate sequence-number field processed, then the sequence number write-in wireless data acquisition terminal card by wireless data acquisition terminal certificate In preface row field;Asymmetric encryption and Digital Signature Algorithm Assembly Listing are filled in, and connection application is sent to control centre;
S22. it after control centre receives the connection application data packet of wireless data acquisition terminal transmission, is looked into according to session number Whether inquiry is cached with corresponding session connection information, is, using the digest algorithm cached in session connection information to session key Digest calculations are carried out, result of calculation is compared with the summary data of session key that wireless data acquisition terminal is sent;Such as Fruit comparing result is consistent, then using session key and symmetry algorithm as the key and algorithm of data protection in secured communication channel, And enter in next step;
S23. control centre sends to terminal negotiates to terminate order, and the negotiation that terminal receives control centre's transmission terminates order Afterwards, escape way foundation terminates.
In S22, if comparing result is inconsistent, following step flow is performed:
S221. control centre reads the sequence number for control centre's certificate that wireless data acquisition terminal is sent, if with this It holds the certificate serial number used consistent, does not then send the certificate of control centre to wireless data acquisition terminal, and perform next step Flow;
S222. control centre reads the sequence number for the wireless data acquisition terminal certificate that wireless data acquisition terminal is sent, Whether wireless data acquisition terminal certificate has been cached according to sequence number inquiry;It is not need to wireless data acquisition terminal to control Center processed sends the certificate of wireless data acquisition terminal, and performs following workflows:
S2221. control centre reads the algorithm combination list that wireless data acquisition terminal is sent, and selects a group encryption intensity Highest algorithm combination is sent to wireless data acquisition terminal, and perform as the AES combination used in below scheme Next step flow;
S2222. control centre generates one group of interim unsymmetrical key pair, private key and the step using control centre The asymmetric arithmetic in algorithm combination selected in rapid S2221 is digitally signed temporary public key, by signature result with facing When public key group packet, to terminal send cipher key interaction data packet;
S2223. it sends connection application to wireless data acquisition terminal and terminates data packet;S2224. wireless data acquisition terminal Receive the connection application response data packet of control centre's transmission, the combination of cache key negotiation algorithm and session number;Wireless data is adopted If collection terminal receives control centre's certificate data packet of control centre's transmission, legitimate verification is carried out to control centre's certificate, It is proved to be successful, then using the sequence number in certificate as mark, the digital certificate at buffer control center;Authentication failed then exits This flow disconnects;If wireless data acquisition terminal receives the application wireless data acquisition terminal card of control centre's transmission The certificate group of local terminal is then bundled into certificate data packet by the request for data packet of book, is sent to control centre;Wireless data acquisition terminal The key agreement data packet of control centre's transmission is received, then using the public key in control centre's certificate of caching and the caching Cipher key agreement algorithm combination in asymmetric arithmetic, the temporary public key signing messages of control centre is verified, if not into Work(then exits flow, and break link;Next step is performed if success;
S2225. wireless data acquisition terminal at random generation one session key, as in escape way data protection it is close Key, using the symmetry algorithm in algorithm combination as protection algorism;Using session number as mark, it will words key, symmetrical calculation Method is cached with digest algorithm;Session key is encrypted using asymmetric arithmetic, and using asymmetric arithmetic to encryption Session key afterwards carries out digital label;By encrypted session key and digital signature group packet, key is sent to control centre Negotiation data packet;
S2226. it is sent to control centre and negotiates to terminate order;
If S2227. control centre receives wireless data acquisition terminal certificate data packet, wireless data acquisition terminal is demonstrate,proved Book carries out legitimate verification, if be proved to be successful, using the sequence number in certificate as mark, and the number card at buffer control center Book;If authentication failed exits this flow, disconnect;
S2228. after control centre receives the key agreement data packet of wireless data acquisition terminal transmission, wireless data is used The asymmetric arithmetic in the algorithm combination selected in public key and step S22 in acquisition terminal certificate carries out signed data Flow, and break link are exited in signature verification if unsuccessful;Local terminal private key and asymmetric arithmetic solution are used if success Close session key, and the session number generated using in step S22 is as mark, it will words key, symmetry algorithm and digest algorithm It is cached;And using session key and symmetry algorithm name as the key and algorithm of data protection in secured communication channel;It performs Step S23.
Preferably, in the step S221, if not caching wireless data acquisition terminal certificate, in the step Increase below scheme between S2221 and the step S2222:Control centre sends control centre's card to wireless data acquisition terminal Book;Control centre sends the request for obtaining wireless data acquisition terminal certificate to wireless data acquisition terminal.
Preferably, in step s3, the control centre to through safety certification and enter system wireless data adopt The detailed process for collecting progress data encryption storage and the exchange of terminal imports source data, S32 data intercepts by S31, and S33 systems turn It changes, S34 character transcodings, S35 data recombinations, S36 character strings are substituted to be completed with S37 shortage of data storage composition, in addition to Outside step S31 and step S32, other procedural orders can change.
Preferably, in step S32, in the function of interception character, need three elements, i.e., character to be intercepted, interception Digit and the initial position of interception, source data is character to be intercepted, and the length intercepted is specified, and the initial position value of interception is By password input by user, data that machine code or server end return split into it is several after all plus 1, the number of fractionation needs The group number of source data to be imported with plan is identical.
For being intercepted with MID (text, start_num, num_chars) function by bank card password, wherein text tables Show character to be intercepted i.e. source data, num_chars represents the digit of interception, and start_num is the start bit for representing interception It puts, num_chars can be specified, when needing upgrading, it is only necessary to source data digit is changed, and reassigns num_chars values, Such as num_chars values are designated as 20 by 10, then the character intercepted becomes 20 by 10, here it is expand algorithm, And 6 numbers that bank card can be inputted password by start_num values decouple, the value split adds 1, as start_ Num values intercept character, and method for splitting is relatively more, example MID (password, 1,1), MID (password, 2,1), MID (password, 3,1), MID (password, 4,1), MID (password, 5,1), MID (password, 6,1), i.e., by 6 Password values become 6 individual characters, for example, in 6 groups of source data first group be denoted as text1, utilize MID (text1, MID (password, 1,1)+1,20), it is possible to 1 position be added to start with the first bit digital of password password Text1 is intercepted, intercepts 20, the purpose for intercepting character is that simple data is mingled in complex data, for example, close in bank card In the design process of code, by this step, password is mingled in source data, after introducing 6 groups of source datas, text values are exactly source number According to, and start_num values are exactly+1 values of MID (password, A, 1), A is the position of code characters, in this manner it is possible to achieve 6 Group new data, they be the units in having intercepted since the 1st to the 10th num_chars value length data, For example, the data after password is split are 6, mean that and intercepted since the 7th, num_chars values are 20, mean that the position of interception Number is 20, and in a simple password 000000 and complicated password 658973, the meaning of the two represents that the former is from 6 sources respectively The 1st of data starts to intercept, and the latter's expression is from the 7th of 6 source datas, the 6th, the 9th, the 10th, the 8th, the 4th Position starts to intercept, unrelated with the complexity of password, as long as hardware is not supplied to others by Password Input personnel, and allows simultaneously Others sees that Password Input acts, and when only being cracked from the password of storage, the difficulty that cracks of the two is not different, During this step, there are 10 subdatas, that is, password combination number to increase 1,000,000 times for each source data.
Preferably, in the conversion of step S33 systems, if it is desirable, can be by any data conversion into another kind The data of system, during low binary data is converted into high binary data, since high binary data needs are more basic Element representation, basic element here is exactly similar 0 to the 9 of 10 systems this 10 numbers, can become fairly simple data Into complicated data, while data length is shortened, for example cardinar number digital data becomes number and the data of letter mixing, sometimes It waits, needs complex data becoming simple data or non-numeric data is converted into numerical data.
For example machine code is usually number and alphabetical blended data, and Chinese character is non-numeric data, in GB2312 standards In, the region-position code of Chinese character can be directly quoted, numerical data is converted thereof into or is understood as GB2312 normative texts The number (7445 include non-chinese symbol) of 7445 systems, Chinese document is encrypted or applied to digital certificate accordingly, will Chinese text is understood as 7445 systems, is converted into 10 systems, and data are surprisingly huge, by taking 5 digits as an example, be converted into 10 into System, digit is up to 20, and peak is 2.2873E+19, and reconvert is into 62 binary datas, that is, is converted into number and letter and mixes Data are closed, encryption is without using negative data, and therefore, carry is as 10 binary datas and the first power of system number, and two Power, cube etc. are incremented by successively, and when the digit of programming needs is not achieved in transformed data bits, a high position is supplied with 0 Number, such as transformed 10 binary data are 123, and the digit needed is 5, just adds 0 to supply 5 for 00123 in a high position, Most people contact English alphabet and number is relatively more, and example is 62 systems and the conversion of 10 systems, with 0 to 9 table of Arabic numerals Show that 0 to 9, alphabetical small letter a to z represent 10 to 35, alphabetical capitalization A to Z represents 36 to 61, there can also be other designated parties One's own department or unit code of case, number that aft section is told about or letter, transcoding algorithm is also in compliance with same rule, such as by 62 binary datas A6bJ9 is converted into 10 binary datas as 36*624+6*623+11*622+45*62+9=533423147, is 9 digits.
Preferably, the character transcoding in step S34 is realized using character transcoding algorithm, with a character or one group Character is exactly character transcoding by the method that transcoding algorithm obtains another character or one group of character, and either single character is still One group of character, transcoding are all transcodings one by one, and only the latter is to convert several characters simultaneously, and the transcoding meaning of single character is little , so being that character group carries out transcoding, character group transcoding needs transcoding algorithm instruction set and transcoding table to realize jointly.
Example is to design four kinds of numbers and the transcoding algorithm of letter, is named as ABCD algorithms, transcoding algorithm follows following rule Rule:
1:The result is that cannot be identical after the identical algorithm conversion of different source codes;
2:The transformation result of several algorithms of same source code mutually can not be identical;
3:The result of transcoding cannot be identical with source code;
4:Transcoding will set several transcoding algorithms, to strengthen the combinatorial complexity of password,
Example is converted with the basic condition of one's own department or unit of number and letter code, and one's own department or unit code of number 0 to 9 is respectively Number 0 to 9, one's own department or unit code of lowercase a to z is number 10 to 35 respectively;One's own department or unit code of capitalization A to Z is number respectively 36 to 61.
In ABCD algorithms, wherein the 1st algorithm, the 2nd algorithm, the 3rd algorithm are the mathematics fortune carried out based on the code of one's own department or unit It calculates, but the 4th algorithm is by manually adjusting, without what algorithm rule,
1st algorithm:The 2nd odd number behind one's own department or unit of number or letter yard plus one's own department or unit code is exactly turn of this number or letter Code algorithm, as a result >=62, just subtract 62, record the corresponding number of its one's own department or unit code or letter;
2nd algorithm:The 13rd odd number is exactly that this number or alphabetical B turn after number or alphabetical one's own department or unit code plus one's own department or unit code Code algorithm, as a result >=62, just subtract 62, record the corresponding number of its one's own department or unit code or letter;
3rd algorithm:One's own department or unit of number or letter code adds the transcoding algorithm that 30 be exactly the number or letter, as a result >=62, Just subtract 62, record the corresponding number of its one's own department or unit code or letter;
4th algorithm:4th algorithm part follow number or letter one's own department or unit code plus the one's own department or unit code after the 3rd even number be exactly The transcoding algorithm of the number or letter, as a result >=62, just subtract 62, the conflict of the data phase same sex, has done portion in order to prevent The corresponding number of its one's own department or unit code or letter are recorded in adjustment, from its design principle it is recognised that each before and after transcoding is digital All will not be identical with letter, this is a most basic designing points, and during calling, the 1st algorithm, the 2nd algorithm, the 3rd algorithm all may be used It directly to be called using tables of data, can also be converted using mathematical operation, still, the 4th algorithm, which have passed through, to be manually adjusted, and needs to make It is called with tables of data, other transcoding algorithms can also be designed, exemplary transcoding algorithm is utilized similar field and carries out algorithm ABCD sorts.
Transcoding algorithm instruction set:Each character to be transcoded needs to instruct transcoding direction that could obtain correctly as source code As a result, the data of instruction set and data to be transcoded there are correspondence, i.e. an instruction character corresponds to a word to be transcoded Symbol, by rule is instructed to be converted into another character, for example, instruction set data are BACC, data to be transcoded are 1234, are exactly 1,234 four data are performed into B algorithms, A algorithm, C algorithms, C algorithms respectively.
Preferably, it is to add the one kind that other character substitutes of the partial character in character character string to be substituted in step S36 Secret skill art, replacement can be single replacement or character string substitutes, and preferably designing scheme is that character string substitutes, and is substituted It is completed using character substitution tables, character substitution tables data are divided into record number and substitute character string, the character that record number occurs Exactly need the character substituted.
Such as there are 5, A, b, 6 in record number, all 5, A, b, 6 characters all extract in the data that will exactly substitute Coming, be grouped, the character digit needs after grouping are consistent with record number digit, when last organizes no corresponding digit, Can abandon substituting or specify increases digit, such as specified first character is added to and meets digit, searches in character substitution tables Corresponding record number is determined to substitute character string, since the several character original positions extracted are different, be needed Determine insertion position, more typical method is that the several characters that will be extracted are converted into 10 binary datas, utilizes remainder function It determines, for example, remainder adds 1 to be several, is just inserted into the original position of which character, the space of other characters is removed, obtained new Data, the record number design of character substitution tables is it is noted that record number needs to enumerate all combinations being likely to occur, otherwise It is likely to occur operation mistake, 3 when substituting, needs 27 groups, that is, 3 cube, 4 when substituting, record number just needs 256 groups, be 44 powers, if 5 be exactly 55 powers, up to 3125 groups, thus the number of characters substituted need it is suitable In, data table data is too huge and too small imappropriate, and alternate data should not be too long, is otherwise possible to by long number it is investigated that finding word Accord with substitution tables, 4 alternate data only needs 256 groups when substituting, during with English upper and lower case letter and digital representation, one and two It is sufficient that position, so short data substitute, and just have no idea reversely to find character substitution tables by searching for replacement character string, Do not allow the character for ciphering process occur or encryption data is not present, this is also for preventing by substituting string searching to word Substitution tables are accorded with, reason is very simple, if some character only occurs in some tables of data, quickly with regard to that can find, as long as Character existing for ciphering process or encryption data can serve as substituting character, even the former data character substituted can also go out It is existing, for example, replacing this four characters of 5, A, b, 6, then, appearance 5, A, b, 6 are still allowed in alternate data, due to the word of replacement Symbol digit differs, so the digit of final password is uncertain, replacement character may be used superposition encryption method and repeatedly encrypt, More parts of character substitution tables are designed, connecting data by multiple variables completes repeatedly encryption, such as variable data 2356,6987, 3075,9837,8863,5534, by the sum of 6 groups of data difference divided by character substitution tables, it is connected to corresponding tables of data successively It completes to substitute, that is, first passes through 2356 and be connected to corresponding tables of data completion replacement, and using the data after replacement as source number According to, it completes to substitute with the 2nd group of data connection to corresponding tables of data, and so on, character substitution tables have one with homogeneous data table Point difference, exactly different table record numbers can be different, and refer to that record number digit can also be different, for example, table 1 is 5, A, b, 6 are substituted, table 2 is to substitute c, and 8, H, k or table 1 are completed 3 characters and substituted, and what table 2 was completed is that 4 characters substitute, because It is the digit and character designed by retrieving record number for program, the character substituted and grouping digit is determined, in programming In, character transcoding, system conversion and interception character are preferred with obtaining the data of regular length, and after the completion of character substitutes, data Length is not known, this gives the authorized strength work of the character length contingency table of this step ciphering process of rearrangement character position to bring difficulty, Although the uncertain length value value of character length contingency table is more random, negative value can not occur, that is, other are determined The sum of length value cannot be more than the digit of data, be needed after other steps for this purpose, character substitutes this step, shortage of data Before preservation, otherwise design difficult.
Preferably, the missing algorithm in step S37, when introducing source data by link variable, link variable often has several groups, Link variable is divided into several groups, and the source data introduced accordingly also has several groups, and link variable group number is very little, and password easily cracks, such as It is complete that fruit link variable fails record, then, according to the codomain of the data, that is, the value that the data are likely to occur, add successively It is close, the value consistent with encrypted result can be also obtained, and the number that may be needed and how much related, missing values of the value lacked calculated When more, it may be necessary to calculation times it is more.
For example, the value range of missing one group of data ABCD, ABCD are all 0 to 9, then, from 0000 to 9999, always all Matching value can be found, if source data is 6639, then from 0000 operation to 6639, will be obtained as a result, in this process, 10000 operations are at most needed, and if for encrypted as a result, data record is not equally complete, but this infull data bit Put can be by obtaining, when encryption is compared successively during operation, and actually encrypted result is by these infull characters point Several sections are cut into, the result of operation needs and this several segment data is all coincide, if encrypted data bits is very long, then, Occur same password possibility it is also very little, since data record is not complete, from the password of record cracked almost without May, the missing values for lacking algorithm cannot be too complicated, otherwise slowly obtains less than as a result, the shortcomings that lacking algorithm is and asymmetric calculation Method is the same very time-consuming, it is not necessary that, it can not use.
Although it as described above, is illustrated according to the embodiment and attached drawing that embodiment is limited, to the art It can carry out various modifications and deform from above-mentioned record for technical staff with general knowledge.For example, according to explanation Technology illustrated in the mutually different sequence of method carry out and/or according to system, structure, device, circuit with explanation etc. The mutually different form of method illustrated by inscape is combined or combines or carried out according to other inscapes or equipollent It replaces or displacement also may achieve appropriate effect.For those of ordinary skill in the art to which the present invention belongs, it is not taking off Under the premise of from present inventive concept, several equivalent substitute or obvious modifications are made, and performance or use is identical, should be all considered as It belongs to the scope of protection of the present invention.

Claims (10)

1. a kind of data test and collection monitoring system, which is characterized in that the system has wireless sensor network node, prison Device and wireless data transfer module are controlled, wherein, the wireless data acquisition terminal of the wireless sensor network node and monitoring Device is included by wireless data transfer module wireless connection, the monitoring device in data monitoring and processing module and control The heart, the data monitoring and processing module and wireless data transfer module can build secured communication channel jointly, be bi-directionally connected nothing Line data collection station and control centre, control centre are handled and are controlled to the data into monitoring device.
2. monitoring system according to claim 1, which is characterized in that the monitoring device further includes:Client control mould Block, for monitoring wireless sensor network node;And display terminal, it is used to implement monitoring system and the human-computer interaction of administrator.
3. monitoring system according to claim 1, which is characterized in that the control centre is low-power scm, preferably Using MSP430F149 microcontrollers, other microcontrollers, such as ARM microcontrollers either AVR single chip can also be used certainly.
4. monitoring system according to claim 1, which is characterized in that the control centre is completed by secured communication channel To the safety verification of wireless data acquisition terminal, if acquisition terminal is dangerous, the acquisition terminal is prevented to enter monitoring device Data storage is carried out with exchanging, if acquisition terminal is safe, the wireless data acquisition terminal is allowed to carry out data storage and hand over It changes.
5. monitoring system according to claim 1, which is characterized in that the control centre can be to data all in system Storage and exchange process, are encrypted.
6. monitoring system according to claim 2, which is characterized in that the client control module, it can be by control centre Control instruction, wireless data acquisition terminal is sent to by the form of wireless transmission, to control wireless data acquisition terminal Data acquire.
7. monitoring system according to claim 1, which is characterized in that the wireless sensor network node includes multiple biographies Sensor node and wireless data acquisition terminal;Wherein, the wireless data acquisition terminal and prison of the wireless sensor network node Control device passes through wireless data transfer module wireless connection.
8. monitoring system according to claim 7, which is characterized in that the sensor node may include:Include air themperature Sensor, air humidity sensor, voltage sensor, current sensor, active sensor, one kind in idle sensor or two Kind and above combination.
9. a kind of smart power grid user end, which is characterized in that the smart power grid user end includes arbitrary in claim 1~8 Monitoring system in one.
10. a kind of intelligent grid, which is characterized in that the intelligent grid includes the monitoring in any one in claim 1~8 System.
CN201810006240.0A 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof Active CN108183553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810006240.0A CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510586655.6A CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system
CN201810006240.0A CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510586655.6A Division CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system

Publications (2)

Publication Number Publication Date
CN108183553A true CN108183553A (en) 2018-06-19
CN108183553B CN108183553B (en) 2021-04-06

Family

ID=55149966

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510586655.6A Expired - Fee Related CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system
CN201810006240.0A Active CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510586655.6A Expired - Fee Related CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system

Country Status (1)

Country Link
CN (2) CN105281432B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412901A (en) * 2018-12-07 2019-03-01 成都博宇利华科技有限公司 Acquisition data continuity detection method and detection system based on Time Domain Processing
CN110514927A (en) * 2019-08-16 2019-11-29 惠州Tcl移动通信有限公司 The unit exception detection method of mobile terminal, computer-readable medium
CN113051589A (en) * 2021-03-17 2021-06-29 重庆扬成大数据科技有限公司 Big data government affair analysis and processing safety application platform

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106094642A (en) * 2016-07-18 2016-11-09 合肥赑歌数据科技有限公司 A kind of monitoring system of big data platform
CN106205090A (en) * 2016-07-22 2016-12-07 汤亮 A kind of electric power network real-time monitoring system and control method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007068991A1 (en) * 2005-12-15 2007-06-21 Nokia Corporation Method, device, and system for network-based remote control over contactless secure storages
CN101467131A (en) * 2005-07-20 2009-06-24 美国唯美安视国际有限公司 Network user authentication system and method
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
CN102742250A (en) * 2012-03-13 2012-10-17 华为终端有限公司 Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103218876A (en) * 2013-04-11 2013-07-24 成都秦川科技发展有限公司 Information security management module of remote control intelligent electric energy meter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8121618B2 (en) * 2009-10-28 2012-02-21 Digimarc Corporation Intuitive computing methods and systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101467131A (en) * 2005-07-20 2009-06-24 美国唯美安视国际有限公司 Network user authentication system and method
WO2007068991A1 (en) * 2005-12-15 2007-06-21 Nokia Corporation Method, device, and system for network-based remote control over contactless secure storages
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
CN102742250A (en) * 2012-03-13 2012-10-17 华为终端有限公司 Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103218876A (en) * 2013-04-11 2013-07-24 成都秦川科技发展有限公司 Information security management module of remote control intelligent electric energy meter

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109412901A (en) * 2018-12-07 2019-03-01 成都博宇利华科技有限公司 Acquisition data continuity detection method and detection system based on Time Domain Processing
CN110514927A (en) * 2019-08-16 2019-11-29 惠州Tcl移动通信有限公司 The unit exception detection method of mobile terminal, computer-readable medium
CN113051589A (en) * 2021-03-17 2021-06-29 重庆扬成大数据科技有限公司 Big data government affair analysis and processing safety application platform

Also Published As

Publication number Publication date
CN108183553B (en) 2021-04-06
CN105281432B (en) 2018-01-16
CN105281432A (en) 2016-01-27

Similar Documents

Publication Publication Date Title
CN105305615B (en) A kind of monitoring method of wireless test and data transmission system
CN105072636B (en) A kind of wireless test and data transmission system
CN105281432B (en) A kind of supervising device of wireless test and data transmission system
CN106205090A (en) A kind of electric power network real-time monitoring system and control method thereof
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
CN103746962B (en) GOOSE electric real-time message encryption and decryption method
CN104580246B (en) Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment
CN109525391A (en) A kind of method that server is synchronous with lockset information security
CN115277040B (en) Medical health data storage and sharing method and system based on blockchain technology
CN106992850B (en) A kind of secret key verification method of blue-tooth intelligence lock controller
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN104717644B (en) A kind of two layers of sensor network range query method that can verify that secret protection
CN105915347A (en) Control method for power electric wireless transmission device
CN115225339B (en) Safe access and data transmission method and system for sensing terminal of power transmission Internet of things
CN105430017B (en) Data safety communication means
CN110691358B (en) Access control system based on attribute cryptosystem in wireless sensor network
CN104639328B (en) A kind of GOOSE message authentication method and system
Jiao et al. A blockchain-based trusted upload scheme for the internet of things nodes
CN117135626B (en) Safe Internet of things control system based on high-speed encryption technology
CN102045870A (en) Business processing device and method based on wireless machine-to-machine protocol (WMMP)
CN104639330B (en) A kind of GOOSE message completeness certification method
CN111740965B (en) Internet of things equipment authentication method based on physical unclonable equation
CN105959258A (en) Wireless transmitting device of power grid
CN112311553A (en) Equipment authentication method based on challenge response
CN110430207B (en) Multi-point remote cross-network interaction collaborative authentication method for smart power grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210317

Address after: 25 Guangming Road, Yinchuan (National) economic and Technological Development Zone, Yinchuan City, Ningxia Hui Autonomous Region

Applicant after: NINGXIA LONGJI NINGGUANG INSTRUMENT Co.,Ltd.

Address before: 518000 duty-free business building 6, Fuhua Road, Futian District, Shenzhen, Guangdong 1403

Applicant before: Liu Chao

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant