CN108471444A - A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi - Google Patents
A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi Download PDFInfo
- Publication number
- CN108471444A CN108471444A CN201810238923.9A CN201810238923A CN108471444A CN 108471444 A CN108471444 A CN 108471444A CN 201810238923 A CN201810238923 A CN 201810238923A CN 108471444 A CN108471444 A CN 108471444A
- Authority
- CN
- China
- Prior art keywords
- raspberry
- data
- encryption
- highly effective
- industrial internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of industrial Internet of Things data exchange methods of highly effective and safe based on Raspberry Pi, belong to information technology field, the main connection for including PLC and Raspberry Pi, the connection of sensor and Raspberry Pi, the connection of camera and Raspberry Pi, the data of acquisition are collected, the collected data of encrypted transmission receive data and data deciphering.The present invention is that the connection of PLC and Raspberry Pi turn the connection of TTL chips by RS485, and the connection of camera and sensor helps stick line using common, encryption and decryption is carried out using DES algorithms in encryption process.The present invention uses equipment of the Raspberry Pi as information transfer, can store the data of large capacity;It can receive the data of PLC, sensor, video simultaneously, it is powerful;Stablized by network cable transmission, transmission between host computer and Raspberry Pi, transmission cost is low, and can work in the presence of a harsh environment;The data received are write as the form of dynamic link library, are convenient for the writing of host computer, upper computer software is made to have better flexibility.
Description
Technical field
The invention belongs to information technology field, more particularly to the industrial Internet of Things netting index of a kind of highly effective and safe based on Raspberry Pi
According to exchange method.
Background technology
The data acquisition of SIEMENS PLC is mainly by the special line program of Siemens Company or on PLC at present
Additional communication module, then host computer realized using the specific software of Siemens Company.Whole process can not be suitable for length
Apart from operation.And some special situations, such as environment in the industry, can be usually encountered, many uncertain factors such as weather,
This often causes prodigious overhead, and in addition software can only use the specific software of Siemens, be unfavorable for later stage function mould
The addition of block.
The product BC-Net of Wuxi North Star company is the communication module of an ethernet data communication, and the data of PLC are passed through
After this module, specific conversion is carried out by the chip in protocol module and becomes TCP/IP data, and this data is passed
Give host computer.Host computer can be by programming the acquisition realized to plc data, and modification.But this method be primarily present with
Lower problem:
(1)Data in transmission process not into cross encryption, data be confidential data, if attacker intercepts and captures these
Data can cause prodigious harm;
(2)Product function is single, is used only to for specific one hardware, such as the only corresponding SIEMENS PLC of PPI
S-200 types;
(3)Some modules are not reserved, the extension of product is unfavorable for.
Invention content
Goal of the invention:In order to overcome the above deficiency, the object of the present invention is to provide a kind of industrial datas based on Raspberry Pi
Exchange method, solving data may be trapped in transmission process, the problems such as product function is single.
Technical solution:A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi, including PLC, tree
Certain kind of berries group, camera, sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Including following
Step:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200
It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again
Analysis, finally shows.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the PLC and
The company of the connection of the connection of the connection of Raspberry Pi, camera and Raspberry Pi, sensor and Raspberry Pi and host computer and Raspberry Pi
It connects and includes the following steps:
(1)The RS485 heads that RS485 is turned to TTL chips are connected on PLC, the ends TTL respectively with the power end of Raspberry Pi serial ports and
The ends GND connect, and receive data terminal and are connected with transmission data end;
(2)One pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to the electricity of Raspberry Pi
On source;
(3)The pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first meets MCP3008
Chip connects SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi;
(4)The network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step
(3)Include the following steps:
(1)Configure Raspberry Pi:
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO
Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step
(6)Include the following steps:
(1)Write upper computer software:
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)It writes code to show data, host computer sends order and obtains corresponding data.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step
(5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database
Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close
Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data
It encrypts further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method
Spoon.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data
It encrypts further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having
In the effect phase, and then judge whether the cryptographic keys use.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step
(6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data
It decrypts further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the secret key
Generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted
Password obtains key.
Above-mentioned technical proposal can be seen that the present invention and have the advantages that:It is of the present invention based on Raspberry Pi
The industrial Internet of Things data exchange method of highly effective and safe, ensures the real-time transmission of information in the whole process, safe transmission, and existing
Have technology compared to the advantages of be:
(1)Equipment using oneself Raspberry Pi as information transfer, it is quality-high and inexpensive, and store the data of large capacity;
(2)Information is encrypted in transmission process using Encryption Algorithm, ensure that the safety of information transmission;
(3)The information of Raspberry Pi can be received simultaneously, the information of sensor, the information of video is powerful;
(4)By TCP transmission between host computer and Raspberry Pi, transmission is stablized, and can be worked in the presence of a harsh environment, and cable at
This is cheap, can be cost-effective;
(5)The data received write out library, are convenient for the writing of host computer.
Description of the drawings
Fig. 1 is the flow of the industrial Internet of Things data exchange method of the highly effective and safe of the present invention based on Raspberry Pi
Figure.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term "center", " longitudinal direction ", " transverse direction ", " length ", " width ",
" thickness ", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom" "inner", " clockwise ", " inverse
The orientation or positional relationship of the instructions such as hour hands " is to be based on the orientation or positional relationship shown in the drawings, and is merely for convenience of description originally
Invention and simplified description, do not indicate or imply the indicated device or element must have a particular orientation, with specific side
Position construction and operation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include one or more this feature.In the description of the present invention, unless otherwise indicated, the meaning of " plurality " is two
It is a or more than two, unless otherwise restricted clearly.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can be machine
Tool connects, and can also be electrical connection;It can be directly connected, can also can be indirectly connected through an intermediary two members
Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be
Concrete meaning in bright.
In the present invention unless specifically defined or limited otherwise, fisrt feature the "upper" of second feature or "lower"
It may include that the first and second features are in direct contact, can also not be to be in direct contact but pass through it including the first and second features
Between other characterisation contact.Moreover, fisrt feature second feature " on ", " top " and " above " include first special
Sign is right over second feature and oblique upper, or is merely representative of fisrt feature level height and is higher than second feature.Fisrt feature exists
Second feature " under ", " lower section " and " following " include fisrt feature immediately below second feature and obliquely downward, or be merely representative of
Fisrt feature level height is less than second feature.
Embodiment
The industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi as shown in Figure 1, including PLC, raspberry
Group, camera, sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Including following step
Suddenly:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200
It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again
Analysis, finally shows.
Technical solution of the invention is:The method that industrial data based on Raspberry Pi exchanges includes mainly PLC and tree
The connection of certain kind of berries group, the connection of camera and Raspberry Pi, the connection of sensor and Raspberry Pi, the Data Encryption Transmission in Raspberry Pi are given
Host computer, host computer receive data in real time by Ethernet.
The method of the present invention, the main connection for including PLC and Raspberry Pi, the connection of sensor and Raspberry Pi, camera and tree
The connection of certain kind of berries group, collects the data of acquisition, and the collected data of encrypted transmission receive data and data deciphering.PLC in the present invention
Connection with Raspberry Pi fills the connection of TTL chips by RS485, and the connection of camera and sensor helps stick line to connect using common
, encryption and decryption is carried out using DES algorithms in communication process, is connected by cable between Raspberry Pi and common host computer,
Data by Transmission Control Protocol be transmitted the present invention realization steps are as follows:
1, RS485 heads that RS485 is turned to TTL chips are connected on PLC, that end TTL power end with Raspberry Pi serial ports respectively,
The ends GND receive data terminal and are connected with transmission data end.
2, the pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first connects
MCP3008 chips connect SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi.Notice that power supply has 3v and 5v,
Different sensors is different.
3, a pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to Raspberry Pi
On power supply.
4, the step of data acquire is as follows;
(1)Configure Raspberry Pi;
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO
Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond;
5, the network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
6, it is as follows to receive the step of data for host computer:
(1)Write upper computer software;
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)Code is write to show data.
7, host computer sends order and obtains corresponding data.
Wherein, step(5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database
Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close
Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
The data encryption is further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method
Spoon.
The data encryption is further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having
In the effect phase, and then judge whether the cryptographic keys use.
In addition, step(6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
Again, data deciphering is further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
In addition, secret key generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted
Password obtains key.
A kind of industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi of the present invention includes mainly PLC
With the connection of Raspberry Pi, the data of acquisition are collected in the connection of sensor and Raspberry Pi, the connection of camera and Raspberry Pi, encryption
Collected data are transmitted, data and data deciphering are received.The present invention is that the connection of PLC and Raspberry Pi turn TTL cores by RS485
Piece connects, and the connection of camera and sensor helps stick line using common, in encryption process using DES algorithms come into
Row encryption and decryption is connected between Raspberry Pi and common host computer by cable, and common Transmission Control Protocol is used.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, several improvement can also be made, these improvement also should be regarded as the present invention's
Protection domain.
Claims (10)
1. a kind of industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi, including PLC, Raspberry Pi, camera,
Sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Include the following steps:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200
It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again
Analysis, finally shows.
2. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature
It is:The connection of the connection of the connection of the PLC and Raspberry Pi, camera and Raspberry Pi, sensor and Raspberry Pi and upper
The connection of machine and Raspberry Pi includes the following steps:
(1)The RS485 heads that RS485 is turned to TTL chips are connected on PLC, the ends TTL respectively with the power end of Raspberry Pi serial ports and
The ends GND connect, and receive data terminal and are connected with transmission data end;
(2)One pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to the electricity of Raspberry Pi
On source;
(3)The pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first meets MCP3008
Chip connects SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi;
(4)The network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
3. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature
It is:The step(3)Include the following steps:
(1)Configure Raspberry Pi:
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO
Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond.
4. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature
It is:The step(6)Include the following steps:
(1)Write upper computer software:
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)It writes code to show data, host computer sends order and obtains corresponding data.
5. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi
Method, it is characterised in that:The step(5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database
Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close
Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
6. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 5 based on Raspberry Pi
Method, it is characterised in that:The data encryption is further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method
Spoon.
7. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 6 based on Raspberry Pi
Method, it is characterised in that:The data encryption is further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having
In the effect phase, and then judge whether the cryptographic keys use.
8. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature
It is:The step(6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
9. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 8 based on Raspberry Pi
Method, it is characterised in that:The data deciphering is further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
10. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 8 based on Raspberry Pi, feature
It is:The secret key generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted
Password obtains key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810238923.9A CN108471444A (en) | 2018-03-22 | 2018-03-22 | A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810238923.9A CN108471444A (en) | 2018-03-22 | 2018-03-22 | A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108471444A true CN108471444A (en) | 2018-08-31 |
Family
ID=63264620
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810238923.9A Pending CN108471444A (en) | 2018-03-22 | 2018-03-22 | A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108471444A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600420A (en) * | 2018-11-12 | 2019-04-09 | 吴基玄 | It is a kind of to realize the method and system remotely controlled online based on raspberry pie technology |
CN109698866A (en) * | 2019-01-11 | 2019-04-30 | 科世达(上海)管理有限公司 | A kind of Intelligent control display systems based on raspberry pie |
CN111506030A (en) * | 2020-04-16 | 2020-08-07 | 福州泰全工业有限公司 | Quality management system and method for automobile production line |
CN112600746A (en) * | 2020-12-10 | 2021-04-02 | 杭州电子科技大学 | Raspberry pie CAN data collection and analysis system |
CN112629259A (en) * | 2020-12-23 | 2021-04-09 | 山东建筑大学 | Kiln car identification method and system based on wall material production line |
CN116743504A (en) * | 2023-08-14 | 2023-09-12 | 佳瑛科技有限公司 | Safe transmission method and system for digital data in network cable |
CN113885446B (en) * | 2020-04-16 | 2024-06-07 | 福州泰全工业有限公司 | Automobile production line quality management method for realizing quality trend prediction |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
CN104753942A (en) * | 2015-03-30 | 2015-07-01 | 无锡市崇安区科技创业服务中心 | Secret key generating and decrypting method used for communication network |
CN105763525A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Identification code generation method, device, identification code decryption method and device |
CN106789459A (en) * | 2016-12-07 | 2017-05-31 | 中国人民解放军理工大学 | A kind of smart machine control device and control method based on raspberry group |
CN206258717U (en) * | 2016-11-11 | 2017-06-16 | 华中农业大学 | Green grass long distance control system based on raspberry group |
US20180035479A1 (en) * | 2016-07-27 | 2018-02-01 | Hon Hai Precision Industry Co., Ltd. | Interconnecting device and iot system using the same |
-
2018
- 2018-03-22 CN CN201810238923.9A patent/CN108471444A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104378198A (en) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | Voice encryption method based on block cipher system |
CN105763525A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Identification code generation method, device, identification code decryption method and device |
CN104753942A (en) * | 2015-03-30 | 2015-07-01 | 无锡市崇安区科技创业服务中心 | Secret key generating and decrypting method used for communication network |
US20180035479A1 (en) * | 2016-07-27 | 2018-02-01 | Hon Hai Precision Industry Co., Ltd. | Interconnecting device and iot system using the same |
CN206258717U (en) * | 2016-11-11 | 2017-06-16 | 华中农业大学 | Green grass long distance control system based on raspberry group |
CN106789459A (en) * | 2016-12-07 | 2017-05-31 | 中国人民解放军理工大学 | A kind of smart machine control device and control method based on raspberry group |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600420A (en) * | 2018-11-12 | 2019-04-09 | 吴基玄 | It is a kind of to realize the method and system remotely controlled online based on raspberry pie technology |
CN109698866A (en) * | 2019-01-11 | 2019-04-30 | 科世达(上海)管理有限公司 | A kind of Intelligent control display systems based on raspberry pie |
CN111506030A (en) * | 2020-04-16 | 2020-08-07 | 福州泰全工业有限公司 | Quality management system and method for automobile production line |
CN111506030B (en) * | 2020-04-16 | 2021-06-25 | 福州泰全工业有限公司 | Quality management system and method for automobile production line |
CN113885446A (en) * | 2020-04-16 | 2022-01-04 | 福州泰全工业有限公司 | Automobile production line quality control method for realizing quality trend prediction |
CN113885446B (en) * | 2020-04-16 | 2024-06-07 | 福州泰全工业有限公司 | Automobile production line quality management method for realizing quality trend prediction |
CN112600746A (en) * | 2020-12-10 | 2021-04-02 | 杭州电子科技大学 | Raspberry pie CAN data collection and analysis system |
CN112629259A (en) * | 2020-12-23 | 2021-04-09 | 山东建筑大学 | Kiln car identification method and system based on wall material production line |
CN116743504A (en) * | 2023-08-14 | 2023-09-12 | 佳瑛科技有限公司 | Safe transmission method and system for digital data in network cable |
CN116743504B (en) * | 2023-08-14 | 2023-10-17 | 佳瑛科技有限公司 | Safe transmission method and system for digital data in network cable |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108471444A (en) | A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi | |
CN205490665U (en) | Thing networking systems's communication device | |
CN105162772B (en) | A kind of internet of things equipment certifiede-mail protocol method and apparatus | |
CN102932349B (en) | Data transmission method, device and system | |
CN109218825B (en) | Video encryption system | |
CN105871873A (en) | Security encryption authentication module for power distribution terminal communication and method thereof | |
CN105790927B (en) | A kind of bus graded encryption system | |
JPS63205687A (en) | Method and apparatus for protecting secret element in network of cryptograph by handing open key | |
CN107769912A (en) | A kind of quantum key chip and the encipher-decipher method based on quantum key chip | |
CN103281299B (en) | A kind of ciphering and deciphering device and information processing method and system | |
CN105072025B (en) | For the security protection gateway and system of modern industrial control system network service | |
CN103888444A (en) | Distribution safety authentication device and method | |
JPH0934356A (en) | High-bandwidth cryptographic system with low-bandwidth cryptographic module | |
CN109831311A (en) | A kind of server validation method, system, user terminal and readable storage medium storing program for executing | |
AU2017100662A4 (en) | A secure communication method of integrated distributed electric vehicle controller | |
CN105610837A (en) | Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system | |
CN106209916A (en) | Industrial automation produces business data transmission encryption and decryption method and system | |
CN110336788A (en) | A kind of data safety exchange method of internet of things equipment and mobile terminal | |
CN109543423A (en) | Control panel encryption and manner of decryption, terminal device and computer readable storage medium | |
CN108848107A (en) | A kind of method of secure transmission web information | |
CN113704780A (en) | Model-driven-based power distribution network user side information adaptive encryption method | |
CN103746815A (en) | Secure communication method and device | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
US20070076882A1 (en) | Network component for a communication network, communication network, and method of providing a data connection | |
CN107155184B (en) | WIFI module with secure encryption chip and communication method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180831 |
|
RJ01 | Rejection of invention patent application after publication |