CN108540332A - A kind of intelligent encryption dog - Google Patents
A kind of intelligent encryption dog Download PDFInfo
- Publication number
- CN108540332A CN108540332A CN201810482567.5A CN201810482567A CN108540332A CN 108540332 A CN108540332 A CN 108540332A CN 201810482567 A CN201810482567 A CN 201810482567A CN 108540332 A CN108540332 A CN 108540332A
- Authority
- CN
- China
- Prior art keywords
- equipment
- data
- terminal
- backstage
- softdog
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention discloses a kind of intelligent encryption dog, a kind of intelligent encryption dog, including equipment, softdog, terminal and backstage.The 2 D code information for terminal recognition is additionally provided in equipment, softdog is used to carry out communication with the controller of equipment to connect, and backstage receives the information of softdog, and feeds back fault solution or change equipment and use mandate.User in terminal by the Quick Response Code in scanning device, submit to the backstage and send out authorized application, change the authorization of equipment after confirmation by data of the acquisition for encryption;When device fails, the device fault information got is passed back to backstage by terminal, and returns to solution.In traditional industry Equipment Foundations, remote authorization, intelligent diagnostics are carried out using network, mechanics of communication, solve the problems, such as exist in terms of mandate, O&M, communication with digitization program, more application scenarios are provided to industrial equipment, collect the data to equipment optimization, customer service experience is promoted simultaneously, meets more application scenarios.
Description
Technical field
The present invention relates to technical field of data security, industrial Internet of Things field, specifically more particularly to a kind of intelligent encryption
Dog.
Background technology
With communication, the development of network technology, industrial equipment of new generation is authorizing protection, application model, technological service etc.
All various aspects suffer from the demand of change, adaptation, and industrial equipment is all by basic machine, sensing element, controller on the market
Main electric component (controller contains various PLC), control system composition;The failure that basic machine occurs passes through sensing element, shape
Control system is finally fed back at electrical signal, data is generated, forms specific alarm signal, equipment operation is solved for judging
The various problems occurred in the process;Traditional industry equipment lacks effective, succinct method in terms of system authorization, novel maintenance,
Lack the means that remote diagnosis is carried out with communication, network technology.
Existing industrial equipment:By control system warning message, by interactive modes such as scene, voice, videos by equipment
Manufacturing firm, specified maintenance personnel solve, and it is all that there are maintenance costs is high, information description is asymmetric, communication efficiency is low etc.
More problems.
Therefore, it is urgent to provide a kind of intelligent encryption dogs, so as to solve the deficiencies in the prior art.
Invention content
To achieve the above object, the present invention provides a kind of intelligent encryption dog, solves encountering for industrial equipment scene networking
Challenge provides a kind of simply and easily mode, carries out data acquisition, fault diagnosis, while improving tradition using internet
Encryption authorization mode.
The technical solution adopted by the present invention is as follows:A kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, institute
Softdog is stated for being connect with the equipment, and data communication is carried out with the controller of the equipment;It is also set up in the equipment
There is the 2 D code information for the terminal recognition;
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
The terminal submits to the backstage by the Quick Response Code in scanning device, data of the acquisition for encryption
And authorized application is sent out, change the authorization of equipment after confirmation;When the device fails, the terminal handle is got
Device fault information pass back to the backstage, and return to solution.
Further, the softdog further includes microcontroller chip, encryption module and communication interface;The encryption module is used
It is encrypted during the control chip carries out data transmission with the equipment, the backstage;The communication interface is used for
The transmission of data.
Further, the microcontroller chip further includes communications protocol, data management module and data transmission module.
The microcontroller chip is managed data by the data management module, and by the data transmission and
The communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
Further, the microcontroller chip is based on embedded system development.
Further, the backstage further includes the background program, Data Management Unit, Quick Response Code generation unit of front-end A PP
And data transfer unit;
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
Further, the Data Management Unit includes user management, monitoring of equipment data.
Further, the terminal 2 D code information in the equipment, and the relevant mandate of receiving device for identification
Application, fault solution are shared with fault message.
Beneficial effects of the present invention are:It reduces industrial equipment and interconnects cost, simplify terminal user and use, equipment, which uses, to be authorized
It is more flexible, promote after-sale service efficiency, the intelligence of Fault Diagnosis of Hoist Equipment.Industrial equipment is drawn due to machinery, electric appliance etc.
The fault comprehensive factor risen is more, is aided with network communication means, provides more accurately data, is aided with model of mind, improves user's body
It tests, promotes efficiency of service.The intelligent encryption dog of the remote authorization and intelligent trouble diagnosis realized by Quick Response Code, can allow user
Know the real-time status failure problems of equipment;It can also be achieved remote authorization in leased equipment, it is more intelligent more convenient.
Description of the drawings
Fig. 1 is the schematic diagram of intelligent encryption dog system;
Fig. 2 is remote authorization flow diagram;
Fig. 3 is the schematic diagram of remote fault diagnosis;
Fig. 4 is user's process for using figure.
Specific implementation mode
In order to make the goal of the invention of the present invention, technical solution and technique effect are more clearly understood, with reference to specific reality
Applying mode, the present invention is described further.It should be understood that specific embodiment described herein, be only used for explaining the present invention,
It is not intended to limit the present invention.
A kind of intelligent encryption dog, applies on common equipment, such as in leasing market using upper.This intelligent encryption dog sets
It counts from " softdog " product prototype evolution ripe in the market, on the basic function that former softdog provides, utilizes intelligence
Terminal, cloud backstage etc. Internet technologies, extension extend softdog so that it can remote authorization, data acquisition, cooperation terminal, after
Platform etc. can carry out Function Extension, to a novel intelligent hardware product generated.
A kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, the softdog are used to connect with the equipment
It connects, and data communication is carried out with the controller of the equipment;The Quick Response Code for the terminal recognition is additionally provided in the equipment
Information.
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
As shown in Figure 1, the terminal, by the Quick Response Code in scanning device, data of the acquisition for encryption are submitted
To the backstage and authorized application is sent out, changes the authorization of equipment after confirmation, realizes remote authorization function;When the equipment
When breaking down, the device fault information got is passed back to the backstage by the terminal, and returns to solution, realizes event
Hinder diagnostic function.
Further, the softdog further includes microcontroller chip, encryption module and communication interface;The encryption module is used
It is encrypted during the control chip carries out data transmission with the equipment, the backstage;The communication interface is used for
The transmission of data.
Further, the microcontroller chip further includes communications protocol, data management module and data transmission module.
The microcontroller chip is managed data by the data management module, and by the data transmission and
The communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
Using the microprocessor unit for having computing capability in product design, it is necessary to integrate encryption chip, communication interface etc.
Hardware, exploitation control system realization authorizes a change the functions such as application, data acquisition, data transmission and processing and logical process, opens
Hair APP application programs are supplied to end user to realize function interaction, with the fault data of background acquisition, establish fault diagnosis mould
Type carries out the applications such as equipment fault early-warning, solution push, while being also used as device fabrication producer discovering device problem, changing
The data foundation of good equipment.
Further, the microcontroller chip is based on embedded system development.
Further, the backstage further includes the background program, Data Management Unit, Quick Response Code generation unit of front-end A PP
And data transfer unit;Formed diagnostic knowledge base simultaneously data storage in store, also realize empowerment management, diagnostic knowledge base and
The function of system administration.
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
Further, the Data Management Unit includes user management, monitoring of equipment data.
Further, the terminal 2 D code information in the equipment, and the relevant mandate of receiving device for identification
Application, fault solution are shared with fault message.
System encryption authorizes online modification application principle:
Control System Software as shown in Figure 2 is interacted by " communications protocol " and intelligent encryption dog, calls " intelligent encryption
Unique ID built in dog " carries out soft ware authorization protection;
Built-in unique ID generates corresponding soft ware authorization pattern by background process, can by the term of validity, access times,
Number of machines etc. is installed to generate different authorization codes or change the corresponding software module functions of ID;
Terminal client is scanned the two-dimensional code by mobile phone A pp, obtains hardware ID, submits the corresponding information of existing mandate and needs
The content of change carries out mandate update after receiving request from the background;Modification softdog is awarded after backstage receives and veritified authorization message
Power logic sends in equipment and authorizes a change again.
Fault diagnosis, early warning, solution push principle:
As shown in figure 3, terminal client scans the two-dimensional code, Equipment Foundations information, fault message are obtained, submits to backstage, after
Platform is by " fault knowledge library " Analysis of Policy Making and returns to solution, or the data by being collected into judge orientation problem, provide
Further solution, and complete to diagnose;And the case where sending in terminal, allowing related personnel that can know equipment at any time.
As shown in figure 4, when authorizing a change with equipment fault, user's mobile terminal APP two-dimensional code scannings submit change letter
Breath and fault message are transferred to backstage and are handled, returned result in the terminal of user.
For example, equipment leasing market is the industry rapidly developed in recent years, there is statistical data to show, Present Global work
Journey mechanical equipment market lease combined turnover is up to 40,000,000,000 dollars, occupies a quarter of engineering machinery total business share.Especially
In developed country, engineering mechanical device lease is even more to have become mainstream, and the 65% of the total share in occuping market.
It in equipment leasing market is applied, using intelligent encryption dog scheme, is implanted in equipment as equipment part, by rent
Contract of renting carries out authorized appropriation, and the remote visiting system when mandate termination, renewed treaty is carried out by contract execution situation, is authorized;When
Equipment when something goes wrong, can carry out two-dimensional code scanning and carry out failure to report and intelligent diagnostics, be greatly improved efficiency of service and
User experience.
On the basis of traditional industry functions of the equipments, remote authorization, intelligent diagnostics are carried out using network, mechanics of communication, are used
Digitization program solves the problems, such as exist in terms of mandate, O&M, communication, and more application scenarios, receipts are provided to industrial equipment
The relevant data of set pair equipment optimization, while customer service experience is promoted, meet more application scenarios.
Present invention aim to address the challenges of industrial equipment scene networking encountered, and provide one kind simply, conveniently
Mode, carry out data acquisition, fault diagnosis, at the same using internet improve conventional cryptography authorization.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that
The specific implementation of the present invention is confined to these explanations.For those of ordinary skill in the art to which the present invention belongs, exist
Under the premise of not departing from present inventive concept, architectural form cans be flexible and changeable, can be with derivative series product.It only makes several
Simple deduction or replace all shall be regarded as belonging to present invention scope of patent protection determined by the appended claims.
Claims (7)
1. a kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, which is characterized in that
The 2 D code information for the terminal recognition is additionally provided in the equipment;
The softdog carries out data communication for being connect with the equipment, and with the controller of the equipment;
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
It is concurrent to submit to the backstage by the Quick Response Code in scanning device, data of the acquisition for encryption for the terminal
Go out the application that authorizes a change, changes the authorization of equipment after confirmation;
The terminal is by the Quick Response Code in scanning device, and when the device fails, the terminal is set what is got
Standby fault message passes back to the backstage, and returns to solution.
2. intelligent encryption dog according to claim 1, which is characterized in that the softdog further includes microcontroller chip, adds
Close module and communication interface;The encryption module carries out data transmission for the control chip with the equipment, the backstage
It is encrypted in the process;The communication interface is used for the transmission of device data.
3. intelligent encryption dog according to claim 2, which is characterized in that the microcontroller chip further include communications protocol,
Data management module and data transmission module;
The microcontroller chip is managed data by the data management module, and passes through the data transmission and described
Communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
4. intelligent encryption dog according to claim 3, which is characterized in that the microcontroller chip is opened based on embedded system
Hair.
5. intelligent encryption dog according to claim 1, which is characterized in that the backstage further includes the backstage journey of front-end A PP
Sequence, Data Management Unit, Quick Response Code generation unit and data transfer unit;
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
6. intelligent encryption dog according to claim 5, which is characterized in that the Data Management Unit include user management,
Monitoring of equipment data.
7. intelligent encryption dog according to claim 1, which is characterized in that the terminal for identification in the equipment two
Code information is tieed up, and the relevant authorized application of receiving device, fault solution are shared with fault message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810482567.5A CN108540332A (en) | 2018-05-18 | 2018-05-18 | A kind of intelligent encryption dog |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810482567.5A CN108540332A (en) | 2018-05-18 | 2018-05-18 | A kind of intelligent encryption dog |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108540332A true CN108540332A (en) | 2018-09-14 |
Family
ID=63472167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810482567.5A Pending CN108540332A (en) | 2018-05-18 | 2018-05-18 | A kind of intelligent encryption dog |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108540332A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111506890A (en) * | 2020-04-30 | 2020-08-07 | 中铁工程装备集团有限公司 | Shield machine locking method based on USB flash disk dongle |
CN112580082A (en) * | 2020-12-29 | 2021-03-30 | 北京深思数盾科技股份有限公司 | Data processing method and encryption lock equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170078879A1 (en) * | 2012-09-28 | 2017-03-16 | Intel Corporation | Device, method, and system for augmented reality security |
CN106530057A (en) * | 2016-11-24 | 2017-03-22 | 吴凡 | Public apparatus management method and system based on mobile phone client |
-
2018
- 2018-05-18 CN CN201810482567.5A patent/CN108540332A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170078879A1 (en) * | 2012-09-28 | 2017-03-16 | Intel Corporation | Device, method, and system for augmented reality security |
CN106530057A (en) * | 2016-11-24 | 2017-03-22 | 吴凡 | Public apparatus management method and system based on mobile phone client |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111506890A (en) * | 2020-04-30 | 2020-08-07 | 中铁工程装备集团有限公司 | Shield machine locking method based on USB flash disk dongle |
CN111506890B (en) * | 2020-04-30 | 2022-09-23 | 中铁工程装备集团有限公司 | Shield machine locking method based on USB flash disk dongle |
CN112580082A (en) * | 2020-12-29 | 2021-03-30 | 北京深思数盾科技股份有限公司 | Data processing method and encryption lock equipment |
CN112580082B (en) * | 2020-12-29 | 2022-04-05 | 北京深思数盾科技股份有限公司 | Data processing method and encryption lock equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103891395A (en) | Multi-device monitoring and control | |
CN104618228B (en) | A kind of intelligent home gateway and the system and its application process that cloud service is automatically accessed by strategy realized based on intelligent home gateway | |
CN111105528B (en) | Intelligent door lock system based on Bluetooth broadcast | |
CN104243595B (en) | A kind of power information acquisition system and its method based on IPv6 | |
CN106744111A (en) | Elevator repair and maintenance management system and method based on bluetooth and Mobile Data Communication Technology | |
CN204719434U (en) | The intelligent domestic system of many-many communication mode can be realized | |
CN105356604B (en) | user side demand response method | |
CN106878933A (en) | A kind of bluetooth equipment network-building method and system | |
CN110381069A (en) | A kind of approaches to IM and system based on block chain technology | |
CN204719435U (en) | Adopt the intelligent domestic system of many-many communication mode | |
CN104331669A (en) | Application of wisdom medical sensitive data encryption technique | |
CN108540332A (en) | A kind of intelligent encryption dog | |
CN106971438A (en) | Lock body control method, device, server and selling cabinet | |
CN108734884A (en) | Barcode scanning door opening method, barcode scanning open-door system, intelligent cabinet and terminal | |
CN109426867A (en) | Device maintenance method based on two dimensional code and database | |
CN107018203A (en) | A kind of frequency converter remote monitoring control method | |
CN102143458A (en) | Multi-protocol converter based on GSM (Global System for Mobile Communications) short message transmission in wireless communication network | |
CN104506502B (en) | A kind of method that converged communication network is docked with main website | |
CN206298231U (en) | Elevator repair and maintenance managing device based on bluetooth and Mobile Data Communication Technology | |
CN109934123A (en) | Fault code identifying system and method based on OCR technique, internet and AR technology | |
CN104092753B (en) | Internet of Things information processing and fusion method and its system based on wireless relay system | |
CN114202187A (en) | Power equipment intelligent identification analysis coding method based on power industry | |
CN107730662A (en) | Gate inhibition's data processing method and device | |
CN110300149A (en) | A kind of middleware, a kind of long-distance management system and a kind of method for remote management | |
CN107222519A (en) | A kind of method that remote access to intranet equipment is realized based on outer net |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |
|
RJ01 | Rejection of invention patent application after publication |