CN108540332A - A kind of intelligent encryption dog - Google Patents

A kind of intelligent encryption dog Download PDF

Info

Publication number
CN108540332A
CN108540332A CN201810482567.5A CN201810482567A CN108540332A CN 108540332 A CN108540332 A CN 108540332A CN 201810482567 A CN201810482567 A CN 201810482567A CN 108540332 A CN108540332 A CN 108540332A
Authority
CN
China
Prior art keywords
equipment
data
terminal
backstage
softdog
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810482567.5A
Other languages
Chinese (zh)
Inventor
崔鹏
梁进贤
尹昌文
钟浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Sino Vatican Information Technology Co Ltd
Original Assignee
Guangdong Sino Vatican Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Sino Vatican Information Technology Co Ltd filed Critical Guangdong Sino Vatican Information Technology Co Ltd
Priority to CN201810482567.5A priority Critical patent/CN108540332A/en
Publication of CN108540332A publication Critical patent/CN108540332A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a kind of intelligent encryption dog, a kind of intelligent encryption dog, including equipment, softdog, terminal and backstage.The 2 D code information for terminal recognition is additionally provided in equipment, softdog is used to carry out communication with the controller of equipment to connect, and backstage receives the information of softdog, and feeds back fault solution or change equipment and use mandate.User in terminal by the Quick Response Code in scanning device, submit to the backstage and send out authorized application, change the authorization of equipment after confirmation by data of the acquisition for encryption;When device fails, the device fault information got is passed back to backstage by terminal, and returns to solution.In traditional industry Equipment Foundations, remote authorization, intelligent diagnostics are carried out using network, mechanics of communication, solve the problems, such as exist in terms of mandate, O&M, communication with digitization program, more application scenarios are provided to industrial equipment, collect the data to equipment optimization, customer service experience is promoted simultaneously, meets more application scenarios.

Description

A kind of intelligent encryption dog
Technical field
The present invention relates to technical field of data security, industrial Internet of Things field, specifically more particularly to a kind of intelligent encryption Dog.
Background technology
With communication, the development of network technology, industrial equipment of new generation is authorizing protection, application model, technological service etc. All various aspects suffer from the demand of change, adaptation, and industrial equipment is all by basic machine, sensing element, controller on the market Main electric component (controller contains various PLC), control system composition;The failure that basic machine occurs passes through sensing element, shape Control system is finally fed back at electrical signal, data is generated, forms specific alarm signal, equipment operation is solved for judging The various problems occurred in the process;Traditional industry equipment lacks effective, succinct method in terms of system authorization, novel maintenance, Lack the means that remote diagnosis is carried out with communication, network technology.
Existing industrial equipment:By control system warning message, by interactive modes such as scene, voice, videos by equipment Manufacturing firm, specified maintenance personnel solve, and it is all that there are maintenance costs is high, information description is asymmetric, communication efficiency is low etc. More problems.
Therefore, it is urgent to provide a kind of intelligent encryption dogs, so as to solve the deficiencies in the prior art.
Invention content
To achieve the above object, the present invention provides a kind of intelligent encryption dog, solves encountering for industrial equipment scene networking Challenge provides a kind of simply and easily mode, carries out data acquisition, fault diagnosis, while improving tradition using internet Encryption authorization mode.
The technical solution adopted by the present invention is as follows:A kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, institute Softdog is stated for being connect with the equipment, and data communication is carried out with the controller of the equipment;It is also set up in the equipment There is the 2 D code information for the terminal recognition;
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
The terminal submits to the backstage by the Quick Response Code in scanning device, data of the acquisition for encryption And authorized application is sent out, change the authorization of equipment after confirmation;When the device fails, the terminal handle is got Device fault information pass back to the backstage, and return to solution.
Further, the softdog further includes microcontroller chip, encryption module and communication interface;The encryption module is used It is encrypted during the control chip carries out data transmission with the equipment, the backstage;The communication interface is used for The transmission of data.
Further, the microcontroller chip further includes communications protocol, data management module and data transmission module.
The microcontroller chip is managed data by the data management module, and by the data transmission and The communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
Further, the microcontroller chip is based on embedded system development.
Further, the backstage further includes the background program, Data Management Unit, Quick Response Code generation unit of front-end A PP And data transfer unit;
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
Further, the Data Management Unit includes user management, monitoring of equipment data.
Further, the terminal 2 D code information in the equipment, and the relevant mandate of receiving device for identification Application, fault solution are shared with fault message.
Beneficial effects of the present invention are:It reduces industrial equipment and interconnects cost, simplify terminal user and use, equipment, which uses, to be authorized It is more flexible, promote after-sale service efficiency, the intelligence of Fault Diagnosis of Hoist Equipment.Industrial equipment is drawn due to machinery, electric appliance etc. The fault comprehensive factor risen is more, is aided with network communication means, provides more accurately data, is aided with model of mind, improves user's body It tests, promotes efficiency of service.The intelligent encryption dog of the remote authorization and intelligent trouble diagnosis realized by Quick Response Code, can allow user Know the real-time status failure problems of equipment;It can also be achieved remote authorization in leased equipment, it is more intelligent more convenient.
Description of the drawings
Fig. 1 is the schematic diagram of intelligent encryption dog system;
Fig. 2 is remote authorization flow diagram;
Fig. 3 is the schematic diagram of remote fault diagnosis;
Fig. 4 is user's process for using figure.
Specific implementation mode
In order to make the goal of the invention of the present invention, technical solution and technique effect are more clearly understood, with reference to specific reality Applying mode, the present invention is described further.It should be understood that specific embodiment described herein, be only used for explaining the present invention, It is not intended to limit the present invention.
A kind of intelligent encryption dog, applies on common equipment, such as in leasing market using upper.This intelligent encryption dog sets It counts from " softdog " product prototype evolution ripe in the market, on the basic function that former softdog provides, utilizes intelligence Terminal, cloud backstage etc. Internet technologies, extension extend softdog so that it can remote authorization, data acquisition, cooperation terminal, after Platform etc. can carry out Function Extension, to a novel intelligent hardware product generated.
A kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, the softdog are used to connect with the equipment It connects, and data communication is carried out with the controller of the equipment;The Quick Response Code for the terminal recognition is additionally provided in the equipment Information.
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
As shown in Figure 1, the terminal, by the Quick Response Code in scanning device, data of the acquisition for encryption are submitted To the backstage and authorized application is sent out, changes the authorization of equipment after confirmation, realizes remote authorization function;When the equipment When breaking down, the device fault information got is passed back to the backstage by the terminal, and returns to solution, realizes event Hinder diagnostic function.
Further, the softdog further includes microcontroller chip, encryption module and communication interface;The encryption module is used It is encrypted during the control chip carries out data transmission with the equipment, the backstage;The communication interface is used for The transmission of data.
Further, the microcontroller chip further includes communications protocol, data management module and data transmission module.
The microcontroller chip is managed data by the data management module, and by the data transmission and The communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
Using the microprocessor unit for having computing capability in product design, it is necessary to integrate encryption chip, communication interface etc. Hardware, exploitation control system realization authorizes a change the functions such as application, data acquisition, data transmission and processing and logical process, opens Hair APP application programs are supplied to end user to realize function interaction, with the fault data of background acquisition, establish fault diagnosis mould Type carries out the applications such as equipment fault early-warning, solution push, while being also used as device fabrication producer discovering device problem, changing The data foundation of good equipment.
Further, the microcontroller chip is based on embedded system development.
Further, the backstage further includes the background program, Data Management Unit, Quick Response Code generation unit of front-end A PP And data transfer unit;Formed diagnostic knowledge base simultaneously data storage in store, also realize empowerment management, diagnostic knowledge base and The function of system administration.
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
Further, the Data Management Unit includes user management, monitoring of equipment data.
Further, the terminal 2 D code information in the equipment, and the relevant mandate of receiving device for identification Application, fault solution are shared with fault message.
System encryption authorizes online modification application principle:
Control System Software as shown in Figure 2 is interacted by " communications protocol " and intelligent encryption dog, calls " intelligent encryption Unique ID built in dog " carries out soft ware authorization protection;
Built-in unique ID generates corresponding soft ware authorization pattern by background process, can by the term of validity, access times, Number of machines etc. is installed to generate different authorization codes or change the corresponding software module functions of ID;
Terminal client is scanned the two-dimensional code by mobile phone A pp, obtains hardware ID, submits the corresponding information of existing mandate and needs The content of change carries out mandate update after receiving request from the background;Modification softdog is awarded after backstage receives and veritified authorization message Power logic sends in equipment and authorizes a change again.
Fault diagnosis, early warning, solution push principle:
As shown in figure 3, terminal client scans the two-dimensional code, Equipment Foundations information, fault message are obtained, submits to backstage, after Platform is by " fault knowledge library " Analysis of Policy Making and returns to solution, or the data by being collected into judge orientation problem, provide Further solution, and complete to diagnose;And the case where sending in terminal, allowing related personnel that can know equipment at any time.
As shown in figure 4, when authorizing a change with equipment fault, user's mobile terminal APP two-dimensional code scannings submit change letter Breath and fault message are transferred to backstage and are handled, returned result in the terminal of user.
For example, equipment leasing market is the industry rapidly developed in recent years, there is statistical data to show, Present Global work Journey mechanical equipment market lease combined turnover is up to 40,000,000,000 dollars, occupies a quarter of engineering machinery total business share.Especially In developed country, engineering mechanical device lease is even more to have become mainstream, and the 65% of the total share in occuping market.
It in equipment leasing market is applied, using intelligent encryption dog scheme, is implanted in equipment as equipment part, by rent Contract of renting carries out authorized appropriation, and the remote visiting system when mandate termination, renewed treaty is carried out by contract execution situation, is authorized;When Equipment when something goes wrong, can carry out two-dimensional code scanning and carry out failure to report and intelligent diagnostics, be greatly improved efficiency of service and User experience.
On the basis of traditional industry functions of the equipments, remote authorization, intelligent diagnostics are carried out using network, mechanics of communication, are used Digitization program solves the problems, such as exist in terms of mandate, O&M, communication, and more application scenarios, receipts are provided to industrial equipment The relevant data of set pair equipment optimization, while customer service experience is promoted, meet more application scenarios.
Present invention aim to address the challenges of industrial equipment scene networking encountered, and provide one kind simply, conveniently Mode, carry out data acquisition, fault diagnosis, at the same using internet improve conventional cryptography authorization.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that The specific implementation of the present invention is confined to these explanations.For those of ordinary skill in the art to which the present invention belongs, exist Under the premise of not departing from present inventive concept, architectural form cans be flexible and changeable, can be with derivative series product.It only makes several Simple deduction or replace all shall be regarded as belonging to present invention scope of patent protection determined by the appended claims.

Claims (7)

1. a kind of intelligent encryption dog, including equipment, softdog, terminal and backstage, which is characterized in that
The 2 D code information for the terminal recognition is additionally provided in the equipment;
The softdog carries out data communication for being connect with the equipment, and with the controller of the equipment;
The backstage receives the information of the softdog, carries out data storage, empowerment management and fault diagnosis;
It is concurrent to submit to the backstage by the Quick Response Code in scanning device, data of the acquisition for encryption for the terminal Go out the application that authorizes a change, changes the authorization of equipment after confirmation;
The terminal is by the Quick Response Code in scanning device, and when the device fails, the terminal is set what is got Standby fault message passes back to the backstage, and returns to solution.
2. intelligent encryption dog according to claim 1, which is characterized in that the softdog further includes microcontroller chip, adds Close module and communication interface;The encryption module carries out data transmission for the control chip with the equipment, the backstage It is encrypted in the process;The communication interface is used for the transmission of device data.
3. intelligent encryption dog according to claim 2, which is characterized in that the microcontroller chip further include communications protocol, Data management module and data transmission module;
The microcontroller chip is managed data by the data management module, and passes through the data transmission and described Communications protocol communicates and carries out data transmission with the equipment, the cloud platform, the terminal.
4. intelligent encryption dog according to claim 3, which is characterized in that the microcontroller chip is opened based on embedded system Hair.
5. intelligent encryption dog according to claim 1, which is characterized in that the backstage further includes the backstage journey of front-end A PP Sequence, Data Management Unit, Quick Response Code generation unit and data transfer unit;
The front-end A PP background programs are used to receive the data that the terminal transmits and carry out relevant programming;
The Data Management Unit is for managing the data of user and the critical data of equipment;
Authorization message of the data transfer unit for the diagnostic message and equipment of transmission equipment;
The Quick Response Code generation unit is for generating related Quick Response Code.
6. intelligent encryption dog according to claim 5, which is characterized in that the Data Management Unit include user management, Monitoring of equipment data.
7. intelligent encryption dog according to claim 1, which is characterized in that the terminal for identification in the equipment two Code information is tieed up, and the relevant authorized application of receiving device, fault solution are shared with fault message.
CN201810482567.5A 2018-05-18 2018-05-18 A kind of intelligent encryption dog Pending CN108540332A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810482567.5A CN108540332A (en) 2018-05-18 2018-05-18 A kind of intelligent encryption dog

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810482567.5A CN108540332A (en) 2018-05-18 2018-05-18 A kind of intelligent encryption dog

Publications (1)

Publication Number Publication Date
CN108540332A true CN108540332A (en) 2018-09-14

Family

ID=63472167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810482567.5A Pending CN108540332A (en) 2018-05-18 2018-05-18 A kind of intelligent encryption dog

Country Status (1)

Country Link
CN (1) CN108540332A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111506890A (en) * 2020-04-30 2020-08-07 中铁工程装备集团有限公司 Shield machine locking method based on USB flash disk dongle
CN112580082A (en) * 2020-12-29 2021-03-30 北京深思数盾科技股份有限公司 Data processing method and encryption lock equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170078879A1 (en) * 2012-09-28 2017-03-16 Intel Corporation Device, method, and system for augmented reality security
CN106530057A (en) * 2016-11-24 2017-03-22 吴凡 Public apparatus management method and system based on mobile phone client

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170078879A1 (en) * 2012-09-28 2017-03-16 Intel Corporation Device, method, and system for augmented reality security
CN106530057A (en) * 2016-11-24 2017-03-22 吴凡 Public apparatus management method and system based on mobile phone client

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111506890A (en) * 2020-04-30 2020-08-07 中铁工程装备集团有限公司 Shield machine locking method based on USB flash disk dongle
CN111506890B (en) * 2020-04-30 2022-09-23 中铁工程装备集团有限公司 Shield machine locking method based on USB flash disk dongle
CN112580082A (en) * 2020-12-29 2021-03-30 北京深思数盾科技股份有限公司 Data processing method and encryption lock equipment
CN112580082B (en) * 2020-12-29 2022-04-05 北京深思数盾科技股份有限公司 Data processing method and encryption lock equipment

Similar Documents

Publication Publication Date Title
CN103891395A (en) Multi-device monitoring and control
CN111105528B (en) Intelligent door lock system based on Bluetooth broadcast
CN104243595B (en) A kind of power information acquisition system and its method based on IPv6
CN102724175B (en) The telecommunication safety management framework of ubiquitous green community net control and method
CN106744111A (en) Elevator repair and maintenance management system and method based on bluetooth and Mobile Data Communication Technology
CN107276987A (en) A kind of the special line physical isolation industrial data means of communication and system
CN107301703A (en) Dynamic puzzle-lock system and unlocking method
CN204719434U (en) The intelligent domestic system of many-many communication mode can be realized
CN105356604B (en) user side demand response method
CN108092847B (en) A kind of electric power LTE wireless terminal remote on-line monitoring method
CN110381069A (en) A kind of approaches to IM and system based on block chain technology
CN104618228A (en) Intelligent household gateway and system for automatically accessing cloud server by strategy based on intelligent household gateway and application method thereof
CN204719435U (en) Adopt the intelligent domestic system of many-many communication mode
CN104331669A (en) Application of wisdom medical sensitive data encryption technique
CN108540332A (en) A kind of intelligent encryption dog
CN105094086A (en) Intelligent household system, and condition configuration and control method for realizing many-to-many communication
CN106878933A (en) A kind of bluetooth equipment network-building method and system
CN108734884A (en) Barcode scanning door opening method, barcode scanning open-door system, intelligent cabinet and terminal
CN106971438A (en) Lock body control method, device, server and selling cabinet
CN104506502B (en) A kind of method that converged communication network is docked with main website
CN107018203A (en) A kind of frequency converter remote monitoring control method
CN109426867A (en) Device maintenance method based on two dimensional code and database
CN206298231U (en) Elevator repair and maintenance managing device based on bluetooth and Mobile Data Communication Technology
CN104092753B (en) Internet of Things information processing and fusion method and its system based on wireless relay system
CN107730662A (en) Gate inhibition's data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914

RJ01 Rejection of invention patent application after publication