CN108712405A - The long-range sending method of bridge tunnel monitoring information based on Internet of Things - Google Patents

The long-range sending method of bridge tunnel monitoring information based on Internet of Things Download PDF

Info

Publication number
CN108712405A
CN108712405A CN201810424954.3A CN201810424954A CN108712405A CN 108712405 A CN108712405 A CN 108712405A CN 201810424954 A CN201810424954 A CN 201810424954A CN 108712405 A CN108712405 A CN 108712405A
Authority
CN
China
Prior art keywords
harvester
information
monitoring information
server
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810424954.3A
Other languages
Chinese (zh)
Other versions
CN108712405B (en
Inventor
钟迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY
Original Assignee
Wuhan Kang Huiran Information Technology Consulting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Kang Huiran Information Technology Consulting Co Ltd filed Critical Wuhan Kang Huiran Information Technology Consulting Co Ltd
Priority to CN201810424954.3A priority Critical patent/CN108712405B/en
Publication of CN108712405A publication Critical patent/CN108712405A/en
Application granted granted Critical
Publication of CN108712405B publication Critical patent/CN108712405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Abstract

A kind of long-range sending method of bridge tunnel monitoring information based on Internet of Things, includes the following steps:S0, different bridges, the firmware of tunnel harvester and corresponding firmware code are configured in first server;And configure firmware and issue activation condition, establish the mapping relations that harvester, firmware code and firmware issue activation condition;The firmware in harvester for carrying out load and as the digital independent interface of encryption section in harvester;S1, the type and attribute that bridge, tunnel monitoring information are configured in second server, and according to the corresponding safety level information of type configuration monitoring information of monitoring information, according to the corresponding sending method of attribute configuration monitoring information and sending cycle of monitoring information;The corresponding safety level information of monitoring information, sending method and sending cycle are synchronized to corresponding harvester;S2, corresponding user terminal cluster is configured according to the location information of harvester.

Description

The long-range sending method of bridge tunnel monitoring information based on Internet of Things
Technical field
The present invention relates to bridge, tunnel monitoring technical field, more particularly to a kind of bridge tunnel monitoring based on Internet of Things Information remote sending method.
Background technology
Previous bridge, tunnel monitoring method are often paid close attention to the monitoring information monitored and are sent in time, often ignore The particularity of certain some bridge, tunnel facility itself, such as certain some information may be height concerning security matters, therefore information is transmitted The generation for avoiding divulging a secret as possible is needed in the process.
Invention content
In view of this, the present invention provides a kind of long-range sending method of bridge tunnel monitoring information based on Internet of Things.
A kind of long-range sending method of bridge tunnel monitoring information based on Internet of Things, includes the following steps:
S0, different bridges, the firmware of tunnel harvester and corresponding firmware code are configured in first server;And match It sets firmware and issues activation condition, establish the mapping relations that harvester, firmware code and firmware issue activation condition;It is described solid Part in harvester for carrying out load and as the digital independent interface of encryption section in harvester;
S1, the type and attribute that bridge, tunnel monitoring information are configured in second server, and according to monitoring information The corresponding safety level information of type configuration monitoring information, according to the corresponding sender of attribute configuration monitoring information of monitoring information Formula and sending cycle;The corresponding safety level information of monitoring information, sending method and sending cycle are synchronized to corresponding Harvester;
S2, corresponding user terminal cluster is configured according to the location information of harvester;
S3, harvester, which are monitored bridge, tunnel, to be obtained monitoring information and detection information is stored in harvester Encryption section in, judge to monitoring information monitor whether reach sending cycle, step is jumped to when reaching sending cycle S4;
S4, harvester select the corresponding sending method of monitoring information according to sending method;Belonging to the first sending method When jump to step S5;Step S6 is jumped to when belonging to the second sending method;
S5, harvester verify user terminal, and harvester sends to user terminal and acquires after being verified Device information;User terminal sends activation request to first server, and corresponding harvester information is carried in the activation request, First server judges that activation request issues whether activation condition matches with firmware, and in matching, first server obtains acquisition dress It sets corresponding firmware and is issued to corresponding harvester;Harvester is installed and is run corresponding firmware and sent to user terminal and monitored Information, and terminate;
S6, harvester select the cipher mode of information according to corresponding safety level information, at monitoring information It is sent to second server after reason, and terminates.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things, the step S5 packets It includes:
S51, user terminal initiate authentication request to second server, and it is whole to carry user in the authentication request The corresponding identifier in end;
Whether S52, second server correspond to identifier according to user terminal and judge the user terminal for initiating request in user In terminal cluster, second server will be verified information and be sent to harvester when in user terminal cluster;Harvester Pass through by verifying and sending harvester information to user terminal according to validation of information user is verified;
S53, second server, which are generated according to sending cycle with terminable authorized order, and by authorized order, is sent to use Family terminal;Authorized order is sent to harvester by user terminal by NFC modes;Harvester tests authorized order Card, jumps to step S54 after authorized order is verified;
S54, user terminal send activation request to first server, and corresponding harvester letter is carried in the activation request Breath, first server judge that activation request issues whether activation condition matches with firmware, and in matching, first server, which obtains, adopts Acquisition means correspond to firmware and are issued to corresponding harvester;
Monitoring information is sent to user terminal by S55, harvester by NFC modes.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things, the step S6 packets It includes:
S61, superposition encryption routed path and information fractionation that monitoring information is remotely sent are configured in second server Table, described information split table include the original fractionation factor, split factor update rule and split rule;It will by line under type The original fractionation factor splits factor update rule, superposition encryption routed path and splits in Policy Updates to harvester;No The monitoring information of same type corresponds to different superposition encryption routed paths, and the superposition encryption routed path is used for splitting information Spliced routing encrypted transmission is carried out according to different routed paths;
S62, harvester determine the corresponding encryption intensity of monitoring information according to the corresponding safety level information of monitoring information Encryption Algorithm;
S63, harvester are encrypted to obtain encrypted by the Encryption Algorithm of corresponding encryption intensity to monitoring information Monitoring information, the corresponding label number of the type comprising monitoring information in the encrypted monitoring information;
S64, harvester according to the original fractionation factor and split the factor update rule generation fractionation factor;Pass through fractionation The factor and fractionation rule are split to obtain to encrypted monitoring information splits information;
S65, harvester select corresponding superposition to encrypt routed path according to the type of monitoring information;
S66, harvester encrypt routed path to splitting information according to different roads by the superposition selected in step S65 Spliced routing encrypted transmission is carried out to second server by routed path;
S67, second server are encrypted routed path by superposition to the information that the step S66 received is sent and are decrypted Recovery obtains splitting information;
S68, second server by the original fractionation factor and split the factor update rule generation fractionation factor, by tearing open Divide therefore and split rule and is restored to obtain encrypted monitoring information to splitting information;
S69, second server parse the corresponding label number of monitoring information type from encrypted monitoring information, and select The decipherment algorithm for selecting the corresponding encryption intensity of type of monitoring information is decrypted monitoring information to obtain monitoring information.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things,
The monitoring information of the step S1 Bridges includes:Deformation data, information of vehicle flowrate, metal fatigue information.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things,
In matching, first server acquisition harvester corresponds to firmware and is issued to corresponding acquisition dress in the step S54 Set including:
In matching, first server obtains harvester and corresponds to firmware, and generates firmware and correspond to Viability, by firmware And firmware corresponds to Viability and is issued to corresponding harvester;
Correspondingly, harvester corresponds in Viability in firmware through the side NFC after installing firmware in the step S55 Monitoring information is sent to user terminal by formula.
Advantageous effects:The long-range sending method of bridge tunnel monitoring information based on Internet of Things of the present invention is relative to existing There is technology, can realize:The corresponding sending method of monitoring information is selected according to sending method by harvester;Belonging to first Monitoring information is sent after harvester verifies user terminal identity when sending method, and is terminated;Belonging to the second transmission Harvester selects the cipher mode of information according to corresponding safety level information when mode, is sent out after handling monitoring information It is sent to second server, and is terminated;It can realize the classification for distinguishing monitoring information, select different information sender formulas and add Close mode ensure that the safety in bridge, tunnel monitoring information transmission process.
Description of the drawings
Fig. 1 is step in the bridge tunnel monitoring information long-range sending method provided in an embodiment of the present invention based on Internet of Things The flow chart of S5.
Specific implementation mode
In embodiments of the present invention, a kind of long-range sending method of bridge tunnel monitoring information based on Internet of Things, including such as Lower step:
S0, different bridges, the firmware of tunnel harvester and corresponding firmware code are configured in first server;And match It sets firmware and issues activation condition, establish the mapping relations that harvester, firmware code and firmware issue activation condition;It is described solid Part in harvester for carrying out load and as the digital independent interface of encryption section in harvester.By setting up first separately Server, second server so that after any server is cracked, can still ensure the safety of information transmission.
S1, the type and attribute that bridge, tunnel monitoring information are configured in second server, and according to monitoring information The corresponding safety level information of type configuration monitoring information, according to the corresponding sender of attribute configuration monitoring information of monitoring information Formula and sending cycle;The corresponding safety level information of monitoring information, sending method and sending cycle are synchronized to corresponding Harvester.
Optionally, tunnel in the step S1, bridge monitoring information include:Bridge, tunnel deformation data, vehicle flowrate letter Breath, metal fatigue information etc..Various monitoring informations are different due to the sensitivity being related to, it is therefore desirable to configure corresponding peace Congruent grade, for example it is divided into high, normal, basic, it can also be divided in more detail.In addition, the attribute due to monitoring information is different, Than if any information may data volume it is smaller, some monitoring information data volumes are bigger, for example are video formatted datas, therefore The transmission method of different modes can be taken;And since the demand to different monitoring informations is different, some need obtains in real time Take, what is had can obtain within a longer time period, therefore can configure the corresponding sending method of monitoring information and Sending cycle.Harvester monitors various monitoring informations, and is sent with data, data processing function.
S2, corresponding user terminal cluster is configured according to the location information of harvester;
The meaning for implementing this step is:When sending monitoring information by short distance, user terminal can be tested Card.It, could be in the monitoring information for receiving short distance transmission when being only in user terminal cluster.Short distance herein refers to pair In any harvester, far and near according to distance divides a user terminal cluster.
S3, harvester, which are monitored bridge, tunnel, to be obtained monitoring information and detection information is stored in harvester Encryption section in, judge to monitoring information monitor whether reach sending cycle, step is jumped to when reaching sending cycle S4;
The meaning for implementing this step is:By being combined with step S1, could only be sent when meeting sending cycle Monitoring information so that other unauthorized persons can not obtain monitoring information except sending cycle.
S4, harvester select the corresponding sending method of monitoring information according to sending method;Belonging to the first sending method When jump to step S5;Step S6 is jumped to when belonging to the second sending method;
First sending method is short distance sending method, and short-range range can independently be set, for example be transmitted by NFC Mode.Second sending method is the transmission mode of wireless relay, such as by way of 4G wireless network transmissions.
S5, harvester verify user terminal, and harvester sends to user terminal and acquires after being verified Device information;User terminal sends activation request to first server, and corresponding harvester information is carried in the activation request, First server judges that activation request issues whether activation condition matches with firmware, and in matching, first server obtains acquisition dress It sets corresponding firmware and is issued to corresponding harvester;Harvester is installed and is run corresponding firmware and sent to user terminal and monitored Information, and terminate;
S6, harvester select the cipher mode of information according to corresponding safety level information, at monitoring information It is sent to second server after reason, and terminates.
By implementing the present embodiment, the corresponding sending method of monitoring information is selected according to sending method by harvester; Monitoring information is sent after harvester verifies user terminal identity when belonging to the first sending method, and is terminated;Belonging to When the second sending method harvester according to corresponding safety level information select information cipher mode, to monitoring information into It is sent to second server after row processing, and is terminated;It can realize the classification for distinguishing monitoring information, different information is selected to send Mode and cipher mode ensure that the safety in message transmitting procedure.
As shown in Figure 1, in the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things, institute Stating step S5 includes:
S51, user terminal initiate authentication request to second server, and it is whole to carry user in the authentication request The corresponding identifier in end;
Whether S52, second server correspond to identifier according to user terminal and judge the user terminal for initiating request in user In terminal cluster, second server will be verified information and be sent to harvester when in user terminal cluster;Harvester Pass through by verifying and sending harvester information to user terminal according to validation of information user is verified;
S53, second server, which are generated according to sending cycle with terminable authorized order, and by authorized order, is sent to use Family terminal;Authorized order is sent to harvester by user terminal by NFC modes;Harvester tests authorized order Card, jumps to step S54 after authorized order is verified;
S54, user terminal send activation request to first server, and corresponding harvester letter is carried in the activation request Breath, first server judge that activation request issues whether activation condition matches with firmware, and in matching, first server, which obtains, adopts Acquisition means correspond to firmware and are issued to corresponding harvester;
Monitoring information is sent to user terminal by S55, harvester by NFC modes.
In the present embodiment, whether correspond to identifier by user terminal judges the user terminal for initiating request at user's end It holds in cluster, has played the effect of first layer verification;And by the authorized order for being provided with the time limit so that can only with It could be by the way that monitoring information be sent to user terminal by NFC modes, further during the authorized order in time limit is effective The safety of information transmission is ensured.And it generates first with terminable authorized order and is to fit to sending cycle, and by Second server generates, and ensure that the safety generated with terminable authorized order by the two limitations." carrying here The specific duration in time limit " can independently be set.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things, the step S6 packets It includes:
S61, superposition encryption routed path and information fractionation that monitoring information is remotely sent are configured in second server Table, described information split table include the original fractionation factor, split factor update rule and split rule;It will by line under type The original fractionation factor splits factor update rule, superposition encryption routed path and splits in Policy Updates to harvester;No The monitoring information of same type corresponds to different superposition encryption routed paths, and the superposition encryption routed path is used for splitting information Spliced routing encrypted transmission is carried out according to different routed paths;
In the present embodiment, can by it is original fractionation the factor and split the factor update rule generate for the first time split when Split the factor;When subsequently needing to split again, the fractionation factor that the last time is obtained is carried out by splitting factor update rule Update can be obtained by the fractionation factor of needs.The newest fractionation factor is only kept every time, by splitting factor update rule It is updated.Second server and harvester can realize the update for splitting the factor by above-mentioned rule.It is noticeable It is that, for splitting the factor and splitting rule, the present invention does not do specific restriction, can realize for being split to monitoring information .In a kind of fairly simple embodiment, the original fractionation factor is set as 2, splitting factor update rule is:It is each " adding 2 " is carried out when secondary update.For example it is 4 that the factor is split when updating for the first time, it is 6 that the factor is split when updating next time;Correspondingly, Rule is split to obtain monitoring information divided by the fractionation factor to split information.It can also be updated by the way of increasingly complex And fractionation.The meaning of this step is, is monitored when information is split rule every time not necessarily, though other people certain once obtain The information of fractionation may be unexpected by how splitting next time.
S62, harvester determine the corresponding encryption intensity of monitoring information according to the corresponding safety level information of monitoring information Encryption Algorithm;
By implementing this step, the lower encryption of encryption intensity can be selected to calculate for the lower information of some safe classes Method reduces operand.
S63, harvester are encrypted to obtain encrypted by the Encryption Algorithm of corresponding encryption intensity to monitoring information Monitoring information, the corresponding label number of the type comprising monitoring information in the encrypted monitoring information;
S64, harvester according to the original fractionation factor and split the factor update rule generation fractionation factor;Pass through fractionation The factor and fractionation rule are split to obtain to encrypted monitoring information splits information;
S65, harvester select corresponding superposition to encrypt routed path according to the type of monitoring information;
The meaning of the superposition encryption routed path of setting is, will split information and is route according to different routed paths It is superimposed encrypted transmission, ensure that the safety of transmission.Encryption Algorithm does not limit in this step.It is encrypted as at each Relay node carries out one-time pad encryption, and next relay node encrypts the encrypted result of a upper relay node again.Tool Body, in the case where harvester is multiple, can select using other detection devices as relay node.
S66, harvester encrypt routed path to splitting information according to different roads by the superposition selected in step S65 Spliced routing encrypted transmission is carried out to second server by routed path;
S67, second server are encrypted routed path by superposition to the information that the step S66 received is sent and are decrypted Recovery obtains splitting information;
S68, second server by the original fractionation factor and split the factor update rule generation fractionation factor, by tearing open Divide therefore and split rule and is restored to obtain encrypted monitoring information to splitting information;
S69, second server parse the corresponding label number of monitoring information type from encrypted monitoring information, and select The decipherment algorithm for selecting the corresponding encryption intensity of type of monitoring information is decrypted monitoring information to obtain monitoring information.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things,
The monitoring information of the step S1 Bridges includes:Deformation data, information of vehicle flowrate, metal fatigue information.
In the bridge tunnel monitoring information long-range sending method of the present invention based on Internet of Things,
In matching, first server acquisition harvester corresponds to firmware and is issued to corresponding acquisition dress in the step S54 Set including:
In matching, first server obtains harvester and corresponds to firmware, and generates firmware and correspond to Viability, by firmware And firmware corresponds to Viability and is issued to corresponding harvester;
Correspondingly, harvester corresponds in Viability in firmware through the side NFC after installing firmware in the step S55 Monitoring information is sent to user terminal by formula.
Advantageous effects:The long-range sending method of bridge tunnel monitoring information based on Internet of Things of the present invention is relative to existing There is technology, can realize:The corresponding sending method of monitoring information is selected according to sending method by harvester;Belonging to first Monitoring information is sent after harvester verifies user terminal identity when sending method, and is terminated;Belonging to the second transmission Harvester selects the cipher mode of information according to corresponding safety level information when mode, is sent out after handling monitoring information It is sent to second server, and is terminated;It can realize the classification for distinguishing monitoring information, select different information sender formulas and add Close mode ensure that the safety in bridge, tunnel monitoring information transmission process.
It is understood that for those of ordinary skill in the art, can be conceived with the technique according to the invention and be done Go out various other corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention It encloses.

Claims (5)

1. a kind of long-range sending method of bridge tunnel monitoring information based on Internet of Things, which is characterized in that include the following steps:
S0, different bridges, the firmware of tunnel harvester and corresponding firmware code are configured in first server;And it configures solid Part issues activation condition, establishes the mapping relations that harvester, firmware code and firmware issue activation condition;The firmware is used In carried out in harvester load and as harvester in encryption section digital independent interface;
S1, the type and attribute that bridge, tunnel monitoring information are configured in second server, and according to the type of monitoring information Configure the corresponding safety level information of monitoring information, according to the corresponding sending method of attribute configuration monitoring information of monitoring information with And sending cycle;The corresponding safety level information of monitoring information, sending method and sending cycle are synchronized to corresponding acquisition Device;
S2, corresponding mobile terminal cluster is configured according to the location information of harvester;
S3, harvester, which are monitored bridge, tunnel to obtain monitoring information and detection information is stored in harvester, to be added In close region, judge to monitoring information monitor whether reach sending cycle, step S4 is jumped to when reaching sending cycle;
S4, harvester select the corresponding sending method of monitoring information according to sending method;It is jumped when belonging to the first sending method Go to step S5;Step S6 is jumped to when belonging to the second sending method;
S5, harvester verify user terminal, and harvester sends harvester to user terminal after being verified Information;User terminal sends activation request to first server, the corresponding harvester information of carrying in the activation request, and first Server judges that activation request issues whether activation condition matches with firmware, and in matching, first server obtains harvester pair It answers firmware and is issued to corresponding harvester;Harvester is installed and is run corresponding firmware and sends monitoring letter to user terminal Breath, and terminate;
S6, harvester select the cipher mode of information according to corresponding safety level information, after handling monitoring information It is sent to second server, and is terminated.
2. the long-range sending method of bridge tunnel monitoring information based on Internet of Things as described in claim 1, which is characterized in that institute Stating step S5 includes:
S51, user terminal initiate authentication request to second server, and user terminal pair is carried in the authentication request Answer identifier;
Whether S52, second server correspond to identifier according to user terminal and judge the user terminal for initiating request in user terminal In cluster, second server will be verified information and be sent to harvester when in user terminal cluster;Harvester according to Validation of information user is verified by sending harvester information by verification and to user terminal;
S53, second server are generated according to sending cycle with terminable authorized order, and authorized order is sent to user's end End;Authorized order is sent to harvester by user terminal by NFC modes;Harvester verifies authorized order, Authorized order jumps to step S54 after being verified;
S54, mobile terminal send activation request to first server, and corresponding harvester information is carried in the activation request, First server judges that activation request issues whether activation condition matches with firmware, and in matching, first server obtains acquisition dress It sets corresponding firmware and is issued to corresponding harvester;
Monitoring information is sent to user terminal by S55, harvester by NFC modes.
3. the long-range sending method of bridge tunnel monitoring information based on Internet of Things as described in claim 1, which is characterized in that institute Stating step S6 includes:
S61, superposition encryption routed path and information split table that monitoring information is remotely sent, institute are configured in second server Information split table is stated to include the original fractionation factor, split factor update rule and split rule;It will be original by line under type The factor is split, factor update rule, superposition encryption routed path is split and splits in Policy Updates to harvester;Inhomogeneity The monitoring information of type corresponds to different superposition encryption routed paths, the superposition encryption routed path be used for fractionation information according to Different routed paths carries out spliced routing encrypted transmission;
S62, harvester determine adding for the corresponding encryption intensity of monitoring information according to the corresponding safety level information of monitoring information Close algorithm;
S63, harvester are encrypted monitoring information to obtain encrypted monitoring by the Encryption Algorithm of corresponding encryption intensity Information, the corresponding label number of the type comprising monitoring information in the encrypted monitoring information;
S64, harvester according to the original fractionation factor and split the factor update rule generation fractionation factor;By splitting the factor And it splits rule and encrypted monitoring information is split to obtain fractionation information;
S65, harvester select corresponding superposition to encrypt routed path according to the type of monitoring information;
S66, monitoring device encrypt routed path to splitting information according to different routing roads by the superposition selected in step S65 Spliced routing encrypted transmission is carried out to second server by path;
S67, second server encrypt routed path by superposition to the information that the step S66 received is sent and recovery are decrypted It obtains splitting information;
S68, second server by the original fractionation factor and split the factor update rule generate split the factor, by split because This and fractionation rule are restored to obtain encrypted monitoring information to splitting information;
S69, second server parse the corresponding label number of monitoring information type from encrypted monitoring information, and select to supervise The decipherment algorithm of the corresponding encryption intensity of type of measurement information is decrypted monitoring information to obtain monitoring information.
4. the long-range sending method of bridge tunnel monitoring information based on Internet of Things as described in claim 1, which is characterized in that
The monitoring information of the step S1 Bridges includes:Deformation data, information of vehicle flowrate, metal fatigue information.
5. the long-range sending method of bridge tunnel monitoring information based on Internet of Things as claimed in claim 2, which is characterized in that
In matching, first server acquisition harvester corresponds to firmware and is issued to corresponding harvester packet in the step S54 It includes:
In matching, first server obtains harvester and corresponds to firmware, and generates firmware and corresponds to Viability, by firmware and Firmware corresponds to Viability and is issued to corresponding harvester;
Correspondingly, harvester corresponds in Viability in firmware through NFC modes general after installing firmware in the step S55 Monitoring information is sent to user terminal.
CN201810424954.3A 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things Active CN108712405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810424954.3A CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810424954.3A CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Publications (2)

Publication Number Publication Date
CN108712405A true CN108712405A (en) 2018-10-26
CN108712405B CN108712405B (en) 2020-11-24

Family

ID=63867943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810424954.3A Active CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Country Status (1)

Country Link
CN (1) CN108712405B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848059A (en) * 2018-05-08 2018-11-20 武汉康慧然信息技术咨询有限公司 Bridge monitoring methods

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100189064A1 (en) * 2009-01-29 2010-07-29 Qualcomm Incorporated Link management for multimedia content mobility
CN101884964A (en) * 2010-03-26 2010-11-17 中豪国业(北京)科技有限公司 Control system of spraying device of open coal car
EP2775418A1 (en) * 2013-03-08 2014-09-10 Igt Multi-tiered static chain of trust
CN104897195A (en) * 2014-09-26 2015-09-09 安徽金培因科技有限公司 Bridge safety condition detector

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100189064A1 (en) * 2009-01-29 2010-07-29 Qualcomm Incorporated Link management for multimedia content mobility
CN101884964A (en) * 2010-03-26 2010-11-17 中豪国业(北京)科技有限公司 Control system of spraying device of open coal car
EP2775418A1 (en) * 2013-03-08 2014-09-10 Igt Multi-tiered static chain of trust
CN104897195A (en) * 2014-09-26 2015-09-09 安徽金培因科技有限公司 Bridge safety condition detector

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
余雷: ""结构状态监测的通用型小型化系统研制与开发"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848059A (en) * 2018-05-08 2018-11-20 武汉康慧然信息技术咨询有限公司 Bridge monitoring methods

Also Published As

Publication number Publication date
CN108712405B (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN106534143A (en) Method and system capable of realizing cross-application authentication authorization
CN105103619B (en) Security routing based on router physical position
JP4856182B2 (en) Software application security method and system
CN106991317A (en) Safe verification method, platform, device and system
CN109309565A (en) A kind of method and device of safety certification
CN110061849A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN106899410A (en) A kind of method and device of equipment identities certification
CN105847247A (en) Authentication system and working method thereof
CN106657068A (en) Login authorization method and device, login method and device
CN103067402A (en) Method and system for digital certificate generation
WO2009140663A1 (en) Mobile device assisted secure computer network communications
CN101227468A (en) Method, device and system for authenticating user to network
CN110113745A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN108616360A (en) User identity verification, register method and device
CN108959990B (en) Two-dimensional code verification method and device
CN106981003B (en) Transaction method, device and system for virtual reality environment
CN106850207A (en) Identity identifying method and system without CA
CN103078742A (en) Generation method and system of digital certificate
CN108696356A (en) A kind of digital certificate delet method, apparatus and system based on block chain
CN107995148A (en) The anti-tamper method of file, system, terminal and credible cloud platform
CN110474921A (en) A kind of perception layer data fidelity method towards local Internet of Things
CN110300400A (en) One kind is registered method, apparatus, electronic equipment and storage medium
CN106331003A (en) Method and device for accessing application portal system on cloud desktop
CN105610822A (en) Credit verifying method and device
CN108712405A (en) The long-range sending method of bridge tunnel monitoring information based on Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200825

Address after: No.2, 30 / F, unit 1, building G2, Shuian Xingcheng, No.2, Xudong 2nd Road, xujiapeng street, Wuchang District, Wuhan City, Hubei Province

Applicant after: Tan Shizhong

Address before: 430000 Wuhan Donghu New Technological Development Zone, Hubei Province, Guannan Science and Technology Industrial Park, Phase I, Level 3, Unit 21, No. 9 (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348)

Applicant before: WUHAN KANGHUIRAN INFORMATION TECHNOLOGY CONSULTING Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right

Effective date of registration: 20201111

Address after: 420 Zhenda Road, Baoshan District, Shanghai 201900

Applicant after: SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY

Address before: No.2, 30 / F, unit 1, building G2, Shuian Xingcheng, No.2, Xudong 2nd Road, xujiapeng street, Wuchang District, Wuhan City, Hubei Province

Applicant before: Tan Shizhong

TA01 Transfer of patent application right