Disclosure of Invention
In view of the above, the invention provides a method for remotely sending bridge tunnel monitoring information based on the internet of things.
A bridge tunnel monitoring information remote sending method based on the Internet of things comprises the following steps:
s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device;
s1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device;
s2, configuring a corresponding user terminal cluster according to the position information of the acquisition device;
s3, the acquisition device monitors the bridge and the tunnel to obtain monitoring information, stores the detection information in an encryption area of the acquisition device, judges whether the monitoring of the monitoring information reaches a sending period, and jumps to the step S4 when the sending period is reached;
s4, selecting a sending mode corresponding to the monitoring information by the acquisition device according to the sending mode; if the transmission mode belongs to the first transmission mode, jumping to step S5; if the transmission mode belongs to the second transmission mode, jumping to step S6;
s5, the acquisition device verifies the user terminal, and after the verification is passed, the acquisition device sends acquisition device information to the user terminal; the method comprises the steps that a user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with a firmware issuing activation condition, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device during matching; the acquisition device installs and runs the corresponding firmware and sends monitoring information to the user terminal, and the process is finished;
and S6, selecting the encryption mode of the information by the acquisition device according to the corresponding security level information, processing the monitoring information, sending the processed monitoring information to the second server, and ending.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S5 includes:
s51, the user terminal sends an identity authentication request to the second server, wherein the identity authentication request carries an identification number corresponding to the user terminal;
s52, the second server judges whether the user terminal initiating the request is in the user terminal cluster according to the corresponding identification number of the user terminal, and the second server sends the verification passing information to the acquisition device when the user terminal cluster is in the user terminal cluster; the acquisition device confirms that the user passes the verification according to the verification passing information and sends acquisition device information to the user terminal;
s53, the second server generates an authorization instruction with a term according to the sending period and sends the authorization instruction to the user terminal; the user terminal sends the authorization instruction to the acquisition device in an NFC mode; the acquisition device verifies the authorization instruction, and the step goes to step S54 after the authorization instruction passes the verification;
s54, the user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with activation conditions of firmware issuing, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device when the activation request is matched with the activation conditions of the firmware issuing;
and S55, the acquisition device sends the monitoring information to the user terminal in an NFC mode.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S6 includes:
s61, configuring a superposition encryption routing path and an information splitting table remotely sent by monitoring information in a second server, wherein the information splitting table comprises an original splitting factor, a splitting factor updating rule and a splitting rule; updating the original splitting factor, the splitting factor updating rule, the superposition encryption routing path and the splitting rule to the acquisition device in a offline mode; monitoring information of different types corresponds to different superposed encrypted routing paths, and the superposed encrypted routing paths are used for carrying out routing superposed encrypted transmission on split information according to different routing paths;
s62, the acquisition device determines an encryption algorithm of the encryption intensity corresponding to the monitoring information according to the security level information corresponding to the monitoring information;
s63, the acquisition device encrypts the monitoring information through an encryption algorithm corresponding to the encryption strength to obtain encrypted monitoring information, wherein the encrypted monitoring information comprises a mark corresponding to the type of the monitoring information;
s64, the acquisition device generates a splitting factor according to the original splitting factor and the splitting factor updating rule; splitting the encrypted monitoring information through a splitting factor and a splitting rule to obtain splitting information;
s65, selecting a corresponding superposition encryption routing path by the acquisition device according to the type of the monitoring information;
s66, the acquisition device performs routing superposition encryption on the split information according to different routing paths through the superposition encryption routing path selected in the step S65 and transmits the split information to a second server;
s67, the second server decrypts the received information sent in the step S66 through the superposition encryption routing path to obtain split information;
s68, the second server generates a splitting factor through the original splitting factor and the splitting factor updating rule, and recovers the splitting information through the splitting factor and the splitting rule to obtain encrypted monitoring information;
s69, the second server analyzes the mark number corresponding to the type of the monitoring information from the encrypted monitoring information, and selects a decryption algorithm with the encryption strength corresponding to the type of the monitoring information to decrypt the monitoring information to obtain the monitoring information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
the monitoring information of the bridge in the step S1 includes: deformation information, traffic flow information, and metal fatigue information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
in the step S54, the acquiring, by the first server, the firmware corresponding to the acquisition device and issuing the firmware to the corresponding acquisition device when matching includes:
when the firmware is matched with the firmware, the first server acquires the firmware corresponding to the acquisition device, generates a corresponding survival time limit of the firmware, and issues the firmware and the corresponding survival time limit of the firmware to the corresponding acquisition device;
accordingly, in step S55, after the firmware is installed in the collecting device, the monitoring information is sent to the user terminal in the NFC manner within the life time corresponding to the firmware.
The beneficial technical effects are as follows: compared with the prior art, the method for remotely sending the bridge tunnel monitoring information based on the Internet of things can realize the following steps: selecting a sending mode corresponding to the monitoring information according to the sending mode through the acquisition device; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety of the monitoring information of the bridge and the tunnel in the transmission process.
Detailed Description
In the embodiment of the invention, a method for remotely sending bridge tunnel monitoring information based on the Internet of things comprises the following steps:
s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device. By arranging the first server and the second server, the safety of information transmission can still be ensured after any server is cracked.
S1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; and synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device.
Optionally, the monitoring information of the tunnel and the bridge in step S1 includes: bridges, tunnel deformation information, traffic flow information, metal fatigue information, and the like. Various monitoring information has different related sensitivity degrees, so that corresponding safety levels need to be configured, for example, the monitoring information is divided into high, low and medium levels, and can be divided in more detail. In addition, because the attributes of the monitoring information are different, for example, the possible data volume of some information is relatively small, and the data volume of some monitoring information is relatively large, for example, video format data, a sending method in different modes can be adopted; and because the requirements for different monitoring information are different, some monitoring information needs to be acquired in real time, and some monitoring information can be acquired in a longer time period, the corresponding sending mode and sending period of the monitoring information can be configured. The acquisition device monitors various monitoring information and has the functions of data transmission and data processing.
S2, configuring a corresponding user terminal cluster according to the position information of the acquisition device;
the significance of implementing the step is as follows: the user terminal may be authenticated when the monitoring information is transmitted over a short distance. Only when the monitoring information is in the user terminal cluster, the monitoring information transmitted in a short distance can be received. Here, short distance means that for any acquisition device, a user terminal cluster is divided according to the distance.
S3, the acquisition device monitors the bridge and the tunnel to obtain monitoring information, stores the detection information in an encryption area of the acquisition device, judges whether the monitoring of the monitoring information reaches a sending period, and jumps to the step S4 when the sending period is reached;
the significance of implementing the step is as follows: by combining with step S1, the monitoring information can be transmitted only when the transmission cycle is met, so that other unauthorized persons cannot obtain the monitoring information outside the transmission cycle.
S4, selecting a sending mode corresponding to the monitoring information by the acquisition device according to the sending mode; if the transmission mode belongs to the first transmission mode, jumping to step S5; if the transmission mode belongs to the second transmission mode, jumping to step S6;
the first transmission mode is a short-range transmission mode, and the range of the short range may be set autonomously, for example, by means of NFC transmission. The second transmission mode is a transmission mode of wireless relay, for example, a transmission mode through a 4G wireless network.
S5, the acquisition device verifies the user terminal, and after the verification is passed, the acquisition device sends acquisition device information to the user terminal; the method comprises the steps that a user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with a firmware issuing activation condition, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device during matching; the acquisition device installs and runs the corresponding firmware and sends monitoring information to the user terminal, and the process is finished;
and S6, selecting the encryption mode of the information by the acquisition device according to the corresponding security level information, processing the monitoring information, sending the processed monitoring information to the second server, and ending.
By implementing the embodiment, the acquisition device selects the sending mode corresponding to the monitoring information according to the sending mode; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety in the information transmission process.
As shown in fig. 1, in the method for remotely sending bridge tunnel monitoring information based on the internet of things according to the present invention, the step S5 includes:
s51, the user terminal sends an identity authentication request to the second server, wherein the identity authentication request carries an identification number corresponding to the user terminal;
s52, the second server judges whether the user terminal initiating the request is in the user terminal cluster according to the corresponding identification number of the user terminal, and the second server sends the verification passing information to the acquisition device when the user terminal cluster is in the user terminal cluster; the acquisition device confirms that the user passes the verification according to the verification passing information and sends acquisition device information to the user terminal;
s53, the second server generates an authorization instruction with a term according to the sending period and sends the authorization instruction to the user terminal; the user terminal sends the authorization instruction to the acquisition device in an NFC mode; the acquisition device verifies the authorization instruction, and the step goes to step S54 after the authorization instruction passes the verification;
s54, the user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with activation conditions of firmware issuing, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device when the activation request is matched with the activation conditions of the firmware issuing;
and S55, the acquisition device sends the monitoring information to the user terminal in an NFC mode.
In this embodiment, whether the user terminal initiating the request is in the user terminal cluster is judged by the identification number corresponding to the user terminal, so that the first-layer verification function is exerted; and by setting the authorization instruction with the term, the monitoring information can be sent to the user terminal in an NFC mode only in the period when the authorization instruction with the term is effective, so that the safety of information transmission is further guaranteed. And the first generation of the authorization instruction with the term is to conform to the sending period and is generated by the second server, and the safety of the generation of the authorization instruction with the term is ensured through the two limits. The specific duration of "with deadline" here may be set autonomously.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S6 includes:
s61, configuring a superposition encryption routing path and an information splitting table remotely sent by monitoring information in a second server, wherein the information splitting table comprises an original splitting factor, a splitting factor updating rule and a splitting rule; updating the original splitting factor, the splitting factor updating rule, the superposition encryption routing path and the splitting rule to the acquisition device in a offline mode; monitoring information of different types corresponds to different superposed encrypted routing paths, and the superposed encrypted routing paths are used for carrying out routing superposed encrypted transmission on split information according to different routing paths;
in this embodiment, the splitting factor in the first splitting may be generated by the original splitting factor and the splitting factor update rule; when the splitting is needed again in the follow-up, the splitting factor obtained last time is updated through the splitting factor updating rule, and then the needed splitting factor can be obtained. Only the latest split factor is kept at a time, and the update is performed by the split factor update rule. The second server and the acquisition device can update the splitting factor through the rule. It should be noted that, for the splitting factor and the splitting rule, the present invention is not limited specifically, and the splitting of the monitoring information can be implemented. In a simpler embodiment, the original split factor is set to 2, and the split factor update rule is: "Add 2" is performed for each update. For example, the splitting factor is 4 at the first update and 6 at the next update; accordingly, the splitting rule is to divide the monitoring information by the splitting factor to obtain the splitting information. More complex ways of updating and splitting are also possible. The significance of this step is that the rule is not always regular when monitoring information is split every time, and even if someone else obtains split information once, how to split next time cannot be predicted.
S62, the acquisition device determines an encryption algorithm of the encryption intensity corresponding to the monitoring information according to the security level information corresponding to the monitoring information;
by implementing the step, the encryption algorithm with lower encryption strength can be selected for some information with lower security level, and the operation amount is reduced.
S63, the acquisition device encrypts the monitoring information through an encryption algorithm corresponding to the encryption strength to obtain encrypted monitoring information, wherein the encrypted monitoring information comprises a mark corresponding to the type of the monitoring information;
s64, the acquisition device generates a splitting factor according to the original splitting factor and the splitting factor updating rule; splitting the encrypted monitoring information through a splitting factor and a splitting rule to obtain splitting information;
s65, selecting a corresponding superposition encryption routing path by the acquisition device according to the type of the monitoring information;
the significance of the set superposed encryption route is that the split information is subjected to route superposed encryption transmission according to different route paths, and the transmission safety is ensured. The encryption algorithm in this step is not limited. The superposition encryption is to encrypt each relay node once, and the next relay node encrypts the encryption result of the previous relay node again. Specifically, when there are a plurality of acquisition devices, another detection device may be selected as the relay node.
S66, the acquisition device performs routing superposition encryption on the split information according to different routing paths through the superposition encryption routing path selected in the step S65 and transmits the split information to a second server;
s67, the second server decrypts the received information sent in the step S66 through the superposition encryption routing path to obtain split information;
s68, the second server generates a splitting factor through the original splitting factor and the splitting factor updating rule, and recovers the splitting information through the splitting factor and the splitting rule to obtain encrypted monitoring information;
s69, the second server analyzes the mark number corresponding to the type of the monitoring information from the encrypted monitoring information, and selects a decryption algorithm with the encryption strength corresponding to the type of the monitoring information to decrypt the monitoring information to obtain the monitoring information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
the monitoring information of the bridge in the step S1 includes: deformation information, traffic flow information, and metal fatigue information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
in the step S54, the acquiring, by the first server, the firmware corresponding to the acquisition device and issuing the firmware to the corresponding acquisition device when matching includes:
when the firmware is matched with the firmware, the first server acquires the firmware corresponding to the acquisition device, generates a corresponding survival time limit of the firmware, and issues the firmware and the corresponding survival time limit of the firmware to the corresponding acquisition device;
accordingly, in step S55, after the firmware is installed in the collecting device, the monitoring information is sent to the user terminal in the NFC manner within the life time corresponding to the firmware.
The beneficial technical effects are as follows: compared with the prior art, the method for remotely sending the bridge tunnel monitoring information based on the Internet of things can realize the following steps: selecting a sending mode corresponding to the monitoring information according to the sending mode through the acquisition device; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety of the monitoring information of the bridge and the tunnel in the transmission process.
It is understood that various other changes and modifications may be made by those skilled in the art based on the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the claims of the present invention.