CN108712405B - Bridge tunnel monitoring information remote sending method based on Internet of things - Google Patents

Bridge tunnel monitoring information remote sending method based on Internet of things Download PDF

Info

Publication number
CN108712405B
CN108712405B CN201810424954.3A CN201810424954A CN108712405B CN 108712405 B CN108712405 B CN 108712405B CN 201810424954 A CN201810424954 A CN 201810424954A CN 108712405 B CN108712405 B CN 108712405B
Authority
CN
China
Prior art keywords
monitoring information
acquisition device
information
firmware
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810424954.3A
Other languages
Chinese (zh)
Other versions
CN108712405A (en
Inventor
钟迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY
Original Assignee
SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY filed Critical SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY
Priority to CN201810424954.3A priority Critical patent/CN108712405B/en
Publication of CN108712405A publication Critical patent/CN108712405A/en
Application granted granted Critical
Publication of CN108712405B publication Critical patent/CN108712405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Abstract

A bridge tunnel monitoring information remote sending method based on the Internet of things comprises the following steps: s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device; s1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device; and S2, configuring the corresponding user terminal cluster according to the position information of the acquisition device.

Description

Bridge tunnel monitoring information remote sending method based on Internet of things
Technical Field
The invention relates to the technical field of bridge and tunnel monitoring, in particular to a bridge and tunnel monitoring information remote sending method based on the Internet of things.
Background
The prior bridge and tunnel monitoring methods usually pay attention to timely sending monitored monitoring information, often ignore the particularity of certain bridge and tunnel facilities, for example, certain information may be highly confidential, and therefore the occurrence of divulgence needs to be avoided as much as possible in the information transmission process.
Disclosure of Invention
In view of the above, the invention provides a method for remotely sending bridge tunnel monitoring information based on the internet of things.
A bridge tunnel monitoring information remote sending method based on the Internet of things comprises the following steps:
s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device;
s1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device;
s2, configuring a corresponding user terminal cluster according to the position information of the acquisition device;
s3, the acquisition device monitors the bridge and the tunnel to obtain monitoring information, stores the detection information in an encryption area of the acquisition device, judges whether the monitoring of the monitoring information reaches a sending period, and jumps to the step S4 when the sending period is reached;
s4, selecting a sending mode corresponding to the monitoring information by the acquisition device according to the sending mode; if the transmission mode belongs to the first transmission mode, jumping to step S5; if the transmission mode belongs to the second transmission mode, jumping to step S6;
s5, the acquisition device verifies the user terminal, and after the verification is passed, the acquisition device sends acquisition device information to the user terminal; the method comprises the steps that a user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with a firmware issuing activation condition, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device during matching; the acquisition device installs and runs the corresponding firmware and sends monitoring information to the user terminal, and the process is finished;
and S6, selecting the encryption mode of the information by the acquisition device according to the corresponding security level information, processing the monitoring information, sending the processed monitoring information to the second server, and ending.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S5 includes:
s51, the user terminal sends an identity authentication request to the second server, wherein the identity authentication request carries an identification number corresponding to the user terminal;
s52, the second server judges whether the user terminal initiating the request is in the user terminal cluster according to the corresponding identification number of the user terminal, and the second server sends the verification passing information to the acquisition device when the user terminal cluster is in the user terminal cluster; the acquisition device confirms that the user passes the verification according to the verification passing information and sends acquisition device information to the user terminal;
s53, the second server generates an authorization instruction with a term according to the sending period and sends the authorization instruction to the user terminal; the user terminal sends the authorization instruction to the acquisition device in an NFC mode; the acquisition device verifies the authorization instruction, and the step goes to step S54 after the authorization instruction passes the verification;
s54, the user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with activation conditions of firmware issuing, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device when the activation request is matched with the activation conditions of the firmware issuing;
and S55, the acquisition device sends the monitoring information to the user terminal in an NFC mode.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S6 includes:
s61, configuring a superposition encryption routing path and an information splitting table remotely sent by monitoring information in a second server, wherein the information splitting table comprises an original splitting factor, a splitting factor updating rule and a splitting rule; updating the original splitting factor, the splitting factor updating rule, the superposition encryption routing path and the splitting rule to the acquisition device in a offline mode; monitoring information of different types corresponds to different superposed encrypted routing paths, and the superposed encrypted routing paths are used for carrying out routing superposed encrypted transmission on split information according to different routing paths;
s62, the acquisition device determines an encryption algorithm of the encryption intensity corresponding to the monitoring information according to the security level information corresponding to the monitoring information;
s63, the acquisition device encrypts the monitoring information through an encryption algorithm corresponding to the encryption strength to obtain encrypted monitoring information, wherein the encrypted monitoring information comprises a mark corresponding to the type of the monitoring information;
s64, the acquisition device generates a splitting factor according to the original splitting factor and the splitting factor updating rule; splitting the encrypted monitoring information through a splitting factor and a splitting rule to obtain splitting information;
s65, selecting a corresponding superposition encryption routing path by the acquisition device according to the type of the monitoring information;
s66, the acquisition device performs routing superposition encryption on the split information according to different routing paths through the superposition encryption routing path selected in the step S65 and transmits the split information to a second server;
s67, the second server decrypts the received information sent in the step S66 through the superposition encryption routing path to obtain split information;
s68, the second server generates a splitting factor through the original splitting factor and the splitting factor updating rule, and recovers the splitting information through the splitting factor and the splitting rule to obtain encrypted monitoring information;
s69, the second server analyzes the mark number corresponding to the type of the monitoring information from the encrypted monitoring information, and selects a decryption algorithm with the encryption strength corresponding to the type of the monitoring information to decrypt the monitoring information to obtain the monitoring information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
the monitoring information of the bridge in the step S1 includes: deformation information, traffic flow information, and metal fatigue information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
in the step S54, the acquiring, by the first server, the firmware corresponding to the acquisition device and issuing the firmware to the corresponding acquisition device when matching includes:
when the firmware is matched with the firmware, the first server acquires the firmware corresponding to the acquisition device, generates a corresponding survival time limit of the firmware, and issues the firmware and the corresponding survival time limit of the firmware to the corresponding acquisition device;
accordingly, in step S55, after the firmware is installed in the collecting device, the monitoring information is sent to the user terminal in the NFC manner within the life time corresponding to the firmware.
The beneficial technical effects are as follows: compared with the prior art, the method for remotely sending the bridge tunnel monitoring information based on the Internet of things can realize the following steps: selecting a sending mode corresponding to the monitoring information according to the sending mode through the acquisition device; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety of the monitoring information of the bridge and the tunnel in the transmission process.
Drawings
Fig. 1 is a flowchart of step S5 in the method for remotely sending bridge tunnel monitoring information based on the internet of things according to the embodiment of the present invention.
Detailed Description
In the embodiment of the invention, a method for remotely sending bridge tunnel monitoring information based on the Internet of things comprises the following steps:
s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device. By arranging the first server and the second server, the safety of information transmission can still be ensured after any server is cracked.
S1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; and synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device.
Optionally, the monitoring information of the tunnel and the bridge in step S1 includes: bridges, tunnel deformation information, traffic flow information, metal fatigue information, and the like. Various monitoring information has different related sensitivity degrees, so that corresponding safety levels need to be configured, for example, the monitoring information is divided into high, low and medium levels, and can be divided in more detail. In addition, because the attributes of the monitoring information are different, for example, the possible data volume of some information is relatively small, and the data volume of some monitoring information is relatively large, for example, video format data, a sending method in different modes can be adopted; and because the requirements for different monitoring information are different, some monitoring information needs to be acquired in real time, and some monitoring information can be acquired in a longer time period, the corresponding sending mode and sending period of the monitoring information can be configured. The acquisition device monitors various monitoring information and has the functions of data transmission and data processing.
S2, configuring a corresponding user terminal cluster according to the position information of the acquisition device;
the significance of implementing the step is as follows: the user terminal may be authenticated when the monitoring information is transmitted over a short distance. Only when the monitoring information is in the user terminal cluster, the monitoring information transmitted in a short distance can be received. Here, short distance means that for any acquisition device, a user terminal cluster is divided according to the distance.
S3, the acquisition device monitors the bridge and the tunnel to obtain monitoring information, stores the detection information in an encryption area of the acquisition device, judges whether the monitoring of the monitoring information reaches a sending period, and jumps to the step S4 when the sending period is reached;
the significance of implementing the step is as follows: by combining with step S1, the monitoring information can be transmitted only when the transmission cycle is met, so that other unauthorized persons cannot obtain the monitoring information outside the transmission cycle.
S4, selecting a sending mode corresponding to the monitoring information by the acquisition device according to the sending mode; if the transmission mode belongs to the first transmission mode, jumping to step S5; if the transmission mode belongs to the second transmission mode, jumping to step S6;
the first transmission mode is a short-range transmission mode, and the range of the short range may be set autonomously, for example, by means of NFC transmission. The second transmission mode is a transmission mode of wireless relay, for example, a transmission mode through a 4G wireless network.
S5, the acquisition device verifies the user terminal, and after the verification is passed, the acquisition device sends acquisition device information to the user terminal; the method comprises the steps that a user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with a firmware issuing activation condition, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device during matching; the acquisition device installs and runs the corresponding firmware and sends monitoring information to the user terminal, and the process is finished;
and S6, selecting the encryption mode of the information by the acquisition device according to the corresponding security level information, processing the monitoring information, sending the processed monitoring information to the second server, and ending.
By implementing the embodiment, the acquisition device selects the sending mode corresponding to the monitoring information according to the sending mode; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety in the information transmission process.
As shown in fig. 1, in the method for remotely sending bridge tunnel monitoring information based on the internet of things according to the present invention, the step S5 includes:
s51, the user terminal sends an identity authentication request to the second server, wherein the identity authentication request carries an identification number corresponding to the user terminal;
s52, the second server judges whether the user terminal initiating the request is in the user terminal cluster according to the corresponding identification number of the user terminal, and the second server sends the verification passing information to the acquisition device when the user terminal cluster is in the user terminal cluster; the acquisition device confirms that the user passes the verification according to the verification passing information and sends acquisition device information to the user terminal;
s53, the second server generates an authorization instruction with a term according to the sending period and sends the authorization instruction to the user terminal; the user terminal sends the authorization instruction to the acquisition device in an NFC mode; the acquisition device verifies the authorization instruction, and the step goes to step S54 after the authorization instruction passes the verification;
s54, the user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with activation conditions of firmware issuing, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device when the activation request is matched with the activation conditions of the firmware issuing;
and S55, the acquisition device sends the monitoring information to the user terminal in an NFC mode.
In this embodiment, whether the user terminal initiating the request is in the user terminal cluster is judged by the identification number corresponding to the user terminal, so that the first-layer verification function is exerted; and by setting the authorization instruction with the term, the monitoring information can be sent to the user terminal in an NFC mode only in the period when the authorization instruction with the term is effective, so that the safety of information transmission is further guaranteed. And the first generation of the authorization instruction with the term is to conform to the sending period and is generated by the second server, and the safety of the generation of the authorization instruction with the term is ensured through the two limits. The specific duration of "with deadline" here may be set autonomously.
In the method for remotely sending bridge tunnel monitoring information based on the internet of things, the step S6 includes:
s61, configuring a superposition encryption routing path and an information splitting table remotely sent by monitoring information in a second server, wherein the information splitting table comprises an original splitting factor, a splitting factor updating rule and a splitting rule; updating the original splitting factor, the splitting factor updating rule, the superposition encryption routing path and the splitting rule to the acquisition device in a offline mode; monitoring information of different types corresponds to different superposed encrypted routing paths, and the superposed encrypted routing paths are used for carrying out routing superposed encrypted transmission on split information according to different routing paths;
in this embodiment, the splitting factor in the first splitting may be generated by the original splitting factor and the splitting factor update rule; when the splitting is needed again in the follow-up, the splitting factor obtained last time is updated through the splitting factor updating rule, and then the needed splitting factor can be obtained. Only the latest split factor is kept at a time, and the update is performed by the split factor update rule. The second server and the acquisition device can update the splitting factor through the rule. It should be noted that, for the splitting factor and the splitting rule, the present invention is not limited specifically, and the splitting of the monitoring information can be implemented. In a simpler embodiment, the original split factor is set to 2, and the split factor update rule is: "Add 2" is performed for each update. For example, the splitting factor is 4 at the first update and 6 at the next update; accordingly, the splitting rule is to divide the monitoring information by the splitting factor to obtain the splitting information. More complex ways of updating and splitting are also possible. The significance of this step is that the rule is not always regular when monitoring information is split every time, and even if someone else obtains split information once, how to split next time cannot be predicted.
S62, the acquisition device determines an encryption algorithm of the encryption intensity corresponding to the monitoring information according to the security level information corresponding to the monitoring information;
by implementing the step, the encryption algorithm with lower encryption strength can be selected for some information with lower security level, and the operation amount is reduced.
S63, the acquisition device encrypts the monitoring information through an encryption algorithm corresponding to the encryption strength to obtain encrypted monitoring information, wherein the encrypted monitoring information comprises a mark corresponding to the type of the monitoring information;
s64, the acquisition device generates a splitting factor according to the original splitting factor and the splitting factor updating rule; splitting the encrypted monitoring information through a splitting factor and a splitting rule to obtain splitting information;
s65, selecting a corresponding superposition encryption routing path by the acquisition device according to the type of the monitoring information;
the significance of the set superposed encryption route is that the split information is subjected to route superposed encryption transmission according to different route paths, and the transmission safety is ensured. The encryption algorithm in this step is not limited. The superposition encryption is to encrypt each relay node once, and the next relay node encrypts the encryption result of the previous relay node again. Specifically, when there are a plurality of acquisition devices, another detection device may be selected as the relay node.
S66, the acquisition device performs routing superposition encryption on the split information according to different routing paths through the superposition encryption routing path selected in the step S65 and transmits the split information to a second server;
s67, the second server decrypts the received information sent in the step S66 through the superposition encryption routing path to obtain split information;
s68, the second server generates a splitting factor through the original splitting factor and the splitting factor updating rule, and recovers the splitting information through the splitting factor and the splitting rule to obtain encrypted monitoring information;
s69, the second server analyzes the mark number corresponding to the type of the monitoring information from the encrypted monitoring information, and selects a decryption algorithm with the encryption strength corresponding to the type of the monitoring information to decrypt the monitoring information to obtain the monitoring information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
the monitoring information of the bridge in the step S1 includes: deformation information, traffic flow information, and metal fatigue information.
In the method for remotely sending the bridge tunnel monitoring information based on the internet of things,
in the step S54, the acquiring, by the first server, the firmware corresponding to the acquisition device and issuing the firmware to the corresponding acquisition device when matching includes:
when the firmware is matched with the firmware, the first server acquires the firmware corresponding to the acquisition device, generates a corresponding survival time limit of the firmware, and issues the firmware and the corresponding survival time limit of the firmware to the corresponding acquisition device;
accordingly, in step S55, after the firmware is installed in the collecting device, the monitoring information is sent to the user terminal in the NFC manner within the life time corresponding to the firmware.
The beneficial technical effects are as follows: compared with the prior art, the method for remotely sending the bridge tunnel monitoring information based on the Internet of things can realize the following steps: selecting a sending mode corresponding to the monitoring information according to the sending mode through the acquisition device; when the user terminal belongs to the first sending mode, the acquisition device verifies the identity of the user terminal and then sends monitoring information, and the process is finished; when the monitoring information belongs to the second sending mode, the acquisition device selects an encryption mode of the information according to the corresponding safety level information, processes the monitoring information, sends the processed monitoring information to the second server, and ends; the method and the device can distinguish the types of the monitoring information, select different information sending modes and encryption modes, and ensure the safety of the monitoring information of the bridge and the tunnel in the transmission process.
It is understood that various other changes and modifications may be made by those skilled in the art based on the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the claims of the present invention.

Claims (5)

1. A bridge tunnel monitoring information remote sending method based on the Internet of things is characterized by comprising the following steps:
s0, configuring the firmware of different bridges and tunnel acquisition devices and corresponding firmware codes in the first server; configuring firmware issuing activation conditions, and establishing a mapping relation among the acquisition device, the firmware codes and the firmware issuing activation conditions; the firmware is used for loading in the acquisition device and is used as a data reading interface of an encryption area in the acquisition device;
s1, configuring the types and attributes of the bridge and tunnel monitoring information in the second server, configuring the safety level information corresponding to the monitoring information according to the types of the monitoring information, and configuring the sending mode and sending cycle corresponding to the monitoring information according to the attributes of the monitoring information; synchronizing the safety level information, the sending mode and the sending period corresponding to the monitoring information to the corresponding acquisition device;
s2, configuring a corresponding mobile terminal cluster according to the position information of the acquisition device;
s3, the acquisition device monitors the bridge and the tunnel to obtain monitoring information, stores the monitoring information in an encryption area of the acquisition device, judges whether the monitoring of the monitoring information reaches a sending period, and jumps to the step S4 when the sending period is reached;
s4, selecting a sending mode corresponding to the monitoring information by the acquisition device according to the sending mode; if the transmission mode belongs to the first transmission mode, jumping to step S5; if the transmission mode belongs to the second transmission mode, jumping to step S6;
s5, the acquisition device verifies the user terminal, and after the verification is passed, the acquisition device sends acquisition device information to the user terminal; the method comprises the steps that a user terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with a firmware issuing activation condition, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device during matching; the acquisition device installs and runs the corresponding firmware and sends monitoring information to the user terminal, and the process is finished;
and S6, selecting the encryption mode of the information by the acquisition device according to the corresponding security level information, processing the monitoring information, sending the processed monitoring information to the second server, and ending.
2. The method for remotely sending bridge tunnel monitoring information based on the internet of things according to claim 1, wherein the step S5 includes:
s51, the user terminal sends an identity authentication request to the second server, wherein the identity authentication request carries an identification number corresponding to the user terminal;
s52, the second server judges whether the user terminal initiating the request is in the user terminal cluster according to the corresponding identification number of the user terminal, and the second server sends the verification passing information to the acquisition device when the user terminal cluster is in the user terminal cluster; the acquisition device confirms that the user passes the verification according to the verification passing information and sends acquisition device information to the user terminal;
s53, the second server generates an authorization instruction with a term according to the sending period and sends the authorization instruction to the user terminal; the user terminal sends the authorization instruction to the acquisition device in an NFC mode; the acquisition device verifies the authorization instruction, and the step goes to step S54 after the authorization instruction passes the verification;
s54, the mobile terminal sends an activation request to a first server, the activation request carries information of a corresponding acquisition device, the first server judges whether the activation request is matched with activation conditions of firmware issuing, and the first server acquires the firmware corresponding to the acquisition device and issues the firmware to the corresponding acquisition device when the activation request is matched with the activation conditions of the firmware issuing;
and S55, the acquisition device sends the monitoring information to the user terminal in an NFC mode.
3. The method for remotely sending bridge tunnel monitoring information based on the internet of things according to claim 1, wherein the step S6 includes:
s61, configuring a superposition encryption routing path and an information splitting table remotely sent by monitoring information in a second server, wherein the information splitting table comprises an original splitting factor, a splitting factor updating rule and a splitting rule; updating the original splitting factor, the splitting factor updating rule, the superposition encryption routing path and the splitting rule to the acquisition device in a offline mode; monitoring information of different types corresponds to different superposed encrypted routing paths, and the superposed encrypted routing paths are used for carrying out routing superposed encrypted transmission on split information according to different routing paths;
s62, the acquisition device determines an encryption algorithm of the encryption intensity corresponding to the monitoring information according to the security level information corresponding to the monitoring information;
s63, the acquisition device encrypts the monitoring information through an encryption algorithm corresponding to the encryption strength to obtain encrypted monitoring information, wherein the encrypted monitoring information comprises a mark corresponding to the type of the monitoring information;
s64, the acquisition device generates a splitting factor according to the original splitting factor and the splitting factor updating rule; splitting the encrypted monitoring information through a splitting factor and a splitting rule to obtain splitting information;
s65, selecting a corresponding superposition encryption routing path by the acquisition device according to the type of the monitoring information;
s66, the acquisition device performs routing superposition encryption on the split information according to different routing paths through the superposition encryption routing path selected in the step S65 and transmits the split information to the second server;
s67, the second server decrypts the received information sent in the step S66 through the superposition encryption routing path to obtain split information;
s68, the second server generates a splitting factor through the original splitting factor and the splitting factor updating rule, and recovers the splitting information through the splitting factor and the splitting rule to obtain encrypted monitoring information;
s69, the second server analyzes the mark number corresponding to the type of the monitoring information from the encrypted monitoring information, and selects a decryption algorithm with the encryption strength corresponding to the type of the monitoring information to decrypt the decrypted monitoring information to obtain the monitoring information.
4. The method for remotely sending bridge tunnel monitoring information based on the Internet of things according to claim 1,
the monitoring information of the bridge in the step S1 includes: deformation information, traffic flow information, and metal fatigue information.
5. The method for remotely sending bridge tunnel monitoring information based on the Internet of things according to claim 2,
in the step S54, the acquiring, by the first server, the firmware corresponding to the acquisition device and issuing the firmware to the corresponding acquisition device when matching includes:
when the firmware is matched with the firmware, the first server acquires the firmware corresponding to the acquisition device, generates a corresponding survival time limit of the firmware, and issues the firmware and the corresponding survival time limit of the firmware to the corresponding acquisition device;
accordingly, in step S55, after the firmware is installed in the collecting device, the monitoring information is sent to the user terminal in the NFC manner within the life time corresponding to the firmware.
CN201810424954.3A 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things Active CN108712405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810424954.3A CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810424954.3A CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Publications (2)

Publication Number Publication Date
CN108712405A CN108712405A (en) 2018-10-26
CN108712405B true CN108712405B (en) 2020-11-24

Family

ID=63867943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810424954.3A Active CN108712405B (en) 2018-05-07 2018-05-07 Bridge tunnel monitoring information remote sending method based on Internet of things

Country Status (1)

Country Link
CN (1) CN108712405B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848059A (en) * 2018-05-08 2018-11-20 武汉康慧然信息技术咨询有限公司 Bridge monitoring methods

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101884964A (en) * 2010-03-26 2010-11-17 中豪国业(北京)科技有限公司 Control system of spraying device of open coal car
EP2775418A1 (en) * 2013-03-08 2014-09-10 Igt Multi-tiered static chain of trust
CN104897195A (en) * 2014-09-26 2015-09-09 安徽金培因科技有限公司 Bridge safety condition detector

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8572271B2 (en) * 2009-01-29 2013-10-29 Qualcomm Incorporated Multimedia management system for seamless multimedia content mobility

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101884964A (en) * 2010-03-26 2010-11-17 中豪国业(北京)科技有限公司 Control system of spraying device of open coal car
EP2775418A1 (en) * 2013-03-08 2014-09-10 Igt Multi-tiered static chain of trust
CN104897195A (en) * 2014-09-26 2015-09-09 安徽金培因科技有限公司 Bridge safety condition detector

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"结构状态监测的通用型小型化系统研制与开发";余雷;《中国优秀硕士学位论文全文数据库 信息科技辑》;20091231(第6期);全文 *

Also Published As

Publication number Publication date
CN108712405A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN109901533B (en) Method and apparatus for use in a process control system
CN112260995A (en) Access authentication method, device and server
TWI679556B (en) Transaction method, device and system for virtual reality environment
EP2899666B1 (en) Policy-based secure communication with automatic key management for industrial control and automation systems
CN105684482A (en) Method of establishing a trusted identity for an agent device
US20150236903A1 (en) Information setting device, information setting method, non-transitory computer-readable storage medium, and wireless communication system
CN112446985A (en) Intelligent door lock unlocking method and device
KR100796525B1 (en) System for sharing Subscriber Indentification Module information of mobile communication terminal and control method thereof
CN112104460A (en) Method for encrypting and decrypting algorithm of asymmetric dynamic token
CN110691358B (en) Access control system based on attribute cryptosystem in wireless sensor network
CN106416187B (en) Use the network node safety of short range communication
CN108712405B (en) Bridge tunnel monitoring information remote sending method based on Internet of things
CN113613227B (en) Data transmission method and device of Bluetooth equipment, storage medium and electronic device
CN110198538B (en) Method and device for obtaining equipment identifier
CN102759977A (en) Wireless power supply control system and control method
CN105071939A (en) User information authentication method and user information authentication system
JP2019057867A (en) Encryption communication system
CN108932619B (en) Terminal offline charging service method and system
JP6056467B2 (en) Wireless terminal and wireless communication device
CN110381505B (en) Method and device for accessing network hard disk video recorder
KR102073363B1 (en) Secure communication device for enhancing security of industrial control system
CN112488872A (en) Electric power operation data monitoring system
CN111917775B (en) Unit control method, air conditioning unit system and storage medium
CN108848059A (en) Bridge monitoring methods
CN108901023B (en) Method and system for sharing WiFi among Internet of things devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200825

Address after: No.2, 30 / F, unit 1, building G2, Shuian Xingcheng, No.2, Xudong 2nd Road, xujiapeng street, Wuchang District, Wuhan City, Hubei Province

Applicant after: Tan Shizhong

Address before: 430000 Wuhan Donghu New Technological Development Zone, Hubei Province, Guannan Science and Technology Industrial Park, Phase I, Level 3, Unit 21, No. 9 (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348)

Applicant before: WUHAN KANGHUIRAN INFORMATION TECHNOLOGY CONSULTING Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201111

Address after: 420 Zhenda Road, Baoshan District, Shanghai 201900

Applicant after: SHANGHAI INSTITUTE OF GEOLOGICAL PROSPECTING TECHNOLOGY

Address before: No.2, 30 / F, unit 1, building G2, Shuian Xingcheng, No.2, Xudong 2nd Road, xujiapeng street, Wuchang District, Wuhan City, Hubei Province

Applicant before: Tan Shizhong