CN110135531A - Components tamper identifies monitoring method, apparatus and system - Google Patents
Components tamper identifies monitoring method, apparatus and system Download PDFInfo
- Publication number
- CN110135531A CN110135531A CN201910276449.3A CN201910276449A CN110135531A CN 110135531 A CN110135531 A CN 110135531A CN 201910276449 A CN201910276449 A CN 201910276449A CN 110135531 A CN110135531 A CN 110135531A
- Authority
- CN
- China
- Prior art keywords
- components
- tamper
- identification
- alarm
- electronic tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The present invention provides a kind of components tamper identification monitoring method, apparatus and system.Components are equipped with several electronic tags in target device, the described method includes: judge whether the quantity of the electronic tag in the target device consistent with preset quantity, judges electronic tag and whether have exception record, judge the distance feature value of electronic tag whether within the set threshold range, judge whether there is the record of member replacing corresponding to abnormal electronic tag, and judge whether the accessory replaced meets COM code.The device of the system and tamper identification that are constructed by the logical combination of the above Rule of judgment, can be realized the identification and monitoring that tamper is carried out to target device.The present invention effectively can be identified and be monitored to the tamper of equipment, be suitable for the applications such as equipment security.
Description
Technical field
The present invention relates to information technology fields, and in particular, to a kind of components tamper identification monitoring method, zero a kind of
Part tamper identifies monitoring device and a kind of components tamper identification monitoring system.
Background technique
With the fast development of engineering construction, the device requirement amount of engineering machinery class is increasing, and the market of each manufacturer is set
Standby ownership is gradually increased, and current major engineering machinery class equipment manufacturer is increasingly stringent to the management requirement of standby accessory, and standby
Accessory does not have special unified management and certification authority, to prevent user from arbitrarily buying and replacing unauthorized standby accessory to whole
Machine system causes chance failure and accident and reduced service life etc., the tamper of a set of economic and practical product key components and parts
The system and device of identification and monitoring seem very necessary, effective guarantee equipment manufacturer to product lifecycle quality,
To life appraisal monitoring and the operation of after-market product and service condition tracking and safety supervision, it is more conducive to new product optimization and rises
Grade and the O&M efficiency for improving consumer products.
Existing tamper identification technology all uses active electronic label substantially, identifies the label by card reader and communication module
Integrality, it is imperfect, by display module alarm and by control solenoid valve remotely stop, electronic tag installation adapt to model
It encloses very narrow, is only suitable for the mounting structure with external screw, identify simple with early warning mechanism, be easily removed and distort, long-range control
Reliability it is low.In addition to this, existing electronic label identification technology there is problems:
1) identification technology is not perfect, and the identification of accessory is anti-fake in the prior art uses Radio Frequency Identification Technology, and complete machine supervision makes
With IC card identification technology, and the description of anti-fake aspect is only done in the identification of existing accessory, but do not prevent electronic tag on source
It tears open and does technical research, label verification scheme is simple, a possibility that being tampered and replicate, cannot achieve tamper antiforge function;And
The active identification monitoring system of active electronic tag and IC card type is also easy the interference of the energy consumption and environment by itself, Hou Zheshi
Electronic type data automatic identification card technique is easily replicated;Active electronic label needs external power supply, and service life is short, and simple electricity
Subtab is easily lost and destroys, and fundamentally loses tamper recognition reaction;
2) adaptability and poor reliability in bad working environments environment be easy to cause active cassette pedestal to damage, directly contribute prison
Control Module Fail;When removing the device monitoring pedestal will be unable to realize that whether equipment Restoration monitoring can not also be fed back and existed in place
Line.Additionally there are security hole, IC card is easy to be replicated, no actual time safety verification scheme;Active label external is led
Line is easily damaged, and device reliability is low, and wrong report possibility is high, and electronic tag installation form described in CN201511021920
Application range is relatively limited to;
3) verification scheme is simple, using the anti-fake to accessory of radio frequency identification radiation signatures, but not to electronic tag tamper
It is described, and electronic tag is distorted, anti-fake reliability is not also high if removing or replicating, and only verifies in chip-scale, not
Multiple check, including mechanism is remotely reviewed, it is local and remote without display and retrospect;In existing invention such as CN201511021920 and
CN201620065193.3 only has long-distance management system;And CN201110132230.X only has internal tamper-evident verifying, without long-range school
It tests and is described with tamper, the above invention supports identification and control without airborne mobile background management system, also without multiple check
And early warning mechanism;
4) hardware for needing the components information of product that after-sales staff is needed just to understand product long-term follow user equipment at present
Status, it is online to manage and monitor that the manufacturer of construction machinery product temporarily uses wireless recognition technique or method without device and system
The key components and parts of complete machine;
5) without effective monitoring device, so that user uses after can arbitrarily replacing market part as accessory, without tamper
With ensure that accessory etc. to the guaranteed reliability of complete machine, may influence complete machine service performance and service life.
Summary of the invention
The purpose of the present invention is being used cooperatively for the identification monitoring method of a variety of electronic tags, to solve at least single prison
Limitation caused by index is controlled, while the different alarm of rank can be generated, while can be arranged according to the seriousness of alarm
It is identified in proximal end and identifies and review with verification and remote port monitoring, it is ensured that the safe tamper of complete machine key component, guarantee overall performance
With the controllable and sustainability of after-sales service maintenance.
To achieve the goals above, in first aspect present invention, a kind of components tamper identification monitoring method, target are provided
Components are equipped with several electronic tags in equipment, which comprises
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, turn
To step S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If without exception
Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If in given threshold range
It is interior, then go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is deposited
It is then performing the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step
S7);If meeting, perform the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
Optionally, step S2) described in exception record include: power down record and power-off record.
Optionally, step S3) in whether within the set threshold range judge the distance feature value of electronic tag, comprising:
The distance between obtain the electronic tag by RSSI telemetry and read point,
The distance is compared with the given threshold range.
Optionally, step S5), judge whether the accessory of replacement meets COM code, comprising:
It is sent according to the COM code of the accessory of the replacement and verifies request;
Determine whether the accessory of the replacement meets COM code according to the response for verifying request.
Optionally, step S6) in, recognition result be " normal " after, further includes: by the recognition result carry out record with
Push.
Optionally, step S7) in, after end of identification, further includes: accuse the recognition result, the first alarm, second
The alarm of alert or third is shown or is reminded.
Optionally, first alarm, the second alarm and third alarm are belonging respectively to different alarm levels.
Optionally, the different alarm level also corresponds to different important levels, the different important level packet
Include different counter-measures and different display modes or alerting pattern.
In the second aspect of the present invention, a kind of components tamper identification monitoring device is also provided, described device is configured as
Monitoring method is identified using components tamper above-mentioned to monitor identification target device.
In the third aspect of the present invention, a kind of components tamper identification monitoring system is also provided, including such as aforementioned components
Tamper identifies monitoring device.
Optionally, the system also includes:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;
The electronic tag includes chip and built-in antenna, and the electronic tag is configured as being mounted on key components and parts
To identify its target object;There is unique coding in the chip;
The reader includes that radio-frequency module, control processing module and antenna, the reader are configured as described in reading
Information in electronic tag.
Optionally, the radio frequency identification subsystem passes through CAN middleware phase with components tamper identification monitoring device
Even.
Optionally, the system also includes self-test management system, the self-test management system is used for: receiving the components
The recognition result of tamper identification monitoring system, or receive it is described first alarm, second alarm and third alarm, and in conjunction with it is described from
The judging result of other subsystems judges whether System self-test passes through in inspection management system.
Optionally, the system also includes: long-range material management system, the long-range material management system are configured as:
The verification request that the components tamper identification monitoring device is sent is received, and makes response;The wherein verification
Request is sent according to the COM code of the accessory of the replacement.
Optionally, the long-range material management system is also configured to
The upload information of the self-test management system and/or components tamper identification monitoring device is received and stored, and right
The information is analyzed and is monitored.
In the fourth aspect of the present invention, a kind of machine readable storage medium is also provided, on the machine readable storage medium
It is stored with instruction, which enables to the controller to execute components tamper identification prison above-mentioned when being executed by a controller
Prosecutor method.
Components tamper provided by the invention identifies monitoring method, has the advantage that
The identification monitoring method of a variety of electronic tags is used cooperatively, and is considered the target that electronic tag is monitored comprehensively and is set
The standby exception being likely to occur avoids limitation caused by single aspect monitoring, while can be produced according to the seriousness of alarm
The different alarm of raw rank, while proximal end identification can be set and monitor identification with verification and remote port and review, it is ensured that complete machine
The safe tamper of key component ensures the controllable and sustainability of overall performance and after-sales service maintenance.
Other features and advantages of the present invention will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is to further understand for providing to embodiment of the present invention, and constitute part of specification, with
Following specific embodiment is used to explain the present invention embodiment together, but does not constitute the limit to embodiment of the present invention
System.In the accompanying drawings:
Fig. 1 is the step flow chart for the components tamper identification monitoring method that one embodiment of the present invention provides;
Fig. 2 is the specific embodiment in the components tamper identification monitoring method that one embodiment of the present invention provides
Logical schematic;
Fig. 3 is the structural schematic diagram for the components tamper identification monitoring system that one embodiment of the present invention provides;
Fig. 4 is the hard of the specific embodiment for the components tamper identification monitoring system that one embodiment of the present invention provides
Part device figure.
Specific embodiment
Below in conjunction with attached drawing, detailed description of the preferred embodiments.It should be understood that this place is retouched
The specific embodiment stated is merely to illustrate and explain the present invention, and is not intended to restrict the invention.
In embodiments of the present invention, in the absence of explanation to the contrary, the noun of locality used such as " upper and lower, top, bottom "
Usually for direction shown in the drawings either for it is vertical, vertically or on gravity direction for each component it is mutual
Positional relationship describes word.
Fig. 1 is the step flow chart for the components tamper identification monitoring method that one embodiment of the present invention provides, such as Fig. 1
Shown, a kind of components tamper identifies monitoring method, and components are equipped with several electronic tags and (do not show in figure in target device
Out), the method also includes:
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, turn
To step S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If without exception
Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If in given threshold range
It is interior, then go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is deposited
It is then performing the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step
S7);If meeting, perform the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
In this way, the embodiment of the invention can not only key component corresponding to recognition detection electronic tag whether
Line, moreover it is possible to identify whether it is in place, meanwhile, it is capable to pass through the position of complete machine key components and parts, member replacing and accessory replace extremely
Three aspects are changed to identify situation online and in place.Pass through the quantity of detection electronic tag, exception record and distance feature value three
Aspect detects the abnormal conditions of electronic tag, considers the exception that the target device that electronic tag is monitored is likely to occur comprehensively,
Limitation caused by single aspect monitoring is avoided, while the different alarm of rank can be generated according to the seriousness of alarm,
Proximal end identification can be arranged in simultaneously to monitor identification with verification and remote port and review, it is ensured that the safe tamper of complete machine key component,
Ensure the controllable and sustainability of overall performance and after-sales service maintenance.
Specifically, the embodiment of the invention first determines whether the quantity of electronic tag is correct, ensure that electronics mark
Label be not removed or power off, when detecting that number is incorrect, it is also possible to be that electronic tag itself there is a problem, need into
Row further judge with determine scene it can happen that.Even but it is exactly just that quantity, which not can guarantee equipment correctly, yet
Normal, therefore be also required to further judge.Judge whether electronic tag has exception record again, exception record herein includes power down
Record and power-off record, because exception record occurs in the electronic tag at key component, it is more likely that occur at the key component remarkable
For disassembly or destruction, but the disassembly it could also be possible that our company maintenance personnel carry out part replacement when it is caused, therefore
It needs further mutually to check with the record of putting on record of member replacing record herein, is otherwise easy to produce and accidentally alerts.Further, even if
The electronic tag for inquiring the exception or missing has corresponding member replacing to record, and also not can guarantee the member replacing is to close rule
, it would therefore be desirable to further further be checked the COM code of the accessory of replacement.Verification herein may be this
The method of ground database check, it is also possible to which the verification of long-range handling of goods and materials database, client changes part privately in order to prevent, herein
Long-range handling of goods and materials database the manufacturer of equipment is set mostly.Herein after COM code is checked successfully, I
Think system recognition result be " normal ".
When in preceding step number detection and exception record verify all there is no problem when, also need further detect judgement electricity
The distance feature value of subtab whether within the set threshold range, i.e., whether at it at the key component that is monitored of identification electronic tag
Position when factory mainly prevents key component to be shifted, is specifically described in detail apart from detecting step below herein.When herein
When distance identification is not detected abnormal, it is believed that the recognition result of system is " normal ".
Embodiment of above considers the majority of case at scene, can effectively prevent the disassembly privately of equipment, and can lead to
It crosses multiple condition filter accidentally to alert, the situation at true reduction scene.
In a kind of optional embodiment provided by the invention, step S3) in judge the distance feature value of electronic tag
Whether sub-step within the set threshold range are as follows:
The distance between obtain the electronic tag by RSSI telemetry and read point, by the distance and the setting
Threshold range compares.Its specific method are as follows:
The distance of the electronic tag identifies and judges, and the present invention uses the particular technique of positioning distance measuring, before factory
Reader is to the distance di of electronic tag i, and wherein i is less than or equal to N, and N is the total quantity of identification and monitoring key component, and Di (d0) is
Radio frequency system identification distance and range, the key component in identification range show it is online and in place, meanwhile, Photographing On-line label
Unremovable effect, i.e., if removing or cutting short means that route can not be again coupled to, the tag defeat.Wherein label ranging side
Method, as described herein.More based on wireless distance finding method, ranging technology has signal strength to indicate RSSI, RSSI telemetry letter
It is single, it is low in cost.The present invention is realized using RSSI mainly utilizes signal decaying and propagation model apart from party's rule.Calculation formula
Are as follows:
Distance on the basis of d0, P (d0) are benchmark signal strength, and P (d) is blind spot signal strength, d be basic point and blind spot away from
From β is attenuation coefficient, general value 2-4, XσFor gaussian random noise variable.
Further, judge whether the accessory of replacement meets the sub-step of COM code are as follows:
It is sent according to the COM code of the accessory of the replacement and verifies request;According to the response for verifying request to determine more
Whether the accessory changed meets COM code.As previously mentioned, verification herein may be the method for local data base verification, it is also possible to
It is the verification of long-range handling of goods and materials database, client changes part privately in order to prevent, and long-range handling of goods and materials database herein is most
The manufacturer of equipment is set.When being checked if it is long-range handling of goods and materials database, long range radio transmissions mould is needed
Block, such as GPRS, 4G or 5G.The long range radio transmissions module can use NB-IOT, be needed at this time through platform of internet of things, will
It verifies request and is sent to long-range long-range material management system progress remote verification.
Further, step S6) in recognition result be " normal " after, further include the recognition result is carried out record with
The step of push.After exporting " normal " in present embodiment, target device is represent after the identification of present embodiment,
Through passing through.But the target device also needs the verification of other check system, just can enter normal open state, therefore herein
It needs that the recognition result of present embodiment is recorded and pushed, so that other subsystem carries out verification cooperation and collaboration inspection
It surveys.
It further include by institute after the end of identification of step S7) in a kind of optional embodiment provided by the invention
It states recognition result or the first alarm or the second alarm or third alerts the step of being shown or being reminded.Display herein is mainly
Recognition result is shown in airborne proximal end system and/or remote monitoring system, it being capable of real-time acquisition system for system operator
Tamper identify situation.Alarm is further verified and handled simultaneously.
Further, first alarm, the second alarm and third alarm are belonging respectively to different alarm levels.For example,
First alarm, the second alarm and third alarm are belonging respectively to level-one alarm, secondary alarm and three-level alarm.Alert level herein
It is other to divide primarily to each level security rank is incremented by, it is ensured that complete machine key components and parts are supervised and protected, main
For also corresponding to different alarm levels to different important levels, the different important level includes that different replies is arranged
It applies and different display modes or alerting pattern.Such as: primary alarm is only to report, and second-level alarm needs to export result
To airborne display and remote supervisory display system, and three-level alarm is then needed to export to proximal end display system and remote supervisory and be shown
The service of goods administrative office of system reminds and pushes and informs nearest attendant.In the system when Airborne GPS terminal antenna,
When communication line card, external power supply and electronic tag are removed, equipment can not be shown by self-test and automatic lock machine, and in system information
Show prompt correlated condition alarm in interface, the abnormality alarm of three grades is simultaneously displayed on airborne proximal end display system and long-range prison
In pipe display system, while three grades alarm will push nearest after-sale service palm client by remote port, wherein third
Grade alarm is artificially to distort and remove, and after-sales staff needs scene tracking to ensure complete machine after-sale service, verifies whole set equipment comprehensively
Safety.
The explanation of integrality is carried out to one embodiment of the present invention below by way of attached drawing 2.Fig. 2 is a kind of reality of the present invention
The logical schematic for the specific embodiment in components tamper identification monitoring method that the mode of applying provides;As shown in Fig. 2, this reality
Apply mode is initially that airborne system powers on, if airborne system powers on the reader scanning airborne electronic equipment mark of rear radio-frequency recognition system
Sign quantity n, the number of labels n after verification scanning, if equal with initial number N.If equal, anti-demoulding is called in next step
Block, verification historical data whether there is exception record, and if it exists with the presence or absence of replacement accessory record, otherwise exception record then verifies
It scans and determines card reader to the distance di of electronic tag i, wherein whether i≤N, checking distance are less than Di, then continue to call in this way
Otherwise airborne proximal end self-checking system verification, output verification result are such as sent out to output display system, other selftest modules of normal call
Send abnormal 1 grade of alarm;Quantity is not reciprocity after such as scanning and has power down sequence to record there are electronic tag and replacement accessory is not present
Record data, then it is assumed that electronic tag is artificially removed or faults itself, sends abnormal 2 grades of alarms, and output results to airborne
Display and remote supervisory display system;If number of scans is unequal, checks and is recorded in system record with the presence or absence of replacement accessory,
It replaced then to verify by long-range material management system and request and response occurs, whether verification meets COM code.By long-range
Material management system verifies whether the coding is coding after inventory's outbound, is the key component management database that proximal end is written,
The systems such as normal startup separator diagnosis simultaneously, normal boot-strap.Otherwise abnormal 3 grades of alarms are sent, and output results to airborne display
With remote supervisory display system, and show that the system is tampered or removes.Three-level alarm is by proximal end display system and sends remote
Journey supervises the service of goods administrative office of display system, reminds and pushes and informs nearest attendant.
In a kind of embodiment provided by the invention, a kind of components tamper identification monitoring device, the dress are also disclosed
It sets and is configured as components tamper identification monitoring method above-mentioned to monitor identification target device.Device herein has numerical value meter
It calculates and the function of logical operation, at least there is the central processor CPU of data-handling capacity, random access memory ram, read-only deposit
Reservoir ROM, a variety of I/O mouthfuls and interruption systems etc..The data processing module can be, for example, single-chip microcontroller, chip or processor etc.
Usual hardware is exactly intelligent terminal or the processor of PC in the case where more often using.
In another embodiment provided by the invention, a kind of components tamper identification monitoring system is also disclosed, until
It less include that aforementioned components tamper identifies monitoring device.
Further, the scanning of the electronic tag in system above needs independent subsystem to be implemented, therefore, described
System further include:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;The electricity
Subtab includes chip and built-in antenna, is configured as being attached on key components and parts to identify its target object;The chip
It is interior that there is unique coding;The reader includes radio-frequency module, control processing module and antenna, is configured as reading the electricity
Information in subtab.
The radio frequency identification subsystem is connected with components tamper identification monitoring device by CAN middleware.Herein
CAN middleware the function of CAN bus is mainly provided, so that multiple devices are carried out data transmission by bus, while in the CAN
Between part possibly also with the function of emergency service, need to increase power storage cell at this time to provide emergency service.
Further, the system also includes self-test management system, the self-test management system receives the components
The recognition result of tamper identification monitoring system or alarm, and in conjunction with the judging result of other subsystems in the self-test management system
Judge whether System self-test passes through.Components tamper identification monitoring system herein is a subsystem of self-test management system
System, the self-test management system are mainly completed the storage of data information, are managed and controlled.Other subsystems herein specifically include that
For electricity detecting system, equipment original state acquisition system and environmental parameter system etc..
Further, the system also includes: long-range material management system, the long-range material management system are configured
For;The verification request that the components tamper identification monitoring device is sent is received, and makes response;The verification request is basis
What the COM code of the accessory of the replacement was sent.Further, the long-range material management system is also configured to receive
And the upload information of the self-test management system and/or components tamper identification monitoring device is stored, and analyzed and monitored.
Long-range material management system at this time has the function of cloud platform, complete machine key components and parts can exist online
Position situation and the doubtful monitor supervision platform removed abnormity early warning information and be uploaded to network operator by network, facilitate network operator to monitor in real time
Complete machine state and service life monitoring, and can assess in the service life scientifically and accurately to each components of complete machine, to user malfunction
Pre-process and the service life reminds.
Fig. 3 is the structural schematic diagram for the components tamper identification monitoring system that one embodiment of the present invention provides, such as attached
Shown in Fig. 3, the components tamper identification monitoring system of a complete function can be made of following five parts: radio frequency identification
System, CAN middleware, components tamper identification monitoring device, self-test management system and long-range material management system.
Wherein radio frequency identification subsystem is used for the electronic label identification and reading of proximal end, and components tamper identifies monitoring device
Tamper for carrying out equipment using method above-mentioned identifies monitoring, and described, CAN middleware is for connecting radio frequency identification
System and components tamper identify monitoring device.The self-test management system is used to complete the self-test of equipment, long-range handling of goods and materials
System monitors for realizing the cloud of equipment.
The system covers proximally and distally, effectively realizes initial survey and reinspection, it is ensured that the key components and parts material of complete machine range
Anti- dismounting and the safety without replacement.
The explanation of integrality is carried out to one embodiment of the present invention below by way of attached drawing 4.Fig. 4 is a kind of reality of the present invention
The hardware device figure of the specific embodiment for the components tamper identification monitoring system that the mode of applying provides;As shown in figure 4, above-mentioned
Radio frequency identification subsystem is 915MHz radio-frequency recognition system, described mainly including multiple special electronic tags, antenna, reader
Electronic tag is made of chip and built-in antenna, is attached on key components and parts as mark target object.Electronic tag is pacified
Position where key component mounted in construction machinery product, such as main oil pump, multi-way valve, proportioning valve, master cylinder, displacement sensing
Multiple positions such as device, hydraulic motor.Electronic tag is the data medium of system, and each electronic tag is compiled with unique electronics
Code, storage inside the relevant information of identified object, the storage information be also contained in inside long-range material management system, object
Mark is changed material after material outbound to have installed and outbound coding, stores and has dispatched from the factory after the factory of product complete machine, product coding, production date
The components informations such as phase.The method for arranging electronic tag has to withhold by the conducting wire with insulation protection and has jack in key components and parts
Place the modes such as is built on the plug of element energization and is mounted on nameplate as electronic identity identification label, described in electricity
It is that completion is withheld by connecting position of wires that subtab, which withholds line, completes chip interior chips wire and connects, and disconnecting will disconnect, only
The tool of useful attendant repairs fastener or replacement fastener, and unbuttoning will be recognized by the system, and cooperation proximal end self-test management system is real
Existing tamper purpose, connection and outer layer plastic bonding of the particular tool for label line.
The reader is the equipment for reading and writing memory information in electronic tag, based on passive reflective modulation technique and
The radio-frequency identification reader/writer of module design principle.It is mainly made of radio-frequency module, control processing module and antenna three parts,
The working frequency of radio-frequency module is 915MHz, and wireless identification distance is up to 10 meters.A kind of reader, that is, data acquisition equipment,
It whether there is what the multiple anti-demolition electronic tags in front end were included, existing location information and data time series, by CAN
Between part pass to the management system controller of self-test containing proximal end.The background system of system is by proximal end self-checking system and far-end material pipe
System Take is managed, data exchange with management proximal end is completed by system bus middleware, and distal end connection is passed by long distance wireless
It is defeated, it is completed as GPRS network connects.Wherein reader is attached by the controller of middleware and machine control system, airborne
Self-test management system in proximal end is completed the storage of data information, is managed and controlled.Far-end material management system realizes COM code
Data identification and reinspection.
In one embodiment of the invention, a kind of machine readable storage medium, the machine readable storage are also provided
Instruction is stored on medium, which enables to the controller to execute components tamper above-mentioned when being executed by a controller
Identify monitoring method.
Above-mentioned technical proposal of the present invention can be suitable for wider application, and can effectively the tamper to equipment carry out
Identification and monitoring.
Optional embodiment of the invention, still, embodiment of the present invention and unlimited is described in detail in conjunction with attached drawing above
Detail in above embodiment can be implemented the present invention in the range of the technology design of embodiment of the present invention
The technical solution of mode carries out a variety of simple variants, these simple variants belong to the protection scope of embodiment of the present invention.
It is further to note that specific technical features described in the above specific embodiments, in not lance
In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, embodiment of the present invention
To various combinations of possible ways, no further explanation will be given.
It can be with it will be appreciated by those skilled in the art that realizing that all or part of the steps in the method for above embodiment is
Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make
Obtain all or part of step that single-chip microcontroller, chip or processor (processor) execute each embodiment the method for the present invention
Suddenly.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random
The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
In addition, various embodiments of the present invention can be combined randomly, as long as it is without prejudice to originally
The thought of invention embodiment equally should be considered as embodiment of the present invention disclosure of that.
Claims (16)
1. a kind of components tamper identifies monitoring method, components are equipped with several electronic tags in target device, and feature exists
In the described method comprises the following steps:
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, step is gone to
Rapid S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If note without exception
Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If within the set threshold range,
Go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is existing,
It then performs the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step S7);If
Meet, then performs the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
2. the method according to claim 1, wherein step S2) in, the exception record includes: power down record
It is recorded with power-off.
3. the method according to claim 1, wherein step S3) in, judge the distance feature of the electronic tag
Within the set threshold range whether value, comprising:
The distance between obtain the electronic tag by RSSI telemetry and read point;
The distance is compared with the given threshold range.
4. the method according to claim 1, wherein step S5) in, judge whether the accessory of replacement meets material
Coding, comprising:
It is sent according to the COM code of the accessory of the replacement and verifies request;
Determine whether the accessory of the replacement meets COM code according to the response for verifying request.
5. the method according to claim 1, wherein step S6) in, determine recognition result be " normal " it
Afterwards, further includes: the recognition result is recorded and pushed.
6. the method according to claim 1, wherein step S7) in, after end of identification, further includes: by institute
Recognition result, the first alarm, the second alarm or third alarm is stated to be shown or reminded.
7. according to the method described in claim 6, it is characterized in that, first alarm, the second alarm and third alarm difference
Belong to different alarm levels.
8. the method according to the description of claim 7 is characterized in that the different alarm level correspond to it is different important etc.
Grade, the different important level have different counter-measures and different display modes or alerting pattern.
9. a kind of components tamper identifies monitoring device, which is characterized in that described device is configured as using in claim 1-8
Described in any item components tampers identify monitoring methods to monitor identification target device.
10. a kind of components tamper identification monitoring system, which is characterized in that the system includes that components described in claim 9 are anti-
Tear identification monitoring device open.
11. system according to claim 10, which is characterized in that the system also includes:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;
The electronic tag includes chip and built-in antenna, and the electronic tag is configured as being mounted on key components and parts to mark
Know its target object;There is unique coding in the chip;
The reader includes that radio-frequency module, control processing module and antenna, the reader are configured as reading the electronics
Information in label.
12. system according to claim 11, which is characterized in that the radio frequency identification subsystem and the components tamper
Identify that monitoring device is connected by CAN middleware.
13. system according to claim 10, which is characterized in that the system also includes self-test management system, it is described from
Inspection management system is used for:
It receives the recognition result of the components tamper identification monitoring system, or receives first alarm, the second alarm and the
Three alarms, and judge whether System self-test passes through in conjunction with the judging result of other subsystems in the self-test management system.
14. system according to claim 13, which is characterized in that the system also includes long-range material management system, institutes
Long-range material management system is stated to be configured as:
The verification request that the components tamper identification monitoring device is sent is received, and makes response;The wherein verification request
It is to be sent according to the COM code of the accessory of the replacement.
15. system according to claim 14, which is characterized in that the long-range material management system is also configured to
The upload information of the self-test management system and/or components tamper identification monitoring device is received and stored, and to described
Information is analyzed and is monitored.
16. a kind of machine readable storage medium, which is characterized in that be stored with instruction on the machine readable storage medium, this refers to
It enables and enables to components described in any one of described controller perform claim requirement 1 to 8 anti-when being executed by a controller
Tear identification monitoring method open.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910276449.3A CN110135531A (en) | 2019-04-08 | 2019-04-08 | Components tamper identifies monitoring method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910276449.3A CN110135531A (en) | 2019-04-08 | 2019-04-08 | Components tamper identifies monitoring method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110135531A true CN110135531A (en) | 2019-08-16 |
Family
ID=67569350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910276449.3A Pending CN110135531A (en) | 2019-04-08 | 2019-04-08 | Components tamper identifies monitoring method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135531A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112700343A (en) * | 2019-10-23 | 2021-04-23 | 中国石油天然气股份有限公司 | Operation monitoring method and system based on oil gas Internet of things |
CN112699982A (en) * | 2021-01-19 | 2021-04-23 | 苗跃跃 | Efficient intelligent supervision device and use method |
CN115598064A (en) * | 2022-10-21 | 2023-01-13 | 圣名科技(广州)有限责任公司(Cn) | Data detection method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385353A (en) * | 2010-09-06 | 2012-03-21 | 朱丽萍 | Equipment status controlling method and equipment |
CN202351899U (en) * | 2011-07-21 | 2012-07-25 | 领科无线射频系统(上海)有限公司 | RFID-based automobile component tracing management system |
CN204814525U (en) * | 2015-07-31 | 2015-12-02 | 厦门医学高等专科学校 | Hospital looks into a device based on active rfid |
CN105502168A (en) * | 2015-12-30 | 2016-04-20 | 上海佩纳沙士吉打机械有限公司 | Disassembly-prevention recognition and remote stopping system for hydraulic grab and control method thereof |
CN106781171A (en) * | 2017-01-12 | 2017-05-31 | 段元文 | Alarm method and device |
-
2019
- 2019-04-08 CN CN201910276449.3A patent/CN110135531A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385353A (en) * | 2010-09-06 | 2012-03-21 | 朱丽萍 | Equipment status controlling method and equipment |
CN202351899U (en) * | 2011-07-21 | 2012-07-25 | 领科无线射频系统(上海)有限公司 | RFID-based automobile component tracing management system |
CN204814525U (en) * | 2015-07-31 | 2015-12-02 | 厦门医学高等专科学校 | Hospital looks into a device based on active rfid |
CN105502168A (en) * | 2015-12-30 | 2016-04-20 | 上海佩纳沙士吉打机械有限公司 | Disassembly-prevention recognition and remote stopping system for hydraulic grab and control method thereof |
CN106781171A (en) * | 2017-01-12 | 2017-05-31 | 段元文 | Alarm method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112700343A (en) * | 2019-10-23 | 2021-04-23 | 中国石油天然气股份有限公司 | Operation monitoring method and system based on oil gas Internet of things |
CN112699982A (en) * | 2021-01-19 | 2021-04-23 | 苗跃跃 | Efficient intelligent supervision device and use method |
CN115598064A (en) * | 2022-10-21 | 2023-01-13 | 圣名科技(广州)有限责任公司(Cn) | Data detection method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105160748B (en) | A kind of power supply station's storehouse intelligent management system and management method based on Internet of Things | |
CN102724040B (en) | Method, control device and the system of verity run counter to by testing equipment component | |
CN110135531A (en) | Components tamper identifies monitoring method, apparatus and system | |
CN201600423U (en) | Intelligent grounding wire detecting device | |
CN203616367U (en) | An anti-electricity-stealing metering cabinet | |
CN102140929A (en) | Mine safety production inspection system | |
CN108365858B (en) | Active balise monitors system | |
CN101826757A (en) | Method and device for managing earth wire | |
Sun et al. | The intelligent crude oil anti-theft system based on IoT under different scenarios | |
CN104021515A (en) | Gas cylinder safety supervision system and method | |
KR20070019509A (en) | Real-time safety patrol control system of industry plant using Radio Frequency IDentification | |
CN103592929A (en) | Internet of Things system for monitoring and managing fire water supply | |
CN106021066A (en) | Fault information detection method and electronic device | |
CN110672896A (en) | Electric meter box electricity stealing prevention system under ubiquitous internet | |
CN1963846A (en) | Electron supervisory system of secrecy-involved apparatus and supervisory method | |
CN103246251A (en) | Tool and apparatus management and monitoring system of hot-line work tool and apparatus storehouse | |
CN108408362A (en) | A kind of intelligent transportation monitoring system and monitoring method for conveyer belt | |
CN112033510A (en) | Data authenticity monitoring platform based on garbage storage and transportation process | |
CN106022403B (en) | A kind of Workshop Production overhaul of the equipments record system and method based on RFID | |
CN102546234B (en) | Solution system | |
CN202522901U (en) | Electric power metering equipment distribution and monitoring device and metering equipment distribution vehicle | |
CN107657381A (en) | Civilian explosive device security risk assessment system | |
CN201266415Y (en) | Radio frequency identification monitoring apparatus for valuable article | |
CN102855598A (en) | Fire-fighting device supervisory system based on RFID (radio frequency identification) technology | |
CN101576962B (en) | Radio frequency identification monitoring device for valuables |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190816 |