CN110135531A - Components tamper identifies monitoring method, apparatus and system - Google Patents

Components tamper identifies monitoring method, apparatus and system Download PDF

Info

Publication number
CN110135531A
CN110135531A CN201910276449.3A CN201910276449A CN110135531A CN 110135531 A CN110135531 A CN 110135531A CN 201910276449 A CN201910276449 A CN 201910276449A CN 110135531 A CN110135531 A CN 110135531A
Authority
CN
China
Prior art keywords
components
tamper
identification
alarm
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910276449.3A
Other languages
Chinese (zh)
Inventor
李淇阳
赵鑫
付新宇
郭岗
吴亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zoomlion Heavy Industry Science and Technology Co Ltd
Original Assignee
Zoomlion Heavy Industry Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zoomlion Heavy Industry Science and Technology Co Ltd filed Critical Zoomlion Heavy Industry Science and Technology Co Ltd
Priority to CN201910276449.3A priority Critical patent/CN110135531A/en
Publication of CN110135531A publication Critical patent/CN110135531A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The present invention provides a kind of components tamper identification monitoring method, apparatus and system.Components are equipped with several electronic tags in target device, the described method includes: judge whether the quantity of the electronic tag in the target device consistent with preset quantity, judges electronic tag and whether have exception record, judge the distance feature value of electronic tag whether within the set threshold range, judge whether there is the record of member replacing corresponding to abnormal electronic tag, and judge whether the accessory replaced meets COM code.The device of the system and tamper identification that are constructed by the logical combination of the above Rule of judgment, can be realized the identification and monitoring that tamper is carried out to target device.The present invention effectively can be identified and be monitored to the tamper of equipment, be suitable for the applications such as equipment security.

Description

Components tamper identifies monitoring method, apparatus and system
Technical field
The present invention relates to information technology fields, and in particular, to a kind of components tamper identification monitoring method, zero a kind of Part tamper identifies monitoring device and a kind of components tamper identification monitoring system.
Background technique
With the fast development of engineering construction, the device requirement amount of engineering machinery class is increasing, and the market of each manufacturer is set Standby ownership is gradually increased, and current major engineering machinery class equipment manufacturer is increasingly stringent to the management requirement of standby accessory, and standby Accessory does not have special unified management and certification authority, to prevent user from arbitrarily buying and replacing unauthorized standby accessory to whole Machine system causes chance failure and accident and reduced service life etc., the tamper of a set of economic and practical product key components and parts The system and device of identification and monitoring seem very necessary, effective guarantee equipment manufacturer to product lifecycle quality, To life appraisal monitoring and the operation of after-market product and service condition tracking and safety supervision, it is more conducive to new product optimization and rises Grade and the O&M efficiency for improving consumer products.
Existing tamper identification technology all uses active electronic label substantially, identifies the label by card reader and communication module Integrality, it is imperfect, by display module alarm and by control solenoid valve remotely stop, electronic tag installation adapt to model It encloses very narrow, is only suitable for the mounting structure with external screw, identify simple with early warning mechanism, be easily removed and distort, long-range control Reliability it is low.In addition to this, existing electronic label identification technology there is problems:
1) identification technology is not perfect, and the identification of accessory is anti-fake in the prior art uses Radio Frequency Identification Technology, and complete machine supervision makes With IC card identification technology, and the description of anti-fake aspect is only done in the identification of existing accessory, but do not prevent electronic tag on source It tears open and does technical research, label verification scheme is simple, a possibility that being tampered and replicate, cannot achieve tamper antiforge function;And The active identification monitoring system of active electronic tag and IC card type is also easy the interference of the energy consumption and environment by itself, Hou Zheshi Electronic type data automatic identification card technique is easily replicated;Active electronic label needs external power supply, and service life is short, and simple electricity Subtab is easily lost and destroys, and fundamentally loses tamper recognition reaction;
2) adaptability and poor reliability in bad working environments environment be easy to cause active cassette pedestal to damage, directly contribute prison Control Module Fail;When removing the device monitoring pedestal will be unable to realize that whether equipment Restoration monitoring can not also be fed back and existed in place Line.Additionally there are security hole, IC card is easy to be replicated, no actual time safety verification scheme;Active label external is led Line is easily damaged, and device reliability is low, and wrong report possibility is high, and electronic tag installation form described in CN201511021920 Application range is relatively limited to;
3) verification scheme is simple, using the anti-fake to accessory of radio frequency identification radiation signatures, but not to electronic tag tamper It is described, and electronic tag is distorted, anti-fake reliability is not also high if removing or replicating, and only verifies in chip-scale, not Multiple check, including mechanism is remotely reviewed, it is local and remote without display and retrospect;In existing invention such as CN201511021920 and CN201620065193.3 only has long-distance management system;And CN201110132230.X only has internal tamper-evident verifying, without long-range school It tests and is described with tamper, the above invention supports identification and control without airborne mobile background management system, also without multiple check And early warning mechanism;
4) hardware for needing the components information of product that after-sales staff is needed just to understand product long-term follow user equipment at present Status, it is online to manage and monitor that the manufacturer of construction machinery product temporarily uses wireless recognition technique or method without device and system The key components and parts of complete machine;
5) without effective monitoring device, so that user uses after can arbitrarily replacing market part as accessory, without tamper With ensure that accessory etc. to the guaranteed reliability of complete machine, may influence complete machine service performance and service life.
Summary of the invention
The purpose of the present invention is being used cooperatively for the identification monitoring method of a variety of electronic tags, to solve at least single prison Limitation caused by index is controlled, while the different alarm of rank can be generated, while can be arranged according to the seriousness of alarm It is identified in proximal end and identifies and review with verification and remote port monitoring, it is ensured that the safe tamper of complete machine key component, guarantee overall performance With the controllable and sustainability of after-sales service maintenance.
To achieve the goals above, in first aspect present invention, a kind of components tamper identification monitoring method, target are provided Components are equipped with several electronic tags in equipment, which comprises
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, turn To step S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If without exception Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If in given threshold range It is interior, then go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is deposited It is then performing the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step S7);If meeting, perform the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
Optionally, step S2) described in exception record include: power down record and power-off record.
Optionally, step S3) in whether within the set threshold range judge the distance feature value of electronic tag, comprising:
The distance between obtain the electronic tag by RSSI telemetry and read point,
The distance is compared with the given threshold range.
Optionally, step S5), judge whether the accessory of replacement meets COM code, comprising:
It is sent according to the COM code of the accessory of the replacement and verifies request;
Determine whether the accessory of the replacement meets COM code according to the response for verifying request.
Optionally, step S6) in, recognition result be " normal " after, further includes: by the recognition result carry out record with Push.
Optionally, step S7) in, after end of identification, further includes: accuse the recognition result, the first alarm, second The alarm of alert or third is shown or is reminded.
Optionally, first alarm, the second alarm and third alarm are belonging respectively to different alarm levels.
Optionally, the different alarm level also corresponds to different important levels, the different important level packet Include different counter-measures and different display modes or alerting pattern.
In the second aspect of the present invention, a kind of components tamper identification monitoring device is also provided, described device is configured as Monitoring method is identified using components tamper above-mentioned to monitor identification target device.
In the third aspect of the present invention, a kind of components tamper identification monitoring system is also provided, including such as aforementioned components Tamper identifies monitoring device.
Optionally, the system also includes:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;
The electronic tag includes chip and built-in antenna, and the electronic tag is configured as being mounted on key components and parts To identify its target object;There is unique coding in the chip;
The reader includes that radio-frequency module, control processing module and antenna, the reader are configured as described in reading Information in electronic tag.
Optionally, the radio frequency identification subsystem passes through CAN middleware phase with components tamper identification monitoring device Even.
Optionally, the system also includes self-test management system, the self-test management system is used for: receiving the components The recognition result of tamper identification monitoring system, or receive it is described first alarm, second alarm and third alarm, and in conjunction with it is described from The judging result of other subsystems judges whether System self-test passes through in inspection management system.
Optionally, the system also includes: long-range material management system, the long-range material management system are configured as:
The verification request that the components tamper identification monitoring device is sent is received, and makes response;The wherein verification Request is sent according to the COM code of the accessory of the replacement.
Optionally, the long-range material management system is also configured to
The upload information of the self-test management system and/or components tamper identification monitoring device is received and stored, and right The information is analyzed and is monitored.
In the fourth aspect of the present invention, a kind of machine readable storage medium is also provided, on the machine readable storage medium It is stored with instruction, which enables to the controller to execute components tamper identification prison above-mentioned when being executed by a controller Prosecutor method.
Components tamper provided by the invention identifies monitoring method, has the advantage that
The identification monitoring method of a variety of electronic tags is used cooperatively, and is considered the target that electronic tag is monitored comprehensively and is set The standby exception being likely to occur avoids limitation caused by single aspect monitoring, while can be produced according to the seriousness of alarm The different alarm of raw rank, while proximal end identification can be set and monitor identification with verification and remote port and review, it is ensured that complete machine The safe tamper of key component ensures the controllable and sustainability of overall performance and after-sales service maintenance.
Other features and advantages of the present invention will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is to further understand for providing to embodiment of the present invention, and constitute part of specification, with Following specific embodiment is used to explain the present invention embodiment together, but does not constitute the limit to embodiment of the present invention System.In the accompanying drawings:
Fig. 1 is the step flow chart for the components tamper identification monitoring method that one embodiment of the present invention provides;
Fig. 2 is the specific embodiment in the components tamper identification monitoring method that one embodiment of the present invention provides Logical schematic;
Fig. 3 is the structural schematic diagram for the components tamper identification monitoring system that one embodiment of the present invention provides;
Fig. 4 is the hard of the specific embodiment for the components tamper identification monitoring system that one embodiment of the present invention provides Part device figure.
Specific embodiment
Below in conjunction with attached drawing, detailed description of the preferred embodiments.It should be understood that this place is retouched The specific embodiment stated is merely to illustrate and explain the present invention, and is not intended to restrict the invention.
In embodiments of the present invention, in the absence of explanation to the contrary, the noun of locality used such as " upper and lower, top, bottom " Usually for direction shown in the drawings either for it is vertical, vertically or on gravity direction for each component it is mutual Positional relationship describes word.
Fig. 1 is the step flow chart for the components tamper identification monitoring method that one embodiment of the present invention provides, such as Fig. 1 Shown, a kind of components tamper identifies monitoring method, and components are equipped with several electronic tags and (do not show in figure in target device Out), the method also includes:
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, turn To step S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If without exception Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If in given threshold range It is interior, then go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is deposited It is then performing the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step S7);If meeting, perform the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
In this way, the embodiment of the invention can not only key component corresponding to recognition detection electronic tag whether Line, moreover it is possible to identify whether it is in place, meanwhile, it is capable to pass through the position of complete machine key components and parts, member replacing and accessory replace extremely Three aspects are changed to identify situation online and in place.Pass through the quantity of detection electronic tag, exception record and distance feature value three Aspect detects the abnormal conditions of electronic tag, considers the exception that the target device that electronic tag is monitored is likely to occur comprehensively, Limitation caused by single aspect monitoring is avoided, while the different alarm of rank can be generated according to the seriousness of alarm, Proximal end identification can be arranged in simultaneously to monitor identification with verification and remote port and review, it is ensured that the safe tamper of complete machine key component, Ensure the controllable and sustainability of overall performance and after-sales service maintenance.
Specifically, the embodiment of the invention first determines whether the quantity of electronic tag is correct, ensure that electronics mark Label be not removed or power off, when detecting that number is incorrect, it is also possible to be that electronic tag itself there is a problem, need into Row further judge with determine scene it can happen that.Even but it is exactly just that quantity, which not can guarantee equipment correctly, yet Normal, therefore be also required to further judge.Judge whether electronic tag has exception record again, exception record herein includes power down Record and power-off record, because exception record occurs in the electronic tag at key component, it is more likely that occur at the key component remarkable For disassembly or destruction, but the disassembly it could also be possible that our company maintenance personnel carry out part replacement when it is caused, therefore It needs further mutually to check with the record of putting on record of member replacing record herein, is otherwise easy to produce and accidentally alerts.Further, even if The electronic tag for inquiring the exception or missing has corresponding member replacing to record, and also not can guarantee the member replacing is to close rule , it would therefore be desirable to further further be checked the COM code of the accessory of replacement.Verification herein may be this The method of ground database check, it is also possible to which the verification of long-range handling of goods and materials database, client changes part privately in order to prevent, herein Long-range handling of goods and materials database the manufacturer of equipment is set mostly.Herein after COM code is checked successfully, I Think system recognition result be " normal ".
When in preceding step number detection and exception record verify all there is no problem when, also need further detect judgement electricity The distance feature value of subtab whether within the set threshold range, i.e., whether at it at the key component that is monitored of identification electronic tag Position when factory mainly prevents key component to be shifted, is specifically described in detail apart from detecting step below herein.When herein When distance identification is not detected abnormal, it is believed that the recognition result of system is " normal ".
Embodiment of above considers the majority of case at scene, can effectively prevent the disassembly privately of equipment, and can lead to It crosses multiple condition filter accidentally to alert, the situation at true reduction scene.
In a kind of optional embodiment provided by the invention, step S3) in judge the distance feature value of electronic tag Whether sub-step within the set threshold range are as follows:
The distance between obtain the electronic tag by RSSI telemetry and read point, by the distance and the setting Threshold range compares.Its specific method are as follows:
The distance of the electronic tag identifies and judges, and the present invention uses the particular technique of positioning distance measuring, before factory Reader is to the distance di of electronic tag i, and wherein i is less than or equal to N, and N is the total quantity of identification and monitoring key component, and Di (d0) is Radio frequency system identification distance and range, the key component in identification range show it is online and in place, meanwhile, Photographing On-line label Unremovable effect, i.e., if removing or cutting short means that route can not be again coupled to, the tag defeat.Wherein label ranging side Method, as described herein.More based on wireless distance finding method, ranging technology has signal strength to indicate RSSI, RSSI telemetry letter It is single, it is low in cost.The present invention is realized using RSSI mainly utilizes signal decaying and propagation model apart from party's rule.Calculation formula Are as follows:
Distance on the basis of d0, P (d0) are benchmark signal strength, and P (d) is blind spot signal strength, d be basic point and blind spot away from From β is attenuation coefficient, general value 2-4, XσFor gaussian random noise variable.
Further, judge whether the accessory of replacement meets the sub-step of COM code are as follows:
It is sent according to the COM code of the accessory of the replacement and verifies request;According to the response for verifying request to determine more Whether the accessory changed meets COM code.As previously mentioned, verification herein may be the method for local data base verification, it is also possible to It is the verification of long-range handling of goods and materials database, client changes part privately in order to prevent, and long-range handling of goods and materials database herein is most The manufacturer of equipment is set.When being checked if it is long-range handling of goods and materials database, long range radio transmissions mould is needed Block, such as GPRS, 4G or 5G.The long range radio transmissions module can use NB-IOT, be needed at this time through platform of internet of things, will It verifies request and is sent to long-range long-range material management system progress remote verification.
Further, step S6) in recognition result be " normal " after, further include the recognition result is carried out record with The step of push.After exporting " normal " in present embodiment, target device is represent after the identification of present embodiment, Through passing through.But the target device also needs the verification of other check system, just can enter normal open state, therefore herein It needs that the recognition result of present embodiment is recorded and pushed, so that other subsystem carries out verification cooperation and collaboration inspection It surveys.
It further include by institute after the end of identification of step S7) in a kind of optional embodiment provided by the invention It states recognition result or the first alarm or the second alarm or third alerts the step of being shown or being reminded.Display herein is mainly Recognition result is shown in airborne proximal end system and/or remote monitoring system, it being capable of real-time acquisition system for system operator Tamper identify situation.Alarm is further verified and handled simultaneously.
Further, first alarm, the second alarm and third alarm are belonging respectively to different alarm levels.For example, First alarm, the second alarm and third alarm are belonging respectively to level-one alarm, secondary alarm and three-level alarm.Alert level herein It is other to divide primarily to each level security rank is incremented by, it is ensured that complete machine key components and parts are supervised and protected, main For also corresponding to different alarm levels to different important levels, the different important level includes that different replies is arranged It applies and different display modes or alerting pattern.Such as: primary alarm is only to report, and second-level alarm needs to export result To airborne display and remote supervisory display system, and three-level alarm is then needed to export to proximal end display system and remote supervisory and be shown The service of goods administrative office of system reminds and pushes and informs nearest attendant.In the system when Airborne GPS terminal antenna, When communication line card, external power supply and electronic tag are removed, equipment can not be shown by self-test and automatic lock machine, and in system information Show prompt correlated condition alarm in interface, the abnormality alarm of three grades is simultaneously displayed on airborne proximal end display system and long-range prison In pipe display system, while three grades alarm will push nearest after-sale service palm client by remote port, wherein third Grade alarm is artificially to distort and remove, and after-sales staff needs scene tracking to ensure complete machine after-sale service, verifies whole set equipment comprehensively Safety.
The explanation of integrality is carried out to one embodiment of the present invention below by way of attached drawing 2.Fig. 2 is a kind of reality of the present invention The logical schematic for the specific embodiment in components tamper identification monitoring method that the mode of applying provides;As shown in Fig. 2, this reality Apply mode is initially that airborne system powers on, if airborne system powers on the reader scanning airborne electronic equipment mark of rear radio-frequency recognition system Sign quantity n, the number of labels n after verification scanning, if equal with initial number N.If equal, anti-demoulding is called in next step Block, verification historical data whether there is exception record, and if it exists with the presence or absence of replacement accessory record, otherwise exception record then verifies It scans and determines card reader to the distance di of electronic tag i, wherein whether i≤N, checking distance are less than Di, then continue to call in this way Otherwise airborne proximal end self-checking system verification, output verification result are such as sent out to output display system, other selftest modules of normal call Send abnormal 1 grade of alarm;Quantity is not reciprocity after such as scanning and has power down sequence to record there are electronic tag and replacement accessory is not present Record data, then it is assumed that electronic tag is artificially removed or faults itself, sends abnormal 2 grades of alarms, and output results to airborne Display and remote supervisory display system;If number of scans is unequal, checks and is recorded in system record with the presence or absence of replacement accessory, It replaced then to verify by long-range material management system and request and response occurs, whether verification meets COM code.By long-range Material management system verifies whether the coding is coding after inventory's outbound, is the key component management database that proximal end is written, The systems such as normal startup separator diagnosis simultaneously, normal boot-strap.Otherwise abnormal 3 grades of alarms are sent, and output results to airborne display With remote supervisory display system, and show that the system is tampered or removes.Three-level alarm is by proximal end display system and sends remote Journey supervises the service of goods administrative office of display system, reminds and pushes and informs nearest attendant.
In a kind of embodiment provided by the invention, a kind of components tamper identification monitoring device, the dress are also disclosed It sets and is configured as components tamper identification monitoring method above-mentioned to monitor identification target device.Device herein has numerical value meter It calculates and the function of logical operation, at least there is the central processor CPU of data-handling capacity, random access memory ram, read-only deposit Reservoir ROM, a variety of I/O mouthfuls and interruption systems etc..The data processing module can be, for example, single-chip microcontroller, chip or processor etc. Usual hardware is exactly intelligent terminal or the processor of PC in the case where more often using.
In another embodiment provided by the invention, a kind of components tamper identification monitoring system is also disclosed, until It less include that aforementioned components tamper identifies monitoring device.
Further, the scanning of the electronic tag in system above needs independent subsystem to be implemented, therefore, described System further include:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;The electricity Subtab includes chip and built-in antenna, is configured as being attached on key components and parts to identify its target object;The chip It is interior that there is unique coding;The reader includes radio-frequency module, control processing module and antenna, is configured as reading the electricity Information in subtab.
The radio frequency identification subsystem is connected with components tamper identification monitoring device by CAN middleware.Herein CAN middleware the function of CAN bus is mainly provided, so that multiple devices are carried out data transmission by bus, while in the CAN Between part possibly also with the function of emergency service, need to increase power storage cell at this time to provide emergency service.
Further, the system also includes self-test management system, the self-test management system receives the components The recognition result of tamper identification monitoring system or alarm, and in conjunction with the judging result of other subsystems in the self-test management system Judge whether System self-test passes through.Components tamper identification monitoring system herein is a subsystem of self-test management system System, the self-test management system are mainly completed the storage of data information, are managed and controlled.Other subsystems herein specifically include that For electricity detecting system, equipment original state acquisition system and environmental parameter system etc..
Further, the system also includes: long-range material management system, the long-range material management system are configured For;The verification request that the components tamper identification monitoring device is sent is received, and makes response;The verification request is basis What the COM code of the accessory of the replacement was sent.Further, the long-range material management system is also configured to receive And the upload information of the self-test management system and/or components tamper identification monitoring device is stored, and analyzed and monitored.
Long-range material management system at this time has the function of cloud platform, complete machine key components and parts can exist online Position situation and the doubtful monitor supervision platform removed abnormity early warning information and be uploaded to network operator by network, facilitate network operator to monitor in real time Complete machine state and service life monitoring, and can assess in the service life scientifically and accurately to each components of complete machine, to user malfunction Pre-process and the service life reminds.
Fig. 3 is the structural schematic diagram for the components tamper identification monitoring system that one embodiment of the present invention provides, such as attached Shown in Fig. 3, the components tamper identification monitoring system of a complete function can be made of following five parts: radio frequency identification System, CAN middleware, components tamper identification monitoring device, self-test management system and long-range material management system.
Wherein radio frequency identification subsystem is used for the electronic label identification and reading of proximal end, and components tamper identifies monitoring device Tamper for carrying out equipment using method above-mentioned identifies monitoring, and described, CAN middleware is for connecting radio frequency identification System and components tamper identify monitoring device.The self-test management system is used to complete the self-test of equipment, long-range handling of goods and materials System monitors for realizing the cloud of equipment.
The system covers proximally and distally, effectively realizes initial survey and reinspection, it is ensured that the key components and parts material of complete machine range Anti- dismounting and the safety without replacement.
The explanation of integrality is carried out to one embodiment of the present invention below by way of attached drawing 4.Fig. 4 is a kind of reality of the present invention The hardware device figure of the specific embodiment for the components tamper identification monitoring system that the mode of applying provides;As shown in figure 4, above-mentioned Radio frequency identification subsystem is 915MHz radio-frequency recognition system, described mainly including multiple special electronic tags, antenna, reader Electronic tag is made of chip and built-in antenna, is attached on key components and parts as mark target object.Electronic tag is pacified Position where key component mounted in construction machinery product, such as main oil pump, multi-way valve, proportioning valve, master cylinder, displacement sensing Multiple positions such as device, hydraulic motor.Electronic tag is the data medium of system, and each electronic tag is compiled with unique electronics Code, storage inside the relevant information of identified object, the storage information be also contained in inside long-range material management system, object Mark is changed material after material outbound to have installed and outbound coding, stores and has dispatched from the factory after the factory of product complete machine, product coding, production date The components informations such as phase.The method for arranging electronic tag has to withhold by the conducting wire with insulation protection and has jack in key components and parts Place the modes such as is built on the plug of element energization and is mounted on nameplate as electronic identity identification label, described in electricity It is that completion is withheld by connecting position of wires that subtab, which withholds line, completes chip interior chips wire and connects, and disconnecting will disconnect, only The tool of useful attendant repairs fastener or replacement fastener, and unbuttoning will be recognized by the system, and cooperation proximal end self-test management system is real Existing tamper purpose, connection and outer layer plastic bonding of the particular tool for label line.
The reader is the equipment for reading and writing memory information in electronic tag, based on passive reflective modulation technique and The radio-frequency identification reader/writer of module design principle.It is mainly made of radio-frequency module, control processing module and antenna three parts, The working frequency of radio-frequency module is 915MHz, and wireless identification distance is up to 10 meters.A kind of reader, that is, data acquisition equipment, It whether there is what the multiple anti-demolition electronic tags in front end were included, existing location information and data time series, by CAN Between part pass to the management system controller of self-test containing proximal end.The background system of system is by proximal end self-checking system and far-end material pipe System Take is managed, data exchange with management proximal end is completed by system bus middleware, and distal end connection is passed by long distance wireless It is defeated, it is completed as GPRS network connects.Wherein reader is attached by the controller of middleware and machine control system, airborne Self-test management system in proximal end is completed the storage of data information, is managed and controlled.Far-end material management system realizes COM code Data identification and reinspection.
In one embodiment of the invention, a kind of machine readable storage medium, the machine readable storage are also provided Instruction is stored on medium, which enables to the controller to execute components tamper above-mentioned when being executed by a controller Identify monitoring method.
Above-mentioned technical proposal of the present invention can be suitable for wider application, and can effectively the tamper to equipment carry out Identification and monitoring.
Optional embodiment of the invention, still, embodiment of the present invention and unlimited is described in detail in conjunction with attached drawing above Detail in above embodiment can be implemented the present invention in the range of the technology design of embodiment of the present invention The technical solution of mode carries out a variety of simple variants, these simple variants belong to the protection scope of embodiment of the present invention.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, embodiment of the present invention To various combinations of possible ways, no further explanation will be given.
It can be with it will be appreciated by those skilled in the art that realizing that all or part of the steps in the method for above embodiment is Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make Obtain all or part of step that single-chip microcontroller, chip or processor (processor) execute each embodiment the method for the present invention Suddenly.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
In addition, various embodiments of the present invention can be combined randomly, as long as it is without prejudice to originally The thought of invention embodiment equally should be considered as embodiment of the present invention disclosure of that.

Claims (16)

1. a kind of components tamper identifies monitoring method, components are equipped with several electronic tags in target device, and feature exists In the described method comprises the following steps:
S1) judge whether the quantity of the electronic tag in the target device is consistent with preset quantity;If inconsistent, step is gone to Rapid S4);If consistent, perform the next step rapid;
S2) judge whether the electronic tag has exception record;If there is exception record, step S4 is gone to);If note without exception Record then performs the next step rapid;
S3 whether within the set threshold range) judge the distance feature value of the electronic tag;If within the set threshold range, Go to step S6);If within the set threshold range, not sending first to alert and go to step S7);
S4 member replacing record) is judged whether there is;If it does not exist, then it sends second to alert and go to step S7);It is existing, It then performs the next step rapid;
S5) judge whether the accessory of replacement meets COM code;It does not meet such as, then sends third and alert and go to step S7);If Meet, then performs the next step rapid;
S6) determine that recognition result is " normal ";
S7) end of identification.
2. the method according to claim 1, wherein step S2) in, the exception record includes: power down record It is recorded with power-off.
3. the method according to claim 1, wherein step S3) in, judge the distance feature of the electronic tag Within the set threshold range whether value, comprising:
The distance between obtain the electronic tag by RSSI telemetry and read point;
The distance is compared with the given threshold range.
4. the method according to claim 1, wherein step S5) in, judge whether the accessory of replacement meets material Coding, comprising:
It is sent according to the COM code of the accessory of the replacement and verifies request;
Determine whether the accessory of the replacement meets COM code according to the response for verifying request.
5. the method according to claim 1, wherein step S6) in, determine recognition result be " normal " it Afterwards, further includes: the recognition result is recorded and pushed.
6. the method according to claim 1, wherein step S7) in, after end of identification, further includes: by institute Recognition result, the first alarm, the second alarm or third alarm is stated to be shown or reminded.
7. according to the method described in claim 6, it is characterized in that, first alarm, the second alarm and third alarm difference Belong to different alarm levels.
8. the method according to the description of claim 7 is characterized in that the different alarm level correspond to it is different important etc. Grade, the different important level have different counter-measures and different display modes or alerting pattern.
9. a kind of components tamper identifies monitoring device, which is characterized in that described device is configured as using in claim 1-8 Described in any item components tampers identify monitoring methods to monitor identification target device.
10. a kind of components tamper identification monitoring system, which is characterized in that the system includes that components described in claim 9 are anti- Tear identification monitoring device open.
11. system according to claim 10, which is characterized in that the system also includes:
Radio frequency identification subsystem, the radio frequency identification subsystem include several electronic tags, antenna and reader;
The electronic tag includes chip and built-in antenna, and the electronic tag is configured as being mounted on key components and parts to mark Know its target object;There is unique coding in the chip;
The reader includes that radio-frequency module, control processing module and antenna, the reader are configured as reading the electronics Information in label.
12. system according to claim 11, which is characterized in that the radio frequency identification subsystem and the components tamper Identify that monitoring device is connected by CAN middleware.
13. system according to claim 10, which is characterized in that the system also includes self-test management system, it is described from Inspection management system is used for:
It receives the recognition result of the components tamper identification monitoring system, or receives first alarm, the second alarm and the Three alarms, and judge whether System self-test passes through in conjunction with the judging result of other subsystems in the self-test management system.
14. system according to claim 13, which is characterized in that the system also includes long-range material management system, institutes Long-range material management system is stated to be configured as:
The verification request that the components tamper identification monitoring device is sent is received, and makes response;The wherein verification request It is to be sent according to the COM code of the accessory of the replacement.
15. system according to claim 14, which is characterized in that the long-range material management system is also configured to
The upload information of the self-test management system and/or components tamper identification monitoring device is received and stored, and to described Information is analyzed and is monitored.
16. a kind of machine readable storage medium, which is characterized in that be stored with instruction on the machine readable storage medium, this refers to It enables and enables to components described in any one of described controller perform claim requirement 1 to 8 anti-when being executed by a controller Tear identification monitoring method open.
CN201910276449.3A 2019-04-08 2019-04-08 Components tamper identifies monitoring method, apparatus and system Pending CN110135531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910276449.3A CN110135531A (en) 2019-04-08 2019-04-08 Components tamper identifies monitoring method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910276449.3A CN110135531A (en) 2019-04-08 2019-04-08 Components tamper identifies monitoring method, apparatus and system

Publications (1)

Publication Number Publication Date
CN110135531A true CN110135531A (en) 2019-08-16

Family

ID=67569350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910276449.3A Pending CN110135531A (en) 2019-04-08 2019-04-08 Components tamper identifies monitoring method, apparatus and system

Country Status (1)

Country Link
CN (1) CN110135531A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112700343A (en) * 2019-10-23 2021-04-23 中国石油天然气股份有限公司 Operation monitoring method and system based on oil gas Internet of things
CN112699982A (en) * 2021-01-19 2021-04-23 苗跃跃 Efficient intelligent supervision device and use method
CN115598064A (en) * 2022-10-21 2023-01-13 圣名科技(广州)有限责任公司(Cn) Data detection method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385353A (en) * 2010-09-06 2012-03-21 朱丽萍 Equipment status controlling method and equipment
CN202351899U (en) * 2011-07-21 2012-07-25 领科无线射频系统(上海)有限公司 RFID-based automobile component tracing management system
CN204814525U (en) * 2015-07-31 2015-12-02 厦门医学高等专科学校 Hospital looks into a device based on active rfid
CN105502168A (en) * 2015-12-30 2016-04-20 上海佩纳沙士吉打机械有限公司 Disassembly-prevention recognition and remote stopping system for hydraulic grab and control method thereof
CN106781171A (en) * 2017-01-12 2017-05-31 段元文 Alarm method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385353A (en) * 2010-09-06 2012-03-21 朱丽萍 Equipment status controlling method and equipment
CN202351899U (en) * 2011-07-21 2012-07-25 领科无线射频系统(上海)有限公司 RFID-based automobile component tracing management system
CN204814525U (en) * 2015-07-31 2015-12-02 厦门医学高等专科学校 Hospital looks into a device based on active rfid
CN105502168A (en) * 2015-12-30 2016-04-20 上海佩纳沙士吉打机械有限公司 Disassembly-prevention recognition and remote stopping system for hydraulic grab and control method thereof
CN106781171A (en) * 2017-01-12 2017-05-31 段元文 Alarm method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112700343A (en) * 2019-10-23 2021-04-23 中国石油天然气股份有限公司 Operation monitoring method and system based on oil gas Internet of things
CN112699982A (en) * 2021-01-19 2021-04-23 苗跃跃 Efficient intelligent supervision device and use method
CN115598064A (en) * 2022-10-21 2023-01-13 圣名科技(广州)有限责任公司(Cn) Data detection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105160748B (en) A kind of power supply station's storehouse intelligent management system and management method based on Internet of Things
CN102724040B (en) Method, control device and the system of verity run counter to by testing equipment component
CN110135531A (en) Components tamper identifies monitoring method, apparatus and system
CN201600423U (en) Intelligent grounding wire detecting device
CN203616367U (en) An anti-electricity-stealing metering cabinet
CN102140929A (en) Mine safety production inspection system
CN108365858B (en) Active balise monitors system
CN101826757A (en) Method and device for managing earth wire
Sun et al. The intelligent crude oil anti-theft system based on IoT under different scenarios
CN104021515A (en) Gas cylinder safety supervision system and method
KR20070019509A (en) Real-time safety patrol control system of industry plant using Radio Frequency IDentification
CN103592929A (en) Internet of Things system for monitoring and managing fire water supply
CN106021066A (en) Fault information detection method and electronic device
CN110672896A (en) Electric meter box electricity stealing prevention system under ubiquitous internet
CN1963846A (en) Electron supervisory system of secrecy-involved apparatus and supervisory method
CN103246251A (en) Tool and apparatus management and monitoring system of hot-line work tool and apparatus storehouse
CN108408362A (en) A kind of intelligent transportation monitoring system and monitoring method for conveyer belt
CN112033510A (en) Data authenticity monitoring platform based on garbage storage and transportation process
CN106022403B (en) A kind of Workshop Production overhaul of the equipments record system and method based on RFID
CN102546234B (en) Solution system
CN202522901U (en) Electric power metering equipment distribution and monitoring device and metering equipment distribution vehicle
CN107657381A (en) Civilian explosive device security risk assessment system
CN201266415Y (en) Radio frequency identification monitoring apparatus for valuable article
CN102855598A (en) Fire-fighting device supervisory system based on RFID (radio frequency identification) technology
CN101576962B (en) Radio frequency identification monitoring device for valuables

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816