CN111222119A - Dump analysis terminal and safe dump analysis method for locomotive operation data - Google Patents

Dump analysis terminal and safe dump analysis method for locomotive operation data Download PDF

Info

Publication number
CN111222119A
CN111222119A CN201911372430.5A CN201911372430A CN111222119A CN 111222119 A CN111222119 A CN 111222119A CN 201911372430 A CN201911372430 A CN 201911372430A CN 111222119 A CN111222119 A CN 111222119A
Authority
CN
China
Prior art keywords
dump
dump analysis
terminal
analysis program
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911372430.5A
Other languages
Chinese (zh)
Inventor
张任
段先科
管思飏
曹佛清
柯炟
聂补
汪超
余琳
郑波
黄梦彬
杨群
刘道钱
方胜
邓洁铮
黄刚林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
722th Research Institute of CSIC
Original Assignee
722th Research Institute of CSIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 722th Research Institute of CSIC filed Critical 722th Research Institute of CSIC
Priority to CN201911372430.5A priority Critical patent/CN111222119A/en
Publication of CN111222119A publication Critical patent/CN111222119A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The disclosure provides a dump analysis terminal and a safe dump analysis method of locomotive operation data, and belongs to the field of computing equipment. The dump analysis terminal comprises a memory, and a dump analysis program is stored in the memory; a processor; at least one mobile storage device connection interface; the processor is used for receiving an authorization certificate sent by the dump analysis program during running; authenticating the dump analysis program based on the authorization credential; after the authentication is passed, allowing the dump analysis program to read locomotive operation data from the corresponding mobile storage device through the at least one mobile storage device connection interface.

Description

Dump analysis terminal and safe dump analysis method for locomotive operation data
Technical Field
The disclosure relates to the field of computing equipment, and in particular relates to a dump analysis terminal and a safe dump analysis method of locomotive operation data.
Background
At present, the vehicle-mounted host system on the domestic locomotive records the running data of the locomotive in the running process, such as various states and operation data of audio, video and the like. The data are dumped from the locomotive to the computing equipment of the engineering section through a storage device (such as a mobile storage device like a U disk) by related personnel, and then are analyzed and processed. In the related art, dump analysis software loaded by a computing device controls data dumping and analysis.
Disclosure of Invention
The embodiment of the disclosure provides a dump analysis terminal and a safe dump analysis method for locomotive operation data, which can ensure that a legal dump analysis program can read and analyze the locomotive operation data from a mobile storage device. The technical scheme is as follows:
in one aspect, a dump analysis terminal is provided, where the dump analysis terminal includes:
a memory having a dump analysis program stored thereon;
a processor;
at least one mobile storage device connection interface;
the processor is configured to perform at least one of,
receiving an authorization certificate sent by the dump analysis program during running;
authenticating the dump analysis program based on the authorization credential;
after the authentication is passed, allowing the dump analysis program to read locomotive operation data from the corresponding mobile storage device through the at least one mobile storage device connection interface.
Optionally, the processor is configured to,
and receiving the authorization certificate sent by the dump analysis program during running by adopting an objective function interface.
Optionally, the processor is configured to,
obtaining core information of the authorization certificate, wherein the core information comprises a validity period, a signature and a certificate issuing unit;
and when the core information of the authorization certificate is consistent with the target information, determining that the dump analysis program is authenticated.
Optionally, the dump analysis terminal further comprises an encryption card, the encryption card is used for,
receiving a terminal identity authentication request sent by the dump analysis program during running, wherein the terminal identity authentication request comprises encrypted data;
decrypting the encrypted data and generating terminal identity response information based on the decrypted data;
sending the terminal identity response information to the dump analysis program;
correspondingly, the processor receives the authorization certificate which is sent after the dump analysis program determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
Optionally, the dump analysis terminal further comprises a microcontroller and at least one light strip, the light strip is in one-to-one correspondence with the mobile storage device connection interface, the microcontroller is configured to,
receiving dump progress indication information sent by the dump analysis program, wherein the dump progress indication information comprises an identifier of a target mobile storage device connection interface and dump progress, and the dump progress is the progress of dumping locomotive operation data in mobile storage devices connected with the corresponding mobile storage device connection interface to the dump analysis terminal;
and controlling at least one lamp in a lamp strip corresponding to the identifier of the target mobile storage device connection interface to be lightened on the basis of the dump progress.
In another aspect, a method for analyzing a safe dump of locomotive operating data is provided, where the method includes:
the dump analysis terminal receives an authorization certificate sent by a dump analysis program during running, wherein the dump analysis program is applied to the dump analysis terminal;
authenticating the dump analysis program based on the authorization credential;
after the authentication is passed, allowing the dump analysis program to read locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface on the dump analysis terminal.
Optionally, the receiving an authorization certificate sent by the dump analysis program during runtime includes:
and receiving the authorization certificate sent by the dump analysis program during running by adopting an objective function interface.
Optionally, the authenticating the dump analysis program based on the authorization certificate includes:
obtaining core information of the authorization certificate, wherein the core information comprises a validity period, a signature and a certificate issuing unit;
and when the core information of the authorization certificate is consistent with the target information, determining that the dump analysis program is authenticated.
Optionally, before the receiving dump analysis program runs the sent authorization certificate, the secure dump analysis method further includes:
receiving a terminal identity authentication request sent by the dump analysis program during running, wherein the terminal identity authentication request comprises encrypted data;
decrypting the encrypted data and generating terminal identity response information based on the decrypted data;
sending the terminal identity response information to the dump analysis program;
correspondingly, the received authorization certificate is sent after the dump analysis program determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
Optionally, after the allowing the dump analysis program to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface on the dump analysis terminal, the safety dump analysis method further includes:
receiving dump progress indication information sent by the dump analysis program, wherein the dump progress indication information comprises an identifier of a target mobile storage device connection interface and dump progress, and the dump progress is the progress of dumping locomotive operation data in mobile storage devices connected with the corresponding mobile storage device connection interface to a dump analysis terminal;
and controlling at least one lamp in a lamp strip corresponding to the identifier of the target mobile storage device connection interface to be lightened on the basis of the dump progress.
The technical scheme provided by the embodiment of the disclosure has the following beneficial effects:
the dump analysis terminal comprises a memory, a processor and at least one mobile storage device connection interface, the processor receives an authorization certificate sent by the dump analysis program stored in the memory during running, and the dump analysis program is authenticated based on the authorization certificate; after the authentication is passed, the dump analysis program is allowed to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface, so that the dump analysis terminal can verify the identity of the dump analysis program, the fact that the legal dump analysis program can only read and analyze the locomotive operation data from the mobile storage device is ensured, and the safety of the locomotive operation data in the dump analysis process is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a block diagram of a dump analysis terminal according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of a dump analysis terminal according to an embodiment of the disclosure;
fig. 3 and fig. 4 are schematic structural diagrams of a dump analysis terminal provided by the embodiment of the disclosure;
FIG. 5 is a flowchart of a method for analyzing a safe dump of locomotive operating data according to an embodiment of the disclosure.
In the attached drawing, an S dump analysis program, an 80 dump analysis terminal, an industrial personal computer 1, a memory 1a, a processor 1B, a mobile storage device 2 connecting interface, an encryption card 3, a microcontroller 4, a lamp strip 5, a power supply 6, an input/output interface 7, a display screen 8, a loudspeaker 9, a network port 10, an audio/video output port 11, a front panel A, a rear panel B, a power supply interface 12, a terminal 13 starting button 13 and an air outlet 14.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
Fig. 1 is a block diagram of a dump analysis terminal according to an embodiment of the present disclosure. Referring to fig. 1, the dump analysis terminal 80 includes a memory 1a, a processor 1b, and at least one mobile storage device connection interface 2. The memory 1a stores a dump analysis program S.
The mobile storage device connection interface 2 is used for connecting a mobile storage device. And the mobile storage equipment stores the locomotive running data.
The processor 1b is configured to receive an authorization certificate sent by the dump analysis program S during operation; authenticating the dump analysis program S based on the authorization certificate; after the authentication is passed, the dump analysis program S is allowed to read the locomotive operation data from the corresponding mobile storage device through the at least one mobile storage device connection interface 2.
Illustratively, the removable storage device may be a USB disk, the removable storage device connection interface 2 may be a USB (Universal Serial Bus) interface, and the number of the removable storage device connection interfaces 2 may be 4.
For example, the authorization credential may be sent when the dump analyzer S is first run. The first operation means that the dump analysis program S is started for the first time after being installed in the dump analysis terminal 80.
In the embodiment of the disclosure, the dump analysis terminal comprises a memory, a processor and at least one mobile storage device connection interface, the processor receives an authorization certificate sent when a dump analysis program stored on the memory runs, and authenticates the dump analysis program based on the authorization certificate; after the authentication is passed, the dump analysis program is allowed to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface, so that the dump analysis terminal can verify the identity of the dump analysis program, the fact that the legal dump analysis program can only read and analyze the locomotive operation data from the mobile storage device is ensured, and the safety of the locomotive operation data in the dump analysis process is improved.
Fig. 2 is a block diagram of a dump analysis terminal according to an embodiment of the disclosure. Referring to fig. 2, the dump analysis terminal includes a memory 1a, a processor 1b, and at least one mobile storage device connection interface 2.
The memory 1a stores a dump analysis program S.
The mobile storage device connection interface 2 is used for connecting a mobile storage device. And the mobile storage equipment stores the locomotive running data.
Illustratively, the mobile storage device may be a USB disk, the mobile storage device connection interface 2 may be a USB interface, such as a USB 3.0 interface (transmission speed is not lower than 100MB/S), and the number of the mobile storage device connection interfaces 2 may be 4.
The processor 1b is configured to receive an authorization certificate sent by the dump analysis program S during operation; authenticating the dump analysis program S based on the authorization certificate; after the authentication is passed, the dump analysis program S is allowed to read the locomotive operation data from the corresponding mobile storage device through the at least one mobile storage device connection interface 2.
For example, the authorization credential may be sent when the dump analyzer S is first run. The first operation means that the dump analysis program S is started for the first time after being installed in the dump analysis terminal.
Optionally, the processor 1b is configured to obtain core information of the authorization certificate, where the core information includes a validity period, a signature, and a certificate issuing authority; when the core information of the authorization certificate is consistent with the target information, the dump analysis program S is determined to be authenticated.
Optionally, the processor 1b is configured to receive, by using the objective function interface, an authorization certificate sent when the dump analysis program S runs.
The function interface can conveniently carry out certificate authentication with the dump analysis program S, and the complex authentication process can be packaged through the function interface, so that the certificate authentication process called by the dump analysis program S is simplified.
Optionally, the processor 1b is further configured to generate an authentication log based on the authentication result, wherein the authentication log records therein the authentication time and the authentication result, and the authentication result may be authenticated or not authenticated.
The authentication log can be provided for workers to view, and support is provided for data analysis of maintenance management of safe dump analysis.
Optionally, the target information is derived based on a target authorization certificate. Accordingly, the processor 1b is further configured to periodically download the target authorization certificate from the designated address.
Illustratively, the designated address may be designated by the user. Alternatively, the processor 1b may present the authentication procedure to the user in a secure maintenance management application. And the user completes the input of the designated address through the user interface of the security maintenance management application software. The user can also inquire the authentication log through a user interface of the security maintenance management application software.
The certificate downloading provides support for services such as certificate updating, certificate issuing and the like for maintenance and management of safe dump analysis.
Optionally, referring to fig. 2, the dump analysis terminal further includes an encryption card 3.
The encryption card 3 is used for receiving a terminal identity authentication request sent by the dump analysis program S during operation, wherein the terminal identity authentication request comprises encrypted data; decrypting the encrypted data and generating terminal identity response information based on the decrypted data; and sending the terminal identity response information to the dump analysis program S.
Accordingly, the authorization certificate received by the processor 1b is sent after the dump analysis program S determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
The encryption card 3 may be a digital certificate of a special electronic file containing the user's personal identification information, private key and digital signature, and is stored in the USB medium. The encryption card 3 can be installed in the dump analysis terminal before the dump analysis terminal leaves the factory, and is used for completing the security protection of the dump analysis program S and preventing the dump analysis program S from being installed on illegal equipment.
Illustratively, the dump analysis program S has an interface function of a built-in encryption algorithm, and when the dump analysis program S runs, the interface function of the built-in encryption algorithm calls a preset encryption algorithm, that is, encrypts data through a stored public key, and then generates terminal identity response information based on the encrypted data and transmits the terminal identity response information to the encryption card 3. And after receiving the terminal identity response information including the encrypted data, the encryption card 3 decrypts and transmits back the encrypted data through the stored private key. The dump analysis program S can verify each other after comparing the decrypted data with the original data (data before encryption) without errors, establish mutual trust (equivalent to identity authentication, and then perform the next operation), and the dump analysis program S can further run. In other words, if the dump analysis program S is installed on another device (without an encryption card), when the dump analysis program S runs, the interface function of the encryption algorithm calls the encryption algorithm, and the encrypted data is not effectively returned. The dump analysis program S judges that the software is installed on an illegal device, so that the software cannot be normally operated to perform the subsequent steps.
For example, the terminal identity authentication may be performed only during the first run of the dump analysis program S, and the dump analysis terminal may permanently use the software if the authentication is successful. If the authentication fails, the dump analysis terminal will not be able to use the software.
Optionally, the dump analysis terminal further includes a microcontroller 4 and at least one light strip 5, where the light strip 5 corresponds to the mobile storage device connection interface 2 one to one.
The microcontroller 4 is used for receiving dump progress indication information sent by the dump analysis program S, wherein the dump progress indication information includes an identifier of the target mobile storage device connection interface 2 and a dump progress, and the dump progress is a progress of dumping locomotive running data in the mobile storage device connected with the corresponding mobile storage device connection interface 2 to the dump analysis terminal; and controlling at least one lamp in the lamp strip 5 corresponding to the identifier of the target mobile storage device connection interface 2 to be lightened on the basis of the dump progress.
Alternatively, the memory 1a and the processor 1b may be implemented by an industrial personal computer 1. The memory 1a is connected to the processor 1b via a system bus. The industrial personal computer 1 is provided with an encryption card 3 slot connected with a system bus, the encryption card 3 can be installed in the encryption card 3 slot, and the encryption card 3 is connected with the processor 1b through the system bus. The microcontroller 4 is connected to the processor 1b via a system bus. Illustratively, the industrial personal computer 1 may be a standard industrial personal computer of the porphyry company, an operating system, such as a flagship version of the Windows7 operating system, may be installed on the memory 1a, and the memory 1a may be a hard disk 1TB SSD; the processor 1b may adopt Intel core I7-7700, and the memory of the processor 1b may be DDR 48G; the microcontroller 4 may employ an MSP430 by TI corporation.
Optionally, the dump analysis terminal may further comprise a power supply 6, and the power supply 6 is used for respectively supplying power to the processor 1b, the light strips 5 and the microcontroller 4.
Optionally, the dump analysis terminal may further include an input/output interface 7 for connecting input/output devices such as a mouse and a keyboard, and the input/output interface 7 may be connected to the system bus through an input/output controller so as to be connected to the processor 1 b. Illustratively, the input/output interface 7 may be USB 2.0, and the number may be 2.
Optionally, the dump analysis terminal may further include a display screen 8, the display screen 8 is used for displaying information output by the processor 1b, and the display screen 8 may be electrically connected with the processor 1b through the microcontroller 4. Accordingly, the microcontroller 4 is also arranged to control the display screen 8 based on signals from the processor 1 b.
Illustratively, the Display screen 8 may be an LCD (Liquid Crystal Display).
Optionally, the dump analysis terminal may further include a speaker 9, and the speaker 9 is electrically connected to the processor 1b through the system bus.
Accordingly, the power supply 6 may also supply power to the display screen 8. The microcontroller 4 may be further configured to convert the power source 6 and provide the processor 1b, the memory 1a, the display screen 8 and each light strip 5 with the corresponding converted power source.
Illustratively, when the number of the mobile storage device connection interfaces 2 is 4, the number of the light strips 5 may also be 4. Fig. 3 and fig. 4 are schematic structural diagrams of a dump analysis terminal provided by the embodiment of the disclosure. Referring to fig. 3 and 4, the dump analysis terminal includes a case, and the processor 1b and the memory 1a may be provided inside the case. The machine box comprises a front panel A and a rear panel B, wherein the front panel A and the rear panel B are oppositely arranged in parallel. Display screen 8, terminal start button 13, mobile storage device connection interface 2 and lamp area 5 can be located front panel A, and lamp area 5 can be located corresponding mobile storage device connection interface 2's top position. A power interface 12, an input/output interface 7, a speaker 9 output port, a network port (network interface, such as RJ45 gigabit ethernet interface) 10, and an audio/Video output port 11 (e.g., VGA (Video Graphics Array) interface) may be distributed on the rear panel B.
Illustratively, the case may be made of a high quality SPCC (Steel Plate Cool Common, cold rolled Steel Plate) and the Plate thickness may be 1.2 mm.
Optionally, the dump analysis terminal may further include a cooling fan, the cooling fan is disposed in the casing, and the casing is provided with an air outlet 14 corresponding to the cooling fan. The air outlet 14 may be formed in the rear panel B.
In the embodiment of the disclosure, the dump analysis terminal comprises a memory, a processor and at least one mobile storage device connection interface, the processor receives an authorization certificate sent when a dump analysis program stored on the memory runs, and authenticates the dump analysis program based on the authorization certificate; after the authentication is passed, the dump analysis program is allowed to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface, so that the dump analysis terminal can verify the identity of the dump analysis program, the fact that the legal dump analysis program can only read and analyze the locomotive operation data from the mobile storage device is ensured, and the safety of the locomotive operation data in the dump analysis process is improved.
Fig. 5 is a flowchart of a method for analyzing a safe dump of locomotive operation data, which is executed by the dump analysis terminal according to an embodiment of the disclosure, and referring to fig. 5, the method for analyzing a safe dump includes the following processes.
Step 501, receiving an authorization certificate sent by a dump analysis program during running, wherein the dump analysis program is applied to a dump analysis terminal.
Step 502, authenticating the dump analysis program based on the authorization certificate.
And step 503, after the authentication is passed, allowing the dump analysis program to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface on the dump analysis terminal.
Optionally, step 501 may include: and receiving an authorization certificate sent by the dump analysis program during running by adopting an objective function interface.
Optionally, step 502 may include steps 502 a-502 b as follows.
Step 502a, obtaining core information of the authorization certificate, wherein the core information comprises a validity period, a signature and a certificate issuing unit.
Step 502b, determining whether the core information of the authorization certificate is consistent with the target information.
When the core information of the authorization certificate is consistent with the target information, the dump analysis program is determined to be authenticated. When the core information of the authorization certificate is inconsistent with the target information, the dump analysis program is determined to be not authenticated.
Step 503 may further include: when the authorization certificate is not authenticated, the dump analysis program is prohibited from reading the locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface.
Illustratively, the step 501-503 may be implemented by a processor of the dump analysis terminal.
Optionally, before performing step 501, the method for analyzing a secure dump further comprises steps 504-506.
Step 504, a terminal identity authentication request sent when the dump analysis program runs is received, wherein the terminal identity authentication request comprises encrypted data.
And 505, decrypting the encrypted data and generating terminal identity response information based on the decrypted data.
Step 506, sending the terminal identity response information to the dump analysis program.
Accordingly, the authorization certificate received in step 501 is sent after the dump analysis program determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
Illustratively, step 504 and 506 may be implemented by an encryption card of the dump analysis terminal.
Optionally, after step 503, the method for analyzing secure dump further comprises step 507.
Step 507, receiving dump progress indication information sent by the dump analysis program, wherein the dump progress indication information comprises an identifier of a target mobile storage device connection interface and a dump progress, and the dump progress is a progress of dumping locomotive operation data in the mobile storage device connected with the corresponding mobile storage device connection interface to a dump analysis terminal; and controlling at least one lamp in the lamp strip corresponding to the identifier of the target mobile storage device connection interface to be lightened on the basis of the dump progress.
Illustratively, step 507 may be implemented by a microcontroller of the dump analysis terminal.
In the embodiment of the disclosure, an authorization certificate sent when a dump analysis program on a dump analysis terminal runs is received through the dump analysis terminal, and the dump analysis program is authenticated based on the authorization certificate; after the authentication is passed, the dump analysis program is allowed to read the locomotive operation data from the corresponding mobile storage device through the mobile storage device connecting interface of the dump analysis terminal, so that the dump analysis terminal can verify the identity of the dump analysis program, the fact that the legal dump analysis program can only read and analyze the locomotive operation data from the mobile storage device is ensured, and the safety of the locomotive operation data in the dump analysis process is improved.
It should be noted that: in practical applications, the above functions may be distributed by different function modules according to needs, that is, the internal structure of the device may be divided into different function modules to complete all or part of the above described functions. In addition, the dump analysis terminal provided by the above embodiment and the safety dump analysis method embodiment of the locomotive operation data belong to the same concept, and the specific implementation process thereof is detailed in the method embodiment and will not be described herein again.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is intended to be exemplary only and not to limit the present disclosure, and any modification, equivalent replacement, or improvement made without departing from the spirit and scope of the present disclosure is to be considered as the same as the present disclosure.

Claims (10)

1. A dump analysis terminal, characterized in that the dump analysis terminal comprises:
a memory having a dump analysis program stored thereon;
a processor;
at least one mobile storage device connection interface;
the processor is configured to perform at least one of,
receiving an authorization certificate sent by the dump analysis program during running;
authenticating the dump analysis program based on the authorization credential;
after the authentication is passed, allowing the dump analysis program to read locomotive operation data from the corresponding mobile storage device through the at least one mobile storage device connection interface.
2. The dump analysis terminal of claim 1, wherein the processor is configured to,
and receiving the authorization certificate sent by the dump analysis program during running by adopting an objective function interface.
3. The dump analysis terminal of claim 1, wherein the processor is configured to,
obtaining core information of the authorization certificate, wherein the core information comprises a validity period, a signature and a certificate issuing unit;
and when the core information of the authorization certificate is consistent with the target information, determining that the dump analysis program is authenticated.
4. The terminal of any of claims 1-3, wherein the terminal further comprises an encryption card, the encryption card configured to,
receiving a terminal identity authentication request sent by the dump analysis program during running, wherein the terminal identity authentication request comprises encrypted data;
decrypting the encrypted data and generating terminal identity response information based on the decrypted data;
sending the terminal identity response information to the dump analysis program;
correspondingly, the processor receives the authorization certificate which is sent after the dump analysis program determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
5. The terminal of any of claims 1-3, wherein the terminal further comprises a microcontroller and at least one light strip, the light strip corresponding to the mobile storage device connection interface one to one, the microcontroller configured to,
receiving dump progress indication information sent by the dump analysis program, wherein the dump progress indication information comprises an identifier of a target mobile storage device connection interface and dump progress, and the dump progress is the progress of dumping locomotive operation data in mobile storage devices connected with the corresponding mobile storage device connection interface to the dump analysis terminal;
and controlling at least one lamp in a lamp strip corresponding to the identifier of the target mobile storage device connection interface to be lightened on the basis of the dump progress.
6. A safe dump analysis method for locomotive operation data is characterized by comprising the following steps:
the dump analysis terminal receives an authorization certificate sent by a dump analysis program during running, wherein the dump analysis program is applied to the dump analysis terminal;
authenticating the dump analysis program based on the authorization credential;
after the authentication is passed, allowing the dump analysis program to read locomotive operation data from the corresponding mobile storage device through the mobile storage device connection interface on the dump analysis terminal.
7. The method of claim 6, wherein receiving the authorization credential sent by the dump analysis program during runtime comprises:
and receiving the authorization certificate sent by the dump analysis program during running by adopting an objective function interface.
8. The secure dump analysis method of claim 6, wherein the authenticating the dump analysis program based on the authorization certificate comprises:
obtaining core information of the authorization certificate, wherein the core information comprises a validity period, a signature and a certificate issuing unit;
and when the core information of the authorization certificate is consistent with the target information, determining that the dump analysis program is authenticated.
9. The secure dump analysis method according to any one of claims 6-8, wherein before the receiving the authorization certificate sent by the dump analysis program during runtime, the secure dump analysis method further comprises:
receiving a terminal identity authentication request sent by the dump analysis program during running, wherein the terminal identity authentication request comprises encrypted data;
decrypting the encrypted data and generating terminal identity response information based on the decrypted data;
sending the terminal identity response information to the dump analysis program;
correspondingly, the received authorization certificate is sent after the dump analysis program determines that the identity of the dump analysis terminal is legal based on the terminal identity response information.
10. The method of any of claims 6-8, wherein after allowing the dump analysis program to read locomotive operating data from the corresponding mobile storage device via a mobile storage device connection interface on the dump analysis terminal, the method further comprises:
receiving dump progress indication information sent by the dump analysis program, wherein the dump progress indication information comprises an identifier of a target mobile storage device connection interface and dump progress, and the dump progress is the progress of dumping locomotive operation data in mobile storage devices connected with the corresponding mobile storage device connection interface to a dump analysis terminal;
and controlling at least one lamp in a lamp strip corresponding to the identifier of the target mobile storage device connection interface to be lightened on the basis of the dump progress.
CN201911372430.5A 2019-12-27 2019-12-27 Dump analysis terminal and safe dump analysis method for locomotive operation data Pending CN111222119A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911372430.5A CN111222119A (en) 2019-12-27 2019-12-27 Dump analysis terminal and safe dump analysis method for locomotive operation data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911372430.5A CN111222119A (en) 2019-12-27 2019-12-27 Dump analysis terminal and safe dump analysis method for locomotive operation data

Publications (1)

Publication Number Publication Date
CN111222119A true CN111222119A (en) 2020-06-02

Family

ID=70829127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911372430.5A Pending CN111222119A (en) 2019-12-27 2019-12-27 Dump analysis terminal and safe dump analysis method for locomotive operation data

Country Status (1)

Country Link
CN (1) CN111222119A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281575A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Method for protecting software
CN101540675A (en) * 2008-12-31 2009-09-23 北京飞天诚信科技有限公司 Smart key equipment and communication method and system of application software
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN103020493A (en) * 2012-12-28 2013-04-03 杭州晟元芯片技术有限公司 Anti-copy software protecting and operating device and anti-copy software protecting and operating method
CN105138904A (en) * 2015-08-25 2015-12-09 华为技术有限公司 Access control method and device
US20160350530A1 (en) * 2014-03-04 2016-12-01 Antaios (Beijing) Information Technology Co., Ltd. Data blackhole processing method based on mobile storage device, and mobile storage device
CN107358114A (en) * 2017-06-12 2017-11-17 深圳市金立通信设备有限公司 A kind of method and terminal for preventing user data loss
CN108768963A (en) * 2018-05-11 2018-11-06 北京握奇智能科技有限公司 The communication means and system of trusted application and safety element

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281575A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Method for protecting software
CN101540675A (en) * 2008-12-31 2009-09-23 北京飞天诚信科技有限公司 Smart key equipment and communication method and system of application software
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN103020493A (en) * 2012-12-28 2013-04-03 杭州晟元芯片技术有限公司 Anti-copy software protecting and operating device and anti-copy software protecting and operating method
US20160350530A1 (en) * 2014-03-04 2016-12-01 Antaios (Beijing) Information Technology Co., Ltd. Data blackhole processing method based on mobile storage device, and mobile storage device
CN105138904A (en) * 2015-08-25 2015-12-09 华为技术有限公司 Access control method and device
CN107358114A (en) * 2017-06-12 2017-11-17 深圳市金立通信设备有限公司 A kind of method and terminal for preventing user data loss
CN108768963A (en) * 2018-05-11 2018-11-06 北京握奇智能科技有限公司 The communication means and system of trusted application and safety element

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李挺 等: "硬盘克隆技术在变电站类unix操作系统监控服务器的应用分析", 《重庆理工大学学报》 *
铁道部劳动和卫生司 等编: "《动车组列控车载信号设备维修岗位》", 30 September 2012 *

Similar Documents

Publication Publication Date Title
CN110324276B (en) Method, system, terminal and electronic device for logging in application
CN111082940B (en) Internet of things equipment control method and device, computing equipment and storage medium
CN102693379B (en) Protection operating system Configuration Values
CN102289627B (en) Many owners of firmware images dispose
KR100806477B1 (en) Remote access system, gateway, client device, program, and storage medium
CN106991298B (en) Access method of application program to interface, authorization request method and device
US9900157B2 (en) Object signing within a cloud-based architecture
US20060053302A1 (en) Information processing apparatus with security module
WO2019129037A1 (en) Equipment authentication method, over-the-air card writing method, and equipment authentication device
US9160542B2 (en) Authorizing use of a test key signed build
US20080022099A1 (en) Information transfer
WO2022105462A1 (en) Database multi-authentication method and system, terminal, and storage medium
WO2020186457A1 (en) Authentication method and apparatus for ip camera
JPWO2008035413A1 (en) Information processing apparatus and information management method
JP2015232810A (en) Storage device, information processor and information processing method
CN106156607B (en) SElinux secure access method and POS terminal
CN111200593A (en) Application login method and device and electronic equipment
JP2018117185A (en) Information processing apparatus, information processing method
CN115943381A (en) Data encryption and decryption method and device
KR20200011328A (en) A secure element for processing and authenticating a digital key and operation metho thereof
CN111770087A (en) Service node verification method and related equipment
CN114760070A (en) Digital certificate issuing method, digital certificate issuing center and readable storage medium
CN111459869B (en) Data access method, device, equipment and storage medium
CN103281188A (en) Method and system for backing up private key in electronic signature token
CN111222119A (en) Dump analysis terminal and safe dump analysis method for locomotive operation data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200602