CN113079147B - Data monitoring system and method based on industrial internet - Google Patents

Data monitoring system and method based on industrial internet Download PDF

Info

Publication number
CN113079147B
CN113079147B CN202110319836.8A CN202110319836A CN113079147B CN 113079147 B CN113079147 B CN 113079147B CN 202110319836 A CN202110319836 A CN 202110319836A CN 113079147 B CN113079147 B CN 113079147B
Authority
CN
China
Prior art keywords
data
module
verification
unit
passed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110319836.8A
Other languages
Chinese (zh)
Other versions
CN113079147A (en
Inventor
朱荣辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Aipujing Software Co ltd
Original Assignee
Zhuhai Aipujing Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Aipujing Software Co ltd filed Critical Zhuhai Aipujing Software Co ltd
Priority to CN202110319836.8A priority Critical patent/CN113079147B/en
Publication of CN113079147A publication Critical patent/CN113079147A/en
Application granted granted Critical
Publication of CN113079147B publication Critical patent/CN113079147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data monitoring system based on an industrial internet, which comprises a network server, a wireless intelligent gateway module, an intelligent terminal, a storage module, an access terminal, a monitoring module, a data emergency processing module and a standby repository. The invention can carry out high-efficiency safety monitoring on data, carry out multiple protection and warning when encountering illegal access data information, ensure that the data cannot be leaked, avoid causing loss, calculate the illegal access rate of each time period according to data analysis and data comparison, and adjust the verification method according to the illegal access rate, thereby achieving reasonable use of the verification method, reducing the system operation amount, prolonging the service life of the system, improving the verification accuracy and the data monitoring safety, carrying out emergency backup on the data through a standby repository, ensuring that the data cannot be lost and avoiding irretrievable consequences.

Description

Data monitoring system and method based on industrial internet
Technical Field
The invention relates to the technical field of industrial internet data monitoring, in particular to a data monitoring system and method based on an industrial internet.
Background
Industrial internetworking is the result of the convergence of global industrial systems with advanced computing, analytics, sensing technologies and internet connectivity. The industrial internet is connected with human-computer through intelligent machine connection, combines software and big data analysis, reconstructs global industry, stimulates productivity, and makes the world better, faster, safer, cleaner and more economical. The essence and core of the industrial internet is that the equipment, production lines, factories, suppliers, products and customers are tightly connected and converged through an industrial internet platform. The method can help the manufacturing industry to elongate an industrial chain, and form cross-equipment, cross-system, cross-factory and cross-regional interconnection and intercommunication, thereby improving the efficiency and promoting the intellectualization of the whole manufacturing service system. The method is also beneficial to promoting the melting development of the manufacturing industry, realizing the crossing development between the manufacturing industry and the service industry and efficiently sharing various key resources of the industrial economy. The data monitoring and collection of the industrial internet plays a decisive role for managers to analyze the industrial operation process.
However, when the conventional monitoring system encounters abnormal access, no corresponding protection processing is set for the abnormal access, which is easy to cause data leakage and data loss.
Disclosure of Invention
The present invention is directed to a data monitoring system and method based on the industrial internet, so as to solve the problems set forth in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: the utility model provides a data monitoring system based on industry internet, includes web server, wireless intelligent gateway module, intelligent terminal, storage module, access terminal, monitoring module, data emergency processing module and reserve repository, web server is used for carrying out platform formula control management to data monitoring system, wireless intelligent gateway module is used for carrying out automatic collection and arrangement to industrial data, intelligent terminal is used for carrying out manual collection and arrangement to industrial data, storage module is used for integrating the storage to industrial data, access terminal is used for the user to look over data, monitoring module is used for monitoring and warning access user's authority, data emergency processing module is used for the emergency processing to unusual visit, reserve repository is used for the secondary storage to industrial data, web server's output with wireless intelligent gateway module intelligent terminal, storage module's input is connected, web server's input with wireless intelligent gateway module with intelligent terminal's output is connected, storage module's output with web server access terminal, monitoring module, data emergency processing module and reserve repository's input with access terminal's input is connected emergency processing module the output with monitoring module.
Further, the network server includes a central processing unit and an information transceiver unit, the central processing unit is configured to analyze, integrate and process data, and the information transceiver unit is configured to transmit and receive information.
Furthermore, the wireless intelligent gateway module comprises a data acquisition unit, a data statistics unit and a data transmission unit, wherein the data acquisition unit is used for acquiring industrial data, the data statistics unit is used for counting the industrial data, and the data transmission unit is used for transmitting the industrial data.
Furthermore, the intelligent terminal comprises a first input unit and a first display unit, wherein the first input unit is used for data input, and the first display unit is used for displaying system data.
Further, the storage module includes a local storage and a cloud storage, the local storage is used for storing system data, and the cloud storage is used for backing up the system data.
Further, the access terminal comprises a second input unit, a second display unit and a verification unit, the second input unit is used for data input, the second display unit is used for displaying system data, the verification unit comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password authentication comprises account authentication and login password authentication, each account corresponds to only one login password, and when the account authentication is matched with the login password authentication, the password authentication is considered to be passed, otherwise, the password authentication is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
facial discernment includes first camera, first scanning module, first calculation module and second database, uses first camera is shooed operator's face to with the photo real-time transmission extremely on the first scanning module, use operator's mouth J as the original point, L is the left eye, and R is the right eye, and F is for right eye, andthe first scanning module carries out scanning modeling on the received photos to enable the photos to form a three-dimensional coordinate system, then the calculating module calculates the distance L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively as follows: l (x) 1 、 y 1 、z 1 )、R(x 2 、y 2 、z 2 )、F(x 3 、y 3 、z 3 );
Thus calculating the distances thereof as: l = √ x 1 2 +y 1 2 +z 1 2 )、R=√(x 2 2 +y 2 2 +z 2 2 )、F=√(x 3 2 +y 3 2 +z 3 2 );
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face recognition is passed, otherwise, the verification is not passed;
the handwriting recognition system comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second calculation module and a third database, the intelligent writing terminal is used for writing verification characters, the verification characters are compared with data stored in the third database after writing, the second camera is used for photographing the hand of an operator in the writing process, the picture is transmitted to the second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received picture, a pen point W is used as an original point to enable the received picture to form a three-dimensional coordinate system, the coordinate position is determined, five-point coordinate values are taken, and M (x is x) coordinate value 4 、y 4 、z 4 )、Q(x 5 、y 5 、z 5 )、P(x 6 、y 6 、z 6 ),E(x 7 、 y 7 、z 7 )、H(x 8 、y 8 、z 8 ) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and angles 1, 2, 3, 4 and 5 of M, Q, P, E and H with the origin of W are respectively calculated, and the calculation formula is as follows:
Cos∠1=(x 4 2 +y 4 2 -z 4 2 )/2x 4 y 4
Cos∠2=(x 5 2 +y 5 2 -z 5 2 )/2x 5 y 5
Cos∠3=(x 6 2 +y 6 2 -z 6 2 )/2x 6 y 6
Cos∠4=(x 7 2 +y 7 2 -z 7 2 )/2x 7 y 7
Cos∠5=(x 8 2 +y 8 2 -z 8 2 )/2x 8 y 8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record which fails the verification is regarded as an illegal access data.
Further, the monitoring module comprises a data collection unit, a curve fitting unit, an illegal access database, a comparison unit and an adjustment unit, wherein the data collection unit is used for collecting and arranging the times and time of illegal access, the curve fitting unit is used for classifying and arranging the data collected by the data collection unit and forming a curve graph, the illegal access rates of early, middle and late time periods are calculated, the comparison unit is used for comparing the data stored in the illegal access database, the adjustment unit is used for adjusting the used verification mode according to the comparison result, four verification methods including password verification, sound recognition, face recognition and handwriting recognition are adopted in the time period with the highest illegal access rate, three verification methods among the four verification methods are randomly selected in the time period with the second highest illegal access rate, and two verification methods among the four verification methods are randomly selected in the time period with the lowest illegal access rate.
Furthermore, the data emergency processing module comprises a data primary processing unit, a data secondary processing unit and a data tertiary processing unit.
Further, the primary data processing unit comprises a code conversion module, the secondary data processing unit comprises a virtual database, the tertiary data processing unit comprises a formatting module, a conveying module and a positioning module, data are protected through triple emergency processing, and the data analysis process is as follows: f is the number of illegal accesses, when 1 is larger than or equal to F and larger than 0, the primary data processing unit is started, the code conversion module is enabled to convert industrial data into codes specific to a user, when 2 is larger than or equal to F and larger than 1, the secondary data processing unit is started, the virtual database is used, illegal accesses cannot acquire real data, data is protected in a double mode, when F is larger than 2, the tertiary data processing unit is started, the conveying module is enabled to transmit the stored data to the standby repository, the formatting module is enabled to permanently delete all data, the positioning module is used for positioning the IP address of the illegal accesses, and then positioning information is transmitted to a user terminal.
The invention also comprises a method of the data monitoring system based on the industrial internet, which comprises the following steps:
a) The wireless intelligent gateway module is used for automatically collecting and sorting industrial data, transmitting the collected industrial data to the network server, manually collecting the industrial data which cannot be automatically collected by using the intelligent terminal, and transmitting the data to the network server;
b) The network server carries out classification processing on the received data and transmits the data to the storage module;
c) The storage module stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) The access terminal is used for inquiring the data of the storage module, the monitoring module carries out four verification modes of password verification, voice recognition, facial recognition and handwriting recognition on access to confirm whether the access module has access authority, and the data analysis process comprises the following steps:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A =1, the password verification is passed, and when A =0, the password verification is not passed;
when B =1, the voice recognition is passed, and when B =0, the voice recognition is not passed;
when C =1, the face recognition is passed, and when C =0, the face recognition is not passed;
when D =1, the handwriting recognition is passed, and when D =0, the handwriting recognition is not passed;
(1) if four verification methods are selected: if a =1,b =1,c =1,d =1, the verification is passed, and if one of the entries is 0, the verification is not passed;
(2) if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of these is 0, the verification fails, otherwise, the verification passes;
(3) if two verification methods are selected: there are several cases as follows: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more of the items are 0, the verification is failed, and otherwise, the verification is passed;
if the verification is passed, the data stored in the storage module can be accessed, if the verification is not passed, the data is regarded as illegally accessed data, and the data emergency processing module is started;
e) The data emergency processing module performs multi-stage data protection on the storage module, and the data analysis process is as follows: when the data emergency processing module detects that the number of times of illegal access is F =1, performing primary protection, performing specific code conversion on data in the storage module, when the number of times of illegal access is F =2, performing secondary protection to generate a virtual database, performing information misleading on the illegal access, when the number of times of illegal access is F =2, performing tertiary protection, transmitting the data in the storage module to the standby repository, automatically performing permanent formatting, completely clearing the data, positioning an IP address of the illegal access, and transmitting the IP address to a user terminal.
Compared with the prior art, the invention has the following beneficial effects:
1. by arranging the network server, the wireless intelligent gateway module, the intelligent terminal, the storage module, the access terminal, the monitoring module and the data emergency processing module, the invention can carry out high-efficiency safety monitoring on data, carry out multiple protection and warning when illegal access data information is encountered, ensure that the data cannot be leaked, avoid loss, calculate the illegal access rate of each time period according to data analysis and data comparison and adjust the verification method according to the illegal access rate, thereby achieving reasonable use of the verification method, reducing the system operation amount, prolonging the service life of the system, improving the verification accuracy and improving the safety of data monitoring.
2. The invention can carry out emergency backup on the data by arranging the standby repository, ensure that the data can not be lost and avoid irretrievable consequences.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a block diagram of the invention as a whole;
FIG. 2 is a flow chart of the monitoring module of the present invention;
in the figure: 1. a network server; 2. a wireless intelligent gateway module; 3. an intelligent terminal; 4. a storage module; 5. accessing a terminal; 6. a monitoring module; 7. a data emergency processing module; 8. a backup repository; 9. a central processing unit; 10. an information transmitting/receiving unit; 11. a data acquisition unit; 12. a data statistics unit; 13. a data transmission unit; 14. a first input unit; 15. a first display unit; 16. storing locally; 17. cloud storage; 18. a second input unit; 19. a second display unit; 20. a verification unit; 21. a data collection unit; 22. A curved fitting unit; 23. illegally accessing the database; 24. a comparison unit; 25. an adjustment unit; 26. a data primary processing unit; 27. a data secondary processing unit; 28. and the data three-level processing unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: the utility model provides a data monitoring system based on industry internet, includes web server 1, wireless intelligent gateway module 2, intelligent terminal 3, storage module 4, access terminal 5, monitoring module 6, data emergency processing module 7 and reserve repository 8, web server 1 is used for carrying out platform formula control management to data monitoring system, wireless intelligent gateway module 2 is used for carrying out automatic collection and arrangement to industrial data, intelligent terminal 3 is used for carrying out manual collection and arrangement to industrial data, storage module 4 is used for integrating the storage to industrial data, access terminal 5 is used for the user to look over data, monitoring module 6 is used for monitoring and warning visiting user's authority, data emergency processing module 7 is used for the emergency processing to unusual access, reserve repository 8 is used for the secondary storage to industrial data, web server 1's output with wireless intelligent gateway module 2 intelligent terminal 3, storage module 4's input is connected, web server 1's input with wireless intelligent gateway module 2 with intelligent terminal 3's output, intelligent storage module 4 with the output of network server 1, reserve processing module 5, reserve processing module 7 with the input of monitoring module 6 is connected emergency processing module 7 the input of access terminal 6 with the input of emergency processing module 8.
The network server 1 comprises a central processing unit 9 and an information transceiving unit 10, wherein the central processing unit 9 is used for analyzing and integrating data, and the information transceiving unit 10 is used for transceiving information.
The wireless intelligent gateway module 2 comprises a data acquisition unit 11, a data statistics unit 12 and a data transmission unit 13, wherein the data acquisition unit 11 is used for acquiring industrial data, the data statistics unit 12 is used for counting the industrial data, and the data transmission unit 13 is used for transmitting the industrial data.
The intelligent terminal 3 comprises a first input unit 14 and a first display unit 15, wherein the first input unit 14 is used for data input, and the first display unit 15 is used for displaying system data.
The storage module 4 includes a local storage 16 and a cloud storage 17, where the local storage 16 is used for storing system data, and the cloud storage 17 is used for backing up the system data.
The access terminal 5 comprises a second input unit 18, a second display unit 19 and a verification unit 20, the second input unit 18 is used for data input, the second display unit 19 is used for displaying system data, the verification unit 20 comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password verification comprises account verification and login password verification, each account only corresponds to one login password, and when the account verification and the login password verification are matched, the password verification is considered to be passed, otherwise, the password verification is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
the face recognition comprises a first camera, a first scanning module, a first calculating module and a second database, the first camera is used for photographing the face of an operator, the picture is transmitted to the first scanning module in real time, the mouth J of the operator is used as an origin, L is used as a left eye, R is used as a right eye, and F is used as a nose, the first scanning module carries out scanning modeling on the received picture to enable the picture to form a three-dimensional coordinate system, then the calculating module calculates the distance of L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively as follows: l (x) 1 、 y 1 、z 1 )、R(x 2 、y 2 、z 2 )、F(x 3 、y 3 、z 3 );
Thus calculating the distances thereof as: l = √ x 1 2 +y 1 2 +z 1 2 )、R=√(x 2 2 +y 2 2 +z 2 2 )、F=√(x 3 2 +y 3 2 +z 3 2 );
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face recognition is passed, otherwise, the verification is not passed;
the handwriting recognition comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second calculation module and a third database, the intelligent writing terminal is used for writing verification characters, the verification characters are compared with data stored in the third database after writing, the second camera is used for photographing the hand of an operator in the writing process, the picture is transmitted to the second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received picture, a pen point W is an original point, a three-dimensional coordinate system is formed by the pen point W, the coordinate position is determined, and the coordinate position is takenCoordinate value of five points, M (x) 4 、y 4 、z 4 )、Q(x 5 、y 5 、z 5 )、P(x 6 、y 6 、z 6 ),E(x 7 、 y 7 、z 7 )、H(x 8 、y 8 、z 8 ) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and angles 1, 2, 3, 4 and 5 of M, Q, P, E and H with the origin of W are respectively calculated, and the calculation formula is as follows:
Cos∠1=(x 4 2 +y 4 2 -z 4 2 )/2x 4 y 4
Cos∠2=(x 5 2 +y 5 2 -z 5 2 )/2x 5 y 5
Cos∠3=(x 6 2 +y 6 2 -z 6 2 )/2x 6 y 6
Cos∠4=(x 7 2 +y 7 2 -z 7 2 )/2x 7 y 7
Cos∠5=(x 8 2 +y 8 2 -z 8 2 )/2x 8 y 8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record failing to pass the verification is regarded as an illegal access data.
The monitoring module 6 comprises a data collecting unit 21, a curve fitting unit 22, an illegal access database 23, a comparing unit 24 and an adjusting unit 25, the data collecting unit 21 is used for collecting and sorting the times and time of illegal access, the curve fitting unit 22 is used for classifying and sorting the data collected by the data collecting unit 21 and forming a curve graph, the illegal access rates of early, middle and late periods are calculated, the comparing unit 24 is used for comparing the data stored in the illegal access database 23, the adjusting unit 25 is used for adjusting the used verification mode according to the comparison result, four verification methods including password verification, sound recognition, face recognition and handwriting recognition are adopted in the period with the highest illegal access rate, three verification methods in the four verification methods are randomly selected in the period with the second highest illegal access rate, and two verification methods in the four verification methods are randomly selected in the period with the lowest illegal access rate.
The data emergency processing module 7 includes a primary data processing unit 26, a secondary data processing unit 27 and a tertiary data processing unit 28.
The primary data processing unit 26 includes a code conversion module, the secondary data processing unit 27 includes a virtual database, the tertiary data processing unit 28 includes a formatting module, a conveying module and a positioning module, and data is protected through triple emergency processing, and the data analysis process is as follows: f is the number of illegal accesses, when 1 ≧ F >0, the primary data processing unit 26 is started to convert the code of the industrial data by the code conversion module and convert the data into a code specific to the user, when 2 ≧ F >1, the secondary data processing unit 27 is started to use the virtual database to make illegal accesses unable to obtain real data and to perform double protection on the data, and when F >2, the tertiary data processing unit 28 is started to make the transport module transmit the stored data to the backup repository 8 and make the formatting module permanently delete all the data and use the positioning module to position the IP address of the illegal access and then transmit the positioning information to the user terminal.
The invention also comprises a method of the data monitoring system based on the industrial internet, which comprises the following steps:
a) The wireless intelligent gateway module 2 is used for automatically collecting and arranging industrial data, the collected industrial data are transmitted to the network server, the intelligent terminal 3 is used for manually collecting the industrial data which cannot be automatically collected, and the data are transmitted to the network server 1;
b) The network server 1 classifies the received data and transmits the data to the storage module 4;
c) The storage module 4 stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) The access terminal 5 is used for inquiring the data of the storage module 4, the monitoring module 6 is used for carrying out four verification modes of password verification, voice recognition, face recognition and handwriting recognition on access to confirm whether the access terminal has access authority, and the data analysis process is as follows:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A =1, the password verification is passed, and when A =0, the password verification is not passed;
when B =1, the voice recognition is passed, and when B =0, the voice recognition is not passed;
when C =1, the face recognition is passed, and when C =0, the face recognition is not passed;
when D =1, the handwriting recognition is passed, and when D =0, the handwriting recognition is not passed;
(1) if four verification methods are selected: if a =1, b =1, c =1, d =1, then the verification is passed, and if one of the entries is 0, then the verification is not passed;
(2) if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of these is 0, the verification fails, otherwise, the verification passes;
(3) if two verification methods are selected: there are several cases: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more of the items is 0, the verification is failed, and otherwise, the verification is passed;
if the verification is passed, the data stored in the storage module 4 can be accessed, the data which is not passed is regarded as illegal access data, and the data emergency processing module 7 is started;
e) The data emergency processing module 7 performs multi-stage data protection on the storage module 4, and the data analysis process is as follows: when the data emergency processing module 7 detects that the number of times of illegal access is F =1, performing primary protection, performing specific code conversion on data inside the storage module 4, when F =2 is detected, performing secondary protection to generate a virtual database, misleading information of the illegal access, when F >2 is detected, performing tertiary protection, transmitting the data inside the storage module 4 to the standby repository 8, automatically performing permanent formatting, completely clearing the data, positioning an IP address of the illegal access, and transmitting the IP address to a user terminal.
The specific implementation mode is as follows: during the use, use wireless intelligent gateway module 2 to carry out automatic collection to industrial data, use intelligent terminal 3 to carry out manual input to the industrial data that can't carry out automatic collection, data transmission to network server 1 that will collect, network server 1 carries out categorised arrangement to the industrial data received, and carry the data of handling to storage module 4, the user can use access terminal 5 to visit the data of the inside storage of storage module 4 and look over, monitoring module 6 verifies the terminal of carrying out the visit, if verify and pass, then can look over the inside data of storage module 4, if verify and fail, then start data urgent processing module 7 and carry out multiple protection to the inside data of storage module 4, avoid data leakage, and with data emergency backup to reserve repository 8, avoid data loss.
The working principle of the invention is as follows:
referring to the attached drawings 1-2 of the specification, the invention can carry out high-efficiency safety monitoring on data by arranging a network server 1, a wireless intelligent gateway module 2, an intelligent terminal 3, a storage module 4, an access terminal 5, a monitoring module 6 and a data emergency processing module 7, carry out multiple protection and warning when illegal access data information is encountered, ensure that the data cannot be leaked and loss is avoided, calculate the illegal access rate of each time period according to data analysis and data comparison, and adjust a verification method according to the illegal access rate, thereby achieving reasonable use of the verification method, reducing the system operation amount, prolonging the service life of the system, improving the verification accuracy and improving the safety of data monitoring, and carrying out emergency backup on the data through a standby repository 8, ensuring that the data cannot be lost and avoiding irretrievable consequences.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. The utility model provides a data monitoring system based on industry internet, includes web server (1), wireless intelligent gateway module (2), intelligent terminal (3), storage module (4), access terminal (5), monitoring module (6), data emergency processing module (7) and reserve repository (8), its characterized in that: network server (1) is used for carrying out platform formula control management to data monitoring system, wireless intelligent gateway module (2) is used for carrying out automatic collection and arrangement to industrial data, intelligent terminal (3) are used for carrying out manual collection and arrangement to industrial data, storage module (4) are used for integrating the storage to industrial data, access terminal (5) are used for the user to look over data, monitoring module (6) are used for monitoring and warning visiting user's authority, data emergency processing module (7) are used for the emergency treatment to unusual access, reserve repository (8) are used for the secondary storage to industrial data, network server's (1) output with wireless intelligent gateway module (2), intelligent terminal (3), the input of storage module (4) is connected, network server's (1) input with wireless intelligent gateway module (2) with the output of intelligent terminal (3) is connected, the output of storage module (4) with network server (1), access terminal (5), monitoring module (6), reserve processing module (7) and reserve processing module's (7) access terminal module (6) and reserve processing module's input are connected the input of storage module (8) and reserve processing module (8) access terminal module (6) the input of data processing module (8) is connected with input of defeated processing module (6) and input of repository (8) and input of access module (6) and reserve processing module (8) the input The data emergency processing module (7) comprises a data primary processing unit (26), a data secondary processing unit (27) and a data tertiary processing unit (28), the data primary processing unit (26) comprises a code conversion module, the data secondary processing unit (27) comprises a virtual database, the data tertiary processing unit (28) comprises a formatting module, a conveying module and a positioning module, data are protected through triple emergency processing, and the data analysis process is as follows: f is illegal access times, when the number of times is 1 ≧ F >0, the primary data processing unit (26) is started, the code conversion module is enabled to convert industrial data into codes specific to users, when the number of times is 2 ≧ F >1, the secondary data processing unit (27) is started, the virtual database is used, illegal access cannot acquire real data, data is protected in a double mode, when the number of times is F >2, the tertiary data processing unit (28) is started, the conveying module is enabled to transmit the stored data to the standby repository (8), the formatting module is enabled to delete all data permanently, the positioning module is used to position IP addresses illegally accessed, and positioning information is transmitted to a user terminal.
2. The industrial internet-based data monitoring system of claim 1, wherein: the network server (1) comprises a central processing unit (9) and an information transceiving unit (10), wherein the central processing unit (9) is used for analyzing, integrating and processing data, and the information transceiving unit (10) is used for transceiving information.
3. The industrial internet-based data monitoring system of claim 1, wherein: the wireless intelligent gateway module (2) comprises a data acquisition unit (11), a data statistics unit (12) and a data transmission unit (13), wherein the data acquisition unit (11) is used for acquiring industrial data, the data statistics unit (12) is used for statistics of the industrial data, and the data transmission unit (13) is used for transmitting the industrial data.
4. The industrial internet-based data monitoring system of claim 1, wherein: the intelligent terminal (3) comprises a first input unit (14) and a first display unit (15), wherein the first input unit (14) is used for data input, and the first display unit (15) is used for displaying system data.
5. The industrial internet-based data monitoring system of claim 1, wherein: the storage module (4) comprises a local storage (16) and a cloud storage (17), wherein the local storage (16) is used for storing system data, and the cloud storage (17) is used for backing up the system data.
6. The industrial internet-based data monitoring system of claim 1, wherein: the access terminal (5) comprises a second input unit (18), a second display unit (19) and a verification unit (20), the second input unit (18) is used for data input, the second display unit (19) is used for displaying system data, the verification unit (20) comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password verification comprises account verification and login password verification, each account only corresponds to one login password, and when the account verification and the login password verification are matched, the password verification is considered to be passed, otherwise, the password verification is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
the face recognition comprises a first camera, a first scanning module, a first calculating module and a second database, the first camera is used for photographing the face of an operator, the picture is transmitted to the first scanning module in real time, the mouth J of the operator is used as an origin, L is used as a left eye, R is used as a right eye, and F is used as a nose, the first scanning module carries out scanning modeling on the received picture to enable the picture to form a three-dimensional coordinate system, then the calculating module calculates the distance of L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively as follows: l (x) 1 、y 1 、z 1 )、R(x 2 、y 2 、z 2 )、F(x 3 、y 3 、z 3 );
Thus calculating the distances thereof as: l = √ (x) 1 2 +y 1 2 +z 1 2 )、R=√(x 2 2 +y 2 2 +z 2 2 )、F=√(x 3 2 +y 3 2 +z 3 2 );
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face recognition is passed, otherwise, the verification is not passed;
handwriting recognition comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second computing module and a third database, the intelligent writing terminal is used for writing verification characters, the verification characters are compared with data stored in the third database after writing, the second camera is used for photographing hands of an operator in the writing process, the pictures are transmitted to the second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received pictures, a pen point W is used as an original point to enable the pictures to form a three-dimensional coordinate system, the coordinate position is determined, a five-point coordinate value is taken, and M (x is an x coordinate value 4 、y 4 、z 4 )、Q(x 5 、y 5 、z 5 )、P(x 6 、y 6 、z 6 ),E(x 7 、y 7 、z 7 )、H(x 8 、y 8 、z 8 ) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and angles 1, 2, 3, 4 and 5 of M, Q, P, E and H with the origin of W are respectively calculated, and the calculation formula is as follows:
Cos∠1=(x 4 2 +y 4 2 -z 4 2 )/2x 4 y 4
Cos∠2=(x 5 2 +y 5 2 -z 5 2 )/2x 5 y 5
Cos∠3=(x 6 2 +y 6 2 -z 6 2 )/2x 6 y 6
Cos∠4=(x 7 2 +y 7 2 -z 7 2 )/2x 7 y 7
Cos∠5=(x 8 2 +y 8 2 -z 8 2 )/2x 8 y 8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record failing to pass the verification is regarded as an illegal access data.
7. The industrial internet-based data monitoring system of claim 1, wherein: the monitoring module (6) comprises a data collection unit (21), a curve fitting unit (22), an illegal access database (23), a comparison unit (24) and an adjustment unit (25), wherein the data collection unit (21) is used for collecting and sorting the times and time of illegal access, the curve fitting unit (22) is used for classifying and sorting the data collected by the data collection unit (21) and forming a curve graph, the illegal access rates of early, middle and late periods are calculated, the comparison unit (24) is used for comparing the data stored in the illegal access database (23), the adjustment unit (25) is used for adjusting the used verification modes according to the comparison result, four verification methods of password verification, sound recognition, face recognition and handwriting recognition are adopted in the period with the highest illegal access rate, three verification methods of the four verification methods are randomly selected in the period with the second highest illegal access rate, and two verification methods of the four verification methods are randomly selected in the period with the lowest illegal access rate.
8. The method of an industrial internet-based data monitoring system according to any one of claims 1 to 7, wherein: the method comprises the following steps:
a) The wireless intelligent gateway module (2) is used for automatically collecting and arranging industrial data, the collected industrial data are transmitted to the network server, the intelligent terminal (3) is used for manually collecting the industrial data which cannot be automatically collected, and the data are transmitted to the network server (1);
b) The network server (1) classifies the received data and transmits the data to the storage module (4);
c) The storage module (4) stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) The access terminal (5) is used for inquiring the data of the storage module (4), the monitoring module (6) carries out four verification modes of password verification, voice recognition, face recognition and handwriting recognition on access to confirm whether the access terminal has access authority, and the data analysis process is as follows:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A =1, the password verification is passed, and when A =0, the password verification is not passed;
when B =1, the voice recognition is passed, and when B =0, the voice recognition is not passed;
when C =1, the face recognition is passed, and when C =0, the face recognition is not passed;
when D =1, the handwriting recognition is passed, and when D =0, the handwriting recognition is not passed;
(1) if four verification methods are selected: if a =1,b =1,c =1,d =1, the verification is passed, and if one of the entries is 0, the verification is not passed;
(2) if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of these is 0, the verification fails, otherwise, the verification passes;
(3) if two verification methods are selected: there are several cases as follows: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more of the items is 0, the verification is failed, and otherwise, the verification is passed;
if the verification is passed, the data stored in the storage module (4) can be accessed, the data which is not passed is regarded as illegally accessed data, and the data emergency processing module (7) is started;
e) The data emergency processing module (7) performs multi-stage data protection on the storage module (4), and the data analysis process is as follows: when the data emergency processing module (7) detects that the number of times of illegal access is F =1, primary protection is carried out, specific code conversion is carried out on data in the storage module (4), when F =2 is detected, secondary protection is carried out to generate a virtual database, information misleading is carried out on the illegal access, when F >2 is detected, tertiary protection is carried out, the data in the storage module (4) is automatically and permanently formatted after being transmitted to the standby repository (8), all the data are cleared, the IP address of the illegal access is located, and the IP address is transmitted to a user terminal.
CN202110319836.8A 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet Active CN113079147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110319836.8A CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110319836.8A CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Publications (2)

Publication Number Publication Date
CN113079147A CN113079147A (en) 2021-07-06
CN113079147B true CN113079147B (en) 2022-12-02

Family

ID=76610748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110319836.8A Active CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Country Status (1)

Country Link
CN (1) CN113079147B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009169615A (en) * 2008-01-15 2009-07-30 Hitachi Computer Peripherals Co Ltd Data leakage prevention method and magnetic disk device to which same method is applied
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3787431B2 (en) * 1997-04-11 2006-06-21 株式会社日立製作所 Abuse detection method
CN107483406A (en) * 2017-07-17 2017-12-15 北京捷通华声科技股份有限公司 A kind of method for authenticating user identity and equipment
CN108989466A (en) * 2018-08-30 2018-12-11 共享智能铸造产业创新中心有限公司 Industrial cloud platform management system
CN111080994B (en) * 2019-12-20 2023-06-30 成都华迈通信技术有限公司 Intelligent security system based on Internet of things
CN112462724A (en) * 2020-12-11 2021-03-09 四川川能智网实业有限公司 Data monitoring system based on industrial internet

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009169615A (en) * 2008-01-15 2009-07-30 Hitachi Computer Peripherals Co Ltd Data leakage prevention method and magnetic disk device to which same method is applied
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system

Also Published As

Publication number Publication date
CN113079147A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN105404860A (en) Method and device for managing information of lost person
CN111461711B (en) Tracking system for block chain transaction
CN103237308B (en) Distributed intrusion detection method of vehicle ad hoc network
CN108600154A (en) A kind of government affairs remote authentication system and method
CN109583505A (en) A kind of object correlating method, device, equipment and the medium of multisensor
CN108537422A (en) Security risk early warning system and method
CN110813792A (en) Intelligent garbage recognition and classification method
CN110110752A (en) A kind of identification of rubbish and classification method, device and terminal device
CN115103157A (en) Video analysis method and device based on edge cloud cooperation, electronic equipment and medium
CN112087604A (en) Intelligent monitoring video management and control method based on image recognition
CN113079147B (en) Data monitoring system and method based on industrial internet
CN108182382A (en) Based on the similar Activity recognition method and system of figure
CN113506096A (en) Inter-system interface method based on industrial internet identification analysis system
CN116383786B (en) Big data information supervision system and method based on Internet of things
CN116233902B (en) Wireless communication network anomaly identification system and method based on big data
CN109409295A (en) Multiple terminals stereo intelligent testimony of a witness verifying system
CN110113421A (en) A kind of big data information processing system based on Internet of Things
CN111127036A (en) Wine product coding five-level correlation method
CN110211013A (en) A kind of random inspection system and method for examination of law enforcement
CN106034044B (en) The method and apparatus of alert analysis
CN113572792A (en) Engineering measurement intelligent management platform based on Internet of things
CN112884165A (en) Federal machine learning-oriented full-flow service migration method and system
CN106548143A (en) It is a kind of based on facial recognition techniques and the face identification system and method for memory function
CN111046837A (en) Face recognition equipment based on 5G framework
CN106599267B (en) Method and device for deleting data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant