CN115484172A - Management system and method of computer control terminal based on Internet of things - Google Patents

Management system and method of computer control terminal based on Internet of things Download PDF

Info

Publication number
CN115484172A
CN115484172A CN202211127761.4A CN202211127761A CN115484172A CN 115484172 A CN115484172 A CN 115484172A CN 202211127761 A CN202211127761 A CN 202211127761A CN 115484172 A CN115484172 A CN 115484172A
Authority
CN
China
Prior art keywords
information
computer
wiring
machine room
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211127761.4A
Other languages
Chinese (zh)
Other versions
CN115484172B (en
Inventor
宝吉良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinghai IoT Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202211127761.4A priority Critical patent/CN115484172B/en
Publication of CN115484172A publication Critical patent/CN115484172A/en
Application granted granted Critical
Publication of CN115484172B publication Critical patent/CN115484172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • H04L43/045Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Abstract

The invention discloses a management system and a management method of a computer control terminal based on the Internet of things, belonging to the field of computer management, wherein the management system of the computer control terminal comprises an information acquisition module, an information protection module, an information analysis module and a terminal display module; the information acquisition module is used for acquiring computer information and machine room information, the information protection module is used for protecting the acquired information, the information analysis module is used for analyzing the acquired data information, the terminal display module is used for displaying the analyzed result, and relevant technicians take corresponding measures according to the displayed result. According to the invention, positioning is carried out through the Beidou short message, basic information of a computer is input, encryption protection is carried out through a firewall and the Internet of things, an optimal wiring path is planned, verification and adjustment are carried out in real time, display is carried out according to an analysis result, and a prompt is carried out when an abnormal condition is detected, so that the efficiency of circuit layout is improved.

Description

Management system and method of computer control terminal based on Internet of things
Technical Field
The invention relates to the field of computer management, in particular to a management system and a management method of a computer control terminal based on the Internet of things.
Background
The computer is a modern electronic computing machine for high-speed computing, can perform numerical computation and logic computation, has a memory function, and is modern intelligent electronic equipment capable of operating according to programs and automatically processing mass data at high speed. Computers have had an extremely important impact on human productivity and social activities and have been rapidly developed with great vitality. The application field of the computer system is expanded from the initial military scientific research application to various fields of society, a large-scale computer industry is formed, the technology progress in the global range is driven, the deep social revolution is caused, and the computer is spread throughout general schools, enterprises and public institutions, enters common people and becomes an essential tool in the information society.
With the continuous development of science and technology, people can not leave the use of computers more and more. In operation, computers are also widely used in various industries, such as computer front end design industry, service industry, communication industry, etc., so that the use of computers in various enterprises is also gradually increasing. The computer not only accelerates the office speed and improves the working efficiency, but also avoids paper waste and facilitates network data transmission.
However, when an enterprise uses a computer, the layout of the computer circuit is an inevitable problem, and for the computer circuit, if the cable is used for a long time, the signal strength is affected, and if the circuit is arranged in parallel, interference is generated, so that the use of the computer is affected.
Therefore, it is necessary to reasonably arrange the circuit layout between the computer terminal and the computer room, reduce the interference influence and protect the data information between the computer terminals. Therefore, it is necessary to provide a management system and method for a computer controlled terminal based on the internet of things.
Disclosure of Invention
The invention aims to provide a management system and a management method of a computer control terminal based on the Internet of things.
In order to solve the technical problems, the invention provides the following technical scheme: a management system of a computer control terminal based on the Internet of things comprises: the system comprises an information acquisition module, an information protection module, an information analysis module and a terminal display module;
the information acquisition module is connected with the information protection module, the information protection module is connected with the information analysis module, and the information analysis module is connected with the terminal display module; the information acquisition module is used for acquiring computer information and machine room information, the information protection module is used for protecting the acquired information, the information analysis module is used for analyzing the acquired data information, the terminal display module is used for displaying the analyzed result, and relevant technicians take corresponding measures according to the displayed result.
Further, the information acquisition module includes basic information acquisition unit and positioning unit, basic information acquisition unit is used for gathering the basic information of computer, for example department, serial number, user etc to be convenient for relevant personnel manage, when certain computer network breaks down, can clearly know and correspond computer lab internal connection interface positional information, positioning unit gathers the real-time position when laying wire computer, computer lab and technical staff through big dipper short message.
Furthermore, the information protection module comprises a firewall and an information encryption unit, wherein the firewall is used for performing security protection on the acquired information and data information transmitted by using a computer through a network and preventing external users from entering the computer without consent, such as Trojan detection, network worm detection, CGI/IIS server intrusion detection and the like, and the firewall is a method for separating an intranet from a public access network and is actually an application security technology and an isolation technology established on the basis of modern communication network technology and information security technology. The firewall is mainly used for generating a protective barrier between the environments of an internal network and an external network by the action of hardware and software, so that the blockage of unsafe network factors of the computer is realized. The firewall has the functions of serving as a barrier of network security, preventing internal information from leaking, monitoring audit and the like.
The information encryption unit encrypts collected information and data information transmitted through a network in a classified mode through the Internet of things by adopting an elliptic curve digital signature algorithm, the information is encrypted by using a public key, technicians in different departments sign and decrypt the information through different private keys, and then the public key is used for verifying whether the signature is legal or not, so that the privacy and the safety of the data can be effectively guaranteed.
Further, the information analysis module is including the wiring planning unit, the unit and the data memory cell are verified in the wiring, the wiring planning unit is used for carrying out rational planning to the wiring between computer and the computer lab, the unit is verified in the wiring is used for verifying the rationality of circuit layout, prevents the parallel condition of circuit, reduces signal interference, the data memory cell is used for saving the data information of gathering and the circuit layout data information of analysis.
Furthermore, the terminal display module includes display element and alarm unit, the display element is used for showing the analysis result through terminal equipment, for example cell-phone, panel computer etc. and the relevant technical staff who carries out the wiring to computer and computer lab takes corresponding measure according to the analysis result, alarm unit is used for reporting to the police when detecting that abnormal conditions appears and reminds, for example wiring problem, server suffer virus invasion and the outside user who is not allowed to log in system etc..
A management method of a computer control terminal based on the Internet of things comprises the following steps:
s1, collecting basic information of a computer, collecting real-time position information of the computer, a machine room and technicians during wiring, and carrying out encryption protection on the collected information and data information transmitted by using a network;
s2, analyzing the acquired information, and planning wiring between a computer and a machine room;
s3, verifying a wiring path between the planned computer and the machine room;
and S4, displaying the analysis result through the terminal, and alarming and reminding when the abnormal condition is detected.
Furthermore, in step S2, according to the computer position and the machine room position, an a-algorithm is adopted to perform optimal path planning on the wiring, the a-algorithm is a very common path search and graph traversal algorithm, and has better performance and accuracy, and has the advantages of rapid response to the environment, direct path search and the like;
and (3) optimally planning the line layout by adopting an evaluation function m (alpha):
m(α)=p(α)+q(α);
where the wiring technician's position state is set to α, and p (α) represents the minimum distance from the computer position to state α, which can be obtained by recursive calculation:
p(α)=p(α′)+d(α′,α);
wherein the initial position state of the design computer is α ', d (α', α) representing the actual distance from the computer position to state α;
q (alpha) represents a heuristic estimation function from the position state alpha to the position of the machine room by the technician, the existence of q (alpha) enables the algorithm to advance towards the most promising direction, and in order to ensure that the optimal solution can be searched, the heuristic function q (alpha) cannot be larger than the actual wiring path cost from the position state alpha to the position of the machine room by the technician, and the following conditions need to be met:
q(α′)≤q(α)+d(α′,α);
the optimal path is found when the state is expanded, so that planning is carried out;
calculate q (α) using euclidean distance:
Figure BDA0003849641790000041
wherein (x) i ,y i ) Coordinates representing the technician in the position state α, (x) k ,y k ) The coordinates of the position of the machine room are represented, the plane rectangular coordinate system can be established by setting the machine room as the original point, and a set of coordinate system suitable for enterprises can be established according to actual conditions. Euclidean distance, also known as euclidean distance, is the true distance between two points in m-dimensional space.
Further, in step S3, a vector is used to verify the wiring path between the computer and the machine room;
the distance L between the laid wire and the surrounding wires is calculated according to the following formula:
Figure BDA0003849641790000042
setting the distance threshold to L Threshold(s)
The coordinate when the technician is wiring in the position state α is (x) i ,y i ) At this time, the coordinates of the peripheral wiring are (x) j ,y j ) The next time, the technician's coordinates are (x) i ′,y i ') and the coordinates of the surrounding wiring are (x) j ′,y j ') the wiring direction and the surrounding wiring direction are verified and calculated according to the following formula:
Figure BDA0003849641790000043
where θ represents a technician wiring position coordinate (x) i ,y i ) And the next wiring position coordinate (x) i ′,y i ') coordinates (x) of the formed vector and surrounding wiring j ,y j ) With its next moment coordinate (x) j ′,y j ') angle of the vector formed;
when cos theta =1 and L ≦ L Threshold(s) And alarming and reminding are carried out, and wiring planning is carried out again according to the wiring position of the current technician.
Further, in step S4, the analysis result is displayed by using a terminal, and a relevant technician performs wiring according to the analysis result and performs real-time adjustment; meanwhile, in the subsequent maintenance process, the wiring condition between the computer and the machine room can be known by calling the information in the data storage unit through the terminal; when the abnormal conditions are detected, such as wiring problems, server invasion by viruses and unauthorized external users log in the system, the system gives an alarm to remind, related technicians are informed, and measures are taken in time to deal with the problems.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, by acquiring the basic information of the computer, acquiring the real-time position information of the computer, the machine room and technicians during wiring and performing data analysis, the layout of the route can be reasonably planned, the optimal route planning of the line between the computer control terminal and the machine room is realized, the cable resource is saved, and the signal strength is ensured. Meanwhile, after a line path is planned, route verification is carried out, technicians can be reminded of adjusting in real time during wiring, and magnetic field interference among cables is reduced to the maximum extent. Meanwhile, a firewall is adopted to allow external users not to break into an enterprise system, an elliptic curve digital signature algorithm is adopted through the Internet of things, data information is classified and encrypted, a public key is used for encryption, technicians in different departments carry out signature decryption through different private keys, and then the public key is used for verifying whether the signature is legal or not, so that the privacy and the safety of data can be effectively guaranteed, and when abnormal conditions occur, an alarm is sent out to remind related technicians to take measures.
The invention can be used when the computer terminal and the machine room are arranged, and can also call the collected information and the line arrangement analysis information when the later check and maintenance is carried out, when a certain computer terminal line has a fault, technicians can timely know the related information of the computer terminal, and even if the technicians for wiring maintenance leave the job and replace the new technicians, under the condition of not being familiar with the specific line arrangement, the line arrangement of the computer can be timely known through the reference system, so that the check and maintenance are carried out, the time for line inspection is greatly shortened, the maintenance efficiency is improved, and the computer control terminal is convenient to manage.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a module composition of a management system of a computer control terminal based on the Internet of things;
FIG. 2 is a schematic diagram illustrating steps of a management method for a computer control terminal based on the Internet of things according to the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides a technical solution: a management system of a computer control terminal based on the Internet of things comprises: the system comprises an information acquisition module, an information protection module, an information analysis module and a terminal display module;
the information acquisition module is connected with the information protection module, the information protection module is connected with the information analysis module, and the information analysis module is connected with the terminal display module; the information acquisition module is used for acquiring computer information and machine room information, the information protection module is used for protecting the acquired information, the information analysis module is used for analyzing the acquired data information, the terminal display module is used for displaying the analyzed result, and relevant technicians take corresponding measures according to the displayed result.
Further, the information acquisition module includes basic information acquisition unit and positioning unit, basic information acquisition unit is used for gathering the basic information of computer, for example department, serial number, user etc to be convenient for relevant personnel manage, when certain computer network breaks down, can clearly know and correspond the computer lab in connecting interface positional information, positioning unit gathers the real-time position when laying wire computer, computer lab and technical staff through big dipper short message.
Further, the information protection module comprises a firewall and an information encryption unit, the firewall is used for carrying out safety protection on collected information and data information transmitted by using a computer to prevent external users from entering the computer without consent, such as Trojan horse detection, network worm detection, CGI/IIS server intrusion detection and the like, and the firewall is a method for separating an intranet from a public access network and is actually an application safety technology and an isolation technology established on the basis of modern communication network technology and information safety technology. The firewall is mainly used for generating a protective barrier between the environment of internal and external networks by means of the action of hardware and software, so as to block unsafe network factors of the computer. The firewall has the functions of serving as a barrier of network security, preventing leakage of internal information, monitoring audit and the like.
The information encryption unit encrypts collected information and data information transmitted through a network in a classified mode through the Internet of things by adopting an elliptic curve digital signature algorithm, the information is encrypted by using a public key, technicians in different departments sign and decrypt the information through different private keys, and then the public key is used for verifying whether the signature is legal or not, so that the privacy and the safety of the data can be effectively guaranteed.
Further, the information analysis module is including the wiring planning unit, the unit and the data memory cell are verified in the wiring, the wiring planning unit is used for carrying out rational planning to the wiring between computer and the computer lab, the unit is verified in the wiring is used for verifying the rationality of circuit layout, prevents the parallel condition of circuit, reduces signal interference, the data memory cell is used for saving the data information of gathering and the circuit layout data information of analysis.
Furthermore, the terminal display module includes a display unit and an alarm unit, the display unit is used for displaying the analysis result through terminal equipment, such as a mobile phone, a tablet personal computer and the like, relevant technical personnel who wire the computer and the machine room take corresponding measures according to the analysis result, and the alarm unit is used for alarming and reminding when detecting that abnormal conditions occur, such as that the wire is in trouble, the server is invaded by viruses and an unallowed external user logs in the system.
A management method of a computer control terminal based on the Internet of things comprises the following steps:
s1, collecting basic information of a computer, collecting real-time position information of the computer, a machine room and technicians during wiring, and carrying out encryption protection on the collected information and data information transmitted by using a network;
s2, analyzing the acquired information, and planning wiring between the computer and the machine room;
s3, verifying a wiring path between the planned computer and the machine room;
and S4, displaying the analysis result through the terminal, and alarming and reminding when the abnormal condition is detected.
Furthermore, in step S2, according to the computer position and the machine room position, an a-algorithm is adopted to perform optimal path planning on the wiring, the a-algorithm is a very common path search and graph traversal algorithm, and has better performance and accuracy, and has the advantages of rapid response to the environment, direct path search and the like;
and (3) optimally planning the line layout by adopting an evaluation function m (alpha):
m(α)=p(α)+q(α);
where the wiring technician's position state is set to α, and p (α) represents the minimum distance from the computer position to state α, which can be obtained by recursive calculation:
p(α)=p(α′)+d(α′,α);
wherein the initial position state of the design computer is α ', d (α', α) representing the actual distance from the computer position to state α;
q (alpha) represents a heuristic estimation function from the position state alpha to the position of the machine room by the technician, the existence of q (alpha) enables the algorithm to advance towards the most promising direction, and in order to ensure that the optimal solution can be searched, the heuristic function q (alpha) cannot be larger than the actual wiring path cost from the position state alpha to the position of the machine room by the technician, and the following conditions need to be met:
q(α')≤q(α)+d(α',α);
the optimal path is found when the state is expanded, so that planning is carried out;
calculate q (α) using euclidean distance:
Figure BDA0003849641790000071
wherein (x) i ,y i ) Coordinates representing the technician in the position state α, (x) k ,y k ) The coordinates of the position of the machine room are represented, the plane rectangular coordinate system can be established by setting the machine room as the original point, and a set of coordinate system suitable for enterprises can be established according to actual conditions. Euclidean distance, also known as euclidean distance, is the true distance between two points in m-dimensional space.
Further, in step S3, a vector is used to verify the wiring path between the computer and the machine room;
the distance L between the laid wire and the surrounding wires is calculated according to the following formula:
Figure BDA0003849641790000081
setting a distance threshold to L Threshold(s)
The coordinate when the technician is wiring in the position state α is (x) i ,y i ) At this time, the coordinates of the peripheral wiring are (x) j ,y j ) The next moment, the technician's coordinates are (x) i ',y i ') and the coordinates of the surrounding wiring are (x) j ',y j ') the wiring direction and the surrounding wiring direction are verified and calculated according to the following formula:
Figure BDA0003849641790000082
where θ represents a technician wiring position coordinate (x) i ,y i ) And the next wiring position coordinate (x) i ',y i ') coordinates (x) of the formed vector and surrounding wiring j ,y j ) With its next moment coordinate (x) j ',y j ') angle of the vector formed;
when cos theta =1 and L ≦ L Threshold(s) And then, alarming and reminding are carried out, and the operation is carried out again according to the wiring position of the current technicianAnd (7) planning the wiring.
Further, in step S4, the analysis result is displayed by using the terminal, and the related technician performs wiring according to the analysis result and performs real-time adjustment; meanwhile, in the subsequent maintenance process, the wiring condition between the computer and the machine room can be known by calling the information in the data storage unit through the terminal; when the abnormal conditions are detected, such as wiring problems, server invasion by viruses and unauthorized external users log in the system, the system gives an alarm to remind, related technicians are informed, and measures are taken in time to deal with the problems.
The first embodiment is as follows:
according to the computer position and the machine room position, an A-algorithm is adopted to carry out optimal path planning on the wiring, the A-algorithm is a very common path searching and graph traversing algorithm, and has the advantages of good performance and accuracy, quick response to the environment, direct path searching and the like;
and (3) optimally planning the line layout by adopting an evaluation function m (alpha):
m(α)=p(α)+q(α);
where the wiring technician's position state is set to α, and p (α) represents the minimum distance from the computer position to state α, which can be obtained by recursive calculation:
p(α)=p(α')+d(α',α);
wherein the initial position state of the design computer is α ', d (α', α) representing the actual distance from the computer position to state α;
q (alpha) represents a heuristic estimation function from the position state alpha to the position of the machine room by the technician, the existence of q (alpha) enables the algorithm to advance towards the most promising direction, and in order to ensure that the optimal solution can be searched, the heuristic function q (alpha) cannot be larger than the actual wiring path cost from the position state alpha to the position of the machine room by the technician, and the following conditions need to be met:
q(α')≤q(α)+d(α',α);
the optimal path is found when the state is expanded, so that planning is carried out;
calculate q (α) using euclidean distance:
Figure BDA0003849641790000091
wherein (x) i ,y i ) Coordinates representing the technician in the position state α, (x) k ,y k ) The coordinates of the position of the machine room are represented, the plane rectangular coordinate system can be established by setting the machine room as the original point, and a set of coordinate system suitable for enterprises can be established according to actual conditions. Euclidean distance, also known as euclidean distance, is the true distance between two points in m-dimensional space.
The second embodiment:
coordinates when the technician wires in the position state alpha are (5, 10), coordinates of the surrounding wires at this time are (7, 10), coordinates of the technician at the next time are (5, 15), coordinates of the surrounding wires are (7, 15),
the distance L between the laid wire and the surrounding wires is calculated according to the following formula:
Figure BDA0003849641790000092
setting a distance threshold to L Threshold(s) =3, then L<L Threshold(s)
The wiring direction and the surrounding wiring direction are verified and calculated according to the following formula:
Figure BDA0003849641790000101
at this time, cos θ =1 and L<L Threshold(s) And alarming and reminding, and simultaneously rewiring the system position state alpha.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The utility model provides a management system of computer control terminal based on thing networking which characterized in that: the management system of the computer control terminal comprises: the system comprises an information acquisition module, an information protection module, an information analysis module and a terminal display module;
the information acquisition module is connected with the information protection module, the information protection module is connected with the information analysis module, and the information analysis module is connected with the terminal display module; the information acquisition module is used for acquiring computer information and machine room information, the information protection module is used for protecting the acquired information, the information analysis module is used for analyzing the acquired data information, the terminal display module is used for displaying the analyzed result, and relevant technicians take corresponding measures according to the displayed result.
2. The management system of the computer control terminal based on the internet of things as claimed in claim 1, wherein: the information acquisition module comprises a basic information acquisition unit and a positioning unit, wherein the basic information acquisition unit is used for acquiring basic information of a computer, and the positioning unit acquires real-time position information of the computer, a machine room and technicians during wiring through Beidou short messages.
3. The management system of the computer control terminal based on the internet of things as claimed in claim 2, wherein: the information protection module comprises a firewall and an information encryption unit, the firewall is used for carrying out safety protection on collected information and data information transmitted by a computer through a network, the information encryption unit carries out classified encryption on the collected information and the data information transmitted by the network through the Internet of things by adopting an elliptic curve digital signature algorithm, a public key is used for encryption, technicians in different departments carry out signature decryption through different private keys, and then the public key is used for verifying whether the signature is legal or not.
4. The management system of the computer control terminal based on the internet of things as claimed in claim 3, wherein: the information analysis module is including the wiring planning unit, the unit is verified and the data memory cell of laying wire, the wiring planning unit is used for carrying out rational planning to the wiring between computer and the computer lab, the unit is verified and is used for verifying the rationality of circuit layout to the wiring, the data memory cell is used for preserving the data information of gathering and the circuit layout data information of analysis.
5. The management system of the computer control terminal based on the internet of things as claimed in claim 4, wherein: the terminal display module comprises a display unit and an alarm unit, the display unit is used for displaying the analysis result through terminal equipment, relevant technicians who wire the computer and the machine room take corresponding measures according to the analysis result, and the alarm unit is used for alarming and reminding when the abnormal condition is detected.
6. A management method of a computer control terminal based on the Internet of things is characterized in that: the method comprises the following steps:
s1, collecting basic information of a computer, collecting real-time position information of the computer, a machine room and technicians during wiring, and carrying out encryption protection on the collected information and data information transmitted by using a network;
s2, analyzing the acquired information, and planning wiring between the computer and the machine room;
s3, verifying a wiring path between the planned computer and the machine room;
and S4, displaying the analysis result through the terminal, and alarming and reminding when the abnormal condition is detected.
7. The management method of the computer control terminal based on the internet of things as claimed in claim 6, wherein: in step S2, according to the computer position and the machine room position, an A-star algorithm is adopted to plan the optimal path of the wiring;
and (3) optimally planning the line layout by adopting an evaluation function m (alpha):
m(α)=p(α)+q(α);
where the wiring technician's position state is set to α, and p (α) represents the minimum distance from the computer position to state α, which can be obtained by recursive calculation:
p(α)=p(α′)+d(α',α);
wherein the initial position state of the design computer is α ', d (α', α) representing the actual distance from the computer position to state α;
q (alpha) represents a heuristic estimation function from the position state alpha to the position of the machine room, the existence of q (alpha) enables the algorithm to advance towards the most promising direction, and in order to ensure that the optimal solution can be searched, the heuristic function q (alpha) cannot be larger than the actual wiring path cost from the position state alpha to the position of the machine room, and simultaneously the following conditions are required to be met:
q(α′)≤q(α)+d(α′,α);
the optimal path is found when the state is expanded, so that planning is carried out;
calculate q (α) using euclidean distance:
Figure FDA0003849641780000021
wherein (x) i ,y i ) Coordinates representing the technician in the position state α, (x) k ,y k ) Coordinates representing where the machine room is located.
8. The management method of the computer control terminal based on the internet of things according to claim 7, wherein: in step S3, verifying a wiring path between the computer and the machine room by adopting a vector;
the distance L between the laid wire and the surrounding wires is calculated according to the following formula:
Figure FDA0003849641780000031
setting a distance threshold to L Threshold(s)
The coordinate when the technician is routing in the position state α is (x) i ,y i ) At this time, the coordinates of the peripheral wiring are (x) j ,y j ) The next time, the technician's coordinates are (x) i ′,y i ') and the coordinates of the surrounding wiring are (x) j ′,y j ') and verification calculation is performed on the wiring direction and the surrounding wiring direction according to the following formula:
Figure FDA0003849641780000032
where θ represents a technician wiring position coordinate (x) i ,y i ) And the next wiring position coordinate (x) i ',y i ') coordinates (x) of the formed vector and surrounding wiring j ,y j ) With its next moment coordinate (x) j ',y j ') angle of the vector formed;
when cos theta =1 and L ≦ L Threshold(s) And alarming and reminding, and re-planning the wiring according to the wiring position of the current technician.
9. The management method of the computer control terminal based on the internet of things according to claim 8, wherein: in step S4, the analysis result is displayed by using the terminal, and the related technician performs wiring according to the analysis result and performs real-time adjustment; meanwhile, in the subsequent maintenance process, the wiring condition between the computer and the machine room can be known by calling the information in the data storage unit through the terminal; when the abnormal condition is detected, the system alarms and reminds related technicians to take measures to solve the problem in time.
CN202211127761.4A 2022-09-16 2022-09-16 Management system and method of computer control terminal based on Internet of things Active CN115484172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211127761.4A CN115484172B (en) 2022-09-16 2022-09-16 Management system and method of computer control terminal based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211127761.4A CN115484172B (en) 2022-09-16 2022-09-16 Management system and method of computer control terminal based on Internet of things

Publications (2)

Publication Number Publication Date
CN115484172A true CN115484172A (en) 2022-12-16
CN115484172B CN115484172B (en) 2023-09-26

Family

ID=84423540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211127761.4A Active CN115484172B (en) 2022-09-16 2022-09-16 Management system and method of computer control terminal based on Internet of things

Country Status (1)

Country Link
CN (1) CN115484172B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820532A (en) * 2010-03-17 2010-09-01 上海大学 Method for realizing full three-dimensional intelligent virtual computer room
CN109740789A (en) * 2018-11-22 2019-05-10 平安科技(深圳)有限公司 Cable management method, apparatus, equipment and storage medium
CN109768864A (en) * 2019-01-14 2019-05-17 大连大学 Encryption method based on ECC and homomorphic cryptography
KR102102573B1 (en) * 2020-02-03 2020-04-20 윤대원 Equipment maintenance system in building machine room
CN113657067A (en) * 2021-06-30 2021-11-16 福州大学 Multi-strategy optimization-based ultra-large-scale integrated circuit multilayer overall wiring method
CN114095162A (en) * 2021-11-18 2022-02-25 河南许继仪表有限公司 Connection verification method and device for certificateless power consumption information acquisition system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820532A (en) * 2010-03-17 2010-09-01 上海大学 Method for realizing full three-dimensional intelligent virtual computer room
CN109740789A (en) * 2018-11-22 2019-05-10 平安科技(深圳)有限公司 Cable management method, apparatus, equipment and storage medium
CN109768864A (en) * 2019-01-14 2019-05-17 大连大学 Encryption method based on ECC and homomorphic cryptography
KR102102573B1 (en) * 2020-02-03 2020-04-20 윤대원 Equipment maintenance system in building machine room
CN113657067A (en) * 2021-06-30 2021-11-16 福州大学 Multi-strategy optimization-based ultra-large-scale integrated circuit multilayer overall wiring method
CN114095162A (en) * 2021-11-18 2022-02-25 河南许继仪表有限公司 Connection verification method and device for certificateless power consumption information acquisition system

Also Published As

Publication number Publication date
CN115484172B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
US11750659B2 (en) Cybersecurity profiling and rating using active and passive external reconnaissance
CN111800395A (en) Threat information defense method and system
CN111726809B (en) Network security auditing method and system under numerical control environment
CN107426022A (en) Security incident monitoring method and device, electronic equipment, storage medium
CN108123939A (en) Malicious act real-time detection method and device
CN112907321B (en) Big data-based information security anomaly sensing platform for data mining and analysis
US11595418B2 (en) Graphical connection viewer for discovery of suspect network traffic
CN104462973A (en) System and method for detecting dynamic malicious behaviors of application program in mobile terminal
CN111786986B (en) Numerical control system network intrusion prevention system and method
CN110830441A (en) Information safety monitoring system based on big data
US20180183819A1 (en) System to detect machine-initiated events in time series data
CN115378711A (en) Industrial control network intrusion detection method and system
CN117501658A (en) Evaluation of likelihood of security event alarms
CN112596984A (en) Data security situation sensing system under weak isolation environment of service
CN116232770B (en) Enterprise network safety protection system and method based on SDN controller
CN112528295A (en) Vulnerability repairing method and device of industrial control system
CN115484172B (en) Management system and method of computer control terminal based on Internet of things
CN114697052B (en) Network protection method and device
Trifonov et al. Analytical Choice of an Effective Cyber Security Structure with Artificial Intelligence in Industrial Control Systems
CN112417434A (en) Program white list protection method combined with UEBA mechanism
CN113141274A (en) Method, system and storage medium for detecting sensitive data leakage in real time based on network hologram
CN111314308A (en) System security check method and device based on port analysis
Tafazzoli et al. Security operation center implementation on OpenStack
CN116846686B (en) Industrial Internet security situation awareness cooperative linkage system based on data analysis
KR102330404B1 (en) Method And Apparatus for Diagnosing Integrated Security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230901

Address after: 518000 World Trade Plaza 101-1, Funan Community, Futian Street, Futian District, Shenzhen, Guangdong Province

Applicant after: SHENZHEN XINGHAI IOT TECHNOLOGY Co.,Ltd.

Address before: Binhu Yangguang Li, No. 768, Huanghe Road, Baohe District, Hefei City, Anhui Province, 230041

Applicant before: Bao Jiliang

GR01 Patent grant
GR01 Patent grant