CN116455884A - Remote debugging and upgrading method in wireless cascading mode - Google Patents
Remote debugging and upgrading method in wireless cascading mode Download PDFInfo
- Publication number
- CN116455884A CN116455884A CN202310352683.6A CN202310352683A CN116455884A CN 116455884 A CN116455884 A CN 116455884A CN 202310352683 A CN202310352683 A CN 202310352683A CN 116455884 A CN116455884 A CN 116455884A
- Authority
- CN
- China
- Prior art keywords
- data
- upgrading
- debugging
- detector
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000005540 biological transmission Effects 0.000 claims abstract description 39
- 238000012545 processing Methods 0.000 claims abstract description 32
- 238000011897 real-time detection Methods 0.000 claims description 34
- 239000003086 colorant Substances 0.000 claims description 20
- 238000007405 data analysis Methods 0.000 claims description 12
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 abstract description 3
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 241000272525 Anas platyrhynchos Species 0.000 description 3
- ORFSSYGWXNGVFB-UHFFFAOYSA-N sodium 4-amino-6-[[4-[4-[(8-amino-1-hydroxy-5,7-disulfonaphthalen-2-yl)diazenyl]-3-methoxyphenyl]-2-methoxyphenyl]diazenyl]-5-hydroxynaphthalene-1,3-disulfonic acid Chemical compound COC1=C(C=CC(=C1)C2=CC(=C(C=C2)N=NC3=C(C4=C(C=C3)C(=CC(=C4N)S(=O)(=O)O)S(=O)(=O)O)O)OC)N=NC5=C(C6=C(C=C5)C(=CC(=C6N)S(=O)(=O)O)S(=O)(=O)O)O.[Na+] ORFSSYGWXNGVFB-UHFFFAOYSA-N 0.000 description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 2
- 235000012736 patent blue V Nutrition 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of wireless communication, and particularly relates to a wireless cascading remote debugging and upgrading method, which comprises the following steps: s1, storing debugging or upgrading data to a server or a platform, encrypting the debugging or upgrading data by a control command of the server or the platform, and according to the method, firstly, converting the position of an encrypted object and the encrypted object into secret image information, then converting the secret image information into a data stream and uploading the data stream to the server or the platform, so that even after a third person obtains a transmission image, real data information transmitted by the transmission image cannot be obtained under the condition of no private key, and secondly, hiding position information of an object continuous in position when converting the position of the encrypted object into the secret image information, further enhancing the safety, simultaneously reducing the processing capacity of an image processing module and improving the transmission efficiency.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a wireless cascading remote debugging and upgrading method.
Background
The wireless cascading technology is a common extension mode in the field of data transmission, and is generally used for WDS (Wireless Distribution System) or wireless bridging of non-WDS, so as to enable devices to be connected with each other in a wireless mode, extend and extend wireless signals, so as to facilitate data transmission, device control and improve wireless coverage range.
The patent application number 2015106669856 discloses a wireless direct connection method and a device, comprising the following steps: when a first terminal enters a wireless direct connection mode, obtaining a channel number corresponding to a channel with the least interference in a wireless network; the first terminal generates a graphic code according to the channel number, so that the second terminal scans the graphic code to acquire the channel number; and after receiving the direct connection request sent by the second terminal, the first terminal is in wireless direct connection with the second terminal according to the channel number. The invention also discloses a wireless direct connection device. The invention realizes that the channel number of the Miracast connection of the terminal is determined by scanning the graphic code, and improves the Miracast application connection efficiency; the patent application No. 2016104489124 discloses a method, a device and a system for establishing wireless direct connection, wherein network connection information of a target connection device is set as Near Field Communication (NFC) tag information; acquiring NFC label information of the target connection device; the network connection information is extracted from the NFC tag information, and the target connection device is connected according to the network connection information, when the controller in the prior art wirelessly transmits the data acquired by the detector to the server or the platform through the network, the unsafe factor of the network is not considered, if the data acquired by the detector is directly uploaded to the server or the platform, the acquired data may be leaked, so that encryption processing is required before data transmission, and then network transmission is performed, but if a traditional simple encryption method is adopted, the situation that the data is acquired by a third person still exists.
The invention provides a wireless cascading remote debugging and upgrading method for solving the technical problem.
Disclosure of Invention
In order to achieve the above object, the present invention provides a method for remote debugging and upgrading in a wireless cascading manner, which includes the following steps:
s1, storing debugging or upgrading data to a server or a platform, encrypting the debugging or upgrading data by a control command of the server or the platform, and transmitting the encrypted debugging or upgrading data to a wireless module at a controller end by the control command of the server or the platform;
s2, the controller caches the debugging or upgrading data, acquires the detector to be debugged or upgraded from the debugging or upgrading data, and forwards the debugging or upgrading data to the detector to be upgraded in a transparent transmission mode;
s3, debugging or upgrading the detector to be debugged or upgraded according to the debugging or upgrading data, judging whether the detector to be debugged or upgraded is successful, and if so, feeding back the success of the debugging or upgrading to the controller by the detector; if not, the detector feeds back failure of debugging or upgrading to the controller, and the debugging or upgrading is finished; the controller acquires feedback information of the detector, then synchronously modifies parameters of the machine body, keeps consistent with the parameters of the detector, forwards information of whether the detector to be debugged or upgraded is debugged or not or whether the detector to be debugged or upgraded is successful or the parameters of the detector after the detector to be debugged or upgraded are successfully, and finally completes the whole parameter modification or upgrading process by recording and monitoring the platform.
As a preferred technical solution of the present invention, before the detector transmits the collected real-time data to the controller, the method includes the following steps: reading real-time detection data of a detector, analyzing and processing the real-time detection data through a data analysis and processing module, obtaining the position of each numerical value in the real-time detection data, obtaining a plurality of encryption objects in the real-time detection data, and obtaining the position of each numerical value in the plurality of encryption objects in the real-time detection data;
replacing colors corresponding to the positions of the encryption objects in the default image with white through an image processing module;
each color in the replaced default image is randomly disturbed to obtain an intermediate image, then an inverse lookup table method is carried out on the encrypted object to inquire the color corresponding to the position of the encrypted object in a hexadecimal incremental color coding list, the color is sequentially randomly inserted into the intermediate image according to the sequence of the encrypted object in real-time detection data to obtain a transmission image, the transmission image is converted into a data stream, and the data stream is transmitted to a server or a platform; the invention can avoid the situation that a third person steals the equipment data and the third person reversely controls the equipment by the encryption mode, thereby improving the safety.
As a preferable technical scheme of the invention, acquiring the position of each numerical value in the real-time detection data comprises the following steps of comparing the real-time detection data with the data detected at the last time, intercepting the changed numerical value independently, determining the numerical value as an encryption object, and simultaneously determining the number of bits of each encryption object in the real-time detection data; sequentially arranging the digits according to the sequence positions to form an array, then carrying out data analysis, determining whether an incremental array with a tolerance of one exists in the array, if so, eliminating the numbers between the head items and the tail items in the incremental array to form a new array, wherein the new array is the position of an encryption object, and if not, taking the array as the position of the encryption object; the invention eliminates the number between the head and tail items in the increment array, thereby hiding the position information of the intermediate encryption object, and further improving the security.
As a preferable technical scheme of the invention, the default image is different according to different detectors, the default image is a rectangular image with a height of one pixel, the length of the default image is N pixels, N is the number of bits of data detected by the detectors, and the corresponding colors after the hexadecimal codes of the other colors except black and white are sequenced are sequentially filled in the pixels of the default image to obtain the default image; according to the invention, the detector is provided with different default images according to different detectors, so that the problem that an illegal person successfully acquires the information of other images after acquiring one of the images is avoided.
As a preferred technical scheme of the invention, replacing the color corresponding to the position of the encryption object in the default image by white through the image processing module comprises the following steps of inquiring the color corresponding to the position of the encryption object in a color coding table of hexadecimal codes of other colors except black and white after being sequenced from small to large through a lookup table method, and replacing the color corresponding to the position of the encryption object in the default image by white through the image processing module; the invention further improves the safety of information transmission by eliminating the position information of the encrypted object for hidden transmission.
As a preferable technical scheme of the invention, the transmission image is a rectangular image with a height of one pixel according to the difference of the detectors, the length of the transmission image is greater than 'N' pixels, and 'N' is the number of bits of data detected by the detectors; when the controller transmits data to the server or the platform, the invention sets the controller to transmit different transmission images in the transmission process to the server or the platform according to different bit numbers of the data detected by the detector, so that the invention can adapt to different detectors.
The invention also provides a computer storage medium storing program instructions, wherein the program instructions, when run, control a device in which the computer storage medium is located to perform any one of the methods described above.
The invention also provides a processor for running a program, wherein the program runs to execute the method of any one of the above.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention can realize the parameter setting and remote upgrading from the direct-connected equipment end to the cloud platform end, and can also realize the parameter debugging and program upgrading of the sub-equipment under the direct-connected equipment end, and the remote debugging or upgrading can be directly carried out on the equipment after the problem occurs in the field sub-equipment or the new requirement exists on the customer, so that the equipment is not required to return to a factory or send after-sales personnel to the field for processing, the after-sales cost is greatly reduced, and the customer experience degree is improved; meanwhile, the controllers are used for cascading the detectors, and parameters of the detectors are debugged and upgraded in a broadcasting mode, so that one device is networked, the purposes of monitoring, debugging and upgrading the devices are achieved, and upgrading maintenance efficiency is improved.
2. According to the invention, the position of the encrypted object and the encrypted object are converted into the password image information, and then the password image information is converted into the data stream and uploaded to the server or the platform, so that even after a third person obtains a transmission image, the real data information transmitted by the transmission image cannot be obtained under the condition of no private key.
Drawings
FIG. 1 is a flow chart of steps of a wireless cascading remote debugging and upgrading method of the present invention;
fig. 2 is a table of color codes of the present invention in which hexadecimal codes of colors other than black and white are ordered from small to large.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
The invention provides a wireless cascading remote debugging and upgrading method as shown in fig. 1, which comprises the following steps:
s1, storing debugging or upgrading data to a server or a platform, encrypting the debugging or upgrading data by a control command of the server or the platform, and transmitting the encrypted debugging or upgrading data to a wireless module at a controller end by the control command of the server or the platform;
s2, the controller caches the debugging or upgrading data, acquires the detector to be debugged or upgraded from the debugging or upgrading data, and forwards the debugging or upgrading data to the detector to be upgraded in a transparent transmission mode;
s3, debugging or upgrading the detector to be debugged or upgraded according to the debugging or upgrading data, judging whether the detector to be debugged or upgraded is successful, and if so, feeding back the success of the debugging or upgrading to the controller by the detector; if not, the detector feeds back failure of debugging or upgrading to the controller, and the debugging or upgrading is finished; the controller acquires feedback information of the detector, then synchronously modifies parameters of the machine body, keeps consistent with the parameters of the detector, forwards information of whether the detector to be debugged or upgraded is debugged or not or whether the detector to be debugged or upgraded is successful or the parameters of the detector after the detector to be debugged or upgraded are successfully, and finally completes the whole parameter modification or upgrading process by recording and monitoring the platform.
Specifically, the controller can forward the debugging or upgrading data to the detector through a wired or wireless data channel, and after the data is cached to the wireless module, the data is issued to the sub-equipment through the wireless module in a direct-connected equipment data channel mode to realize the program upgrading of the sub-equipment, and the data can also be directly buffered to the direct-connected equipment and then issued to the sub-equipment.
The invention can realize the parameter setting and remote upgrading from the direct-connected equipment end to the cloud platform end, and can also realize the parameter debugging and program upgrading of the sub-equipment under the direct-connected equipment end, and the remote debugging or upgrading can be directly carried out on the equipment after the problem occurs in the field sub-equipment or the new requirement exists on the customer, so that the equipment is not required to return to a factory or send after-sales personnel to the field for processing, the after-sales cost is greatly reduced, and the customer experience degree is improved; meanwhile, the controllers are used for cascading the detectors, and parameters of the detectors are debugged and upgraded in a broadcasting mode, so that one device is networked, the purposes of monitoring, debugging and upgrading the devices are achieved, and upgrading maintenance efficiency is improved.
Further, when the controller wirelessly transmits the data acquired by the detector to the server or the platform through the network, considering network unsafe factors, if the data acquired by the detector is directly uploaded to the server or the platform, the acquired data may be leaked, so that encryption processing is needed before data transmission, and then network transmission is performed, but if a traditional simple encryption method is adopted, a situation that the acquired data is acquired by a third person still exists, in order to solve the technical problems, the following first step to third step of encryption steps are provided before the detector transmits the acquired real-time data to the controller;
the first step, before the detector transmits the acquired real-time data to the controller, comprises the following steps: reading real-time detection data of a detector, analyzing and processing the real-time detection data through a data analysis and processing module, obtaining the position of each numerical value in the real-time detection data, obtaining a plurality of encrypted objects in the real-time detection data, and obtaining the position of each numerical value in the plurality of encrypted objects in the real-time detection data;
the second step, replacing the color corresponding to the position of the encryption object in the default image with white through an image processing module;
thirdly, randomly scrambling each color in the replaced default image to obtain an intermediate image, then searching the color corresponding to the position of the encrypted object in a hexadecimal incremental color coding list by an inverse lookup table method on the encrypted object, sequentially randomly inserting the color into the intermediate image according to the sequence of the encrypted object in the real-time detection data to obtain a transmission image, converting the transmission image into a data stream, and transmitting the data stream to a server or a platform.
Further, the step of acquiring each value in the real-time detection data in the first step includes the step of comparing the real-time detection data with the data detected at the previous time, intercepting the changed numerical value independently, determining the numerical value as an encryption object, and simultaneously determining the number of bits of each encryption object in the real-time detection data; and sequentially arranging the digits according to the sequence positions to form an array, then carrying out data analysis, determining whether an incremental array with a tolerance of one exists in the array, if so, eliminating the numbers between the head items and the tail items in the incremental array to form a new array, wherein the new array is the position of the encryption object, and if not, taking the array as the position of the encryption object.
For example, the data detected at the time on a certain detector is "132557899", the real-time detection data is "123456789", the data is analyzed and processed by a data analysis processing module, the real-time detection data "123456789" is compared with the data detected at the time on the last time "132557899", the changed values are individually intercepted and determined as encryption objects, the encryption objects are "3, 2, 5, 7, 8 and 9", the bits corresponding to the encryption objects are "2, 3, 4, 6, 7 and 8", the bits are interpreted as the first bit of the encryption objects, the data analysis processing module determines that two increment columns with the tolerance of one exist in the array, then the numbers between the head and tail items in the increment columns in the array are removed to form a new array, the new array is "2, 4, 6 and 8", and the new array is the position of the encryption object; according to the invention, the positions of objects with continuous positions in a single encrypted object are hidden, so that the security is enhanced on one hand, the processing capacity of the image processing module is reduced on the other hand, and the transmission efficiency is improved.
For example, the data detected at the previous time of a certain detector is "129456999", the real-time detection data is "123456789", the data analysis processing module is used for analyzing and processing, the real-time detection data "123456789" is compared with the data detected at the previous time "129456999", the changed values are individually intercepted and determined as encryption objects, the encryption objects are "9, 9 and 9", the numbers corresponding to the encryption objects are "3, 7 and 8", the data analysis processing module is used for determining that an increment array with the number of items with the tolerance of one is two exists in the array, then the numbers between the head and tail items in the increment array are eliminated to form a new array, and the new array is still "3, 7 and 8" due to countless numbers between "7 and 8", and the new array is the position of the encryption object.
For example, the data detected at the previous time of a certain detector is "193456789", the real-time detection data is "123456789", the data analysis processing module is used for analyzing and processing, the data "123456789" detected at the previous time is compared with the data "193456789", the changed value is individually intercepted and determined as an encrypted object, the encrypted object is "9", the number of bits corresponding to the encrypted object is "2", the data analysis processing module is used for determining that the array does not have an increment array with a tolerance of one, and the position of the encrypted object is determined that the array "2".
Specifically, the default images are different according to different detectors, the default images are rectangular images with a height of one pixel, the length of the default images is N pixels, N is the number of bits of data detected by the detectors, and the corresponding colors except black and white are sequentially filled into the pixels of the default images after the hexadecimal codes of the other colors are sequenced, so that the default images can be obtained.
For example, the data detected by the detector is nine-digit data, the default image is a default image with a height of one pixel and a length of nine pixels, and the hexadecimal codes of the rest colors except black and white are sequenced, as shown in fig. 2, and the colors corresponding to each pixel from left to right of the default image are "navy blue, deep blue, moderate blue, pure blue, deep green, pure green, water duck color, deep cyan, and deep sky blue" in sequence.
Further, replacing the color corresponding to the position of the encryption object in the default image with white through the image processing module comprises the following steps of inquiring the color corresponding to the position of the encryption object in a color coding table of hexadecimal codes of other colors except black and white which are sequenced from small to large through a lookup table method, and replacing the color corresponding to the position of the encryption object in the default image with white through the image processing module.
Still taking the data detected at the time of a certain detector as '129456999', the real-time detection data as '123456789', the encrypted object is '3, 2, 5, 7, 8 and 9', the position of the encrypted object is '3, 7 and 8', the corresponding colors of the encrypted object is '3, 7 and 8' are searched in hexadecimal color coding tables of the rest colors except black and white by a table look-up method, the position of the encrypted object corresponds to the serial numbers in the color coding table, namely the colors of the '3, 7 and 8' respectively correspond to the serial numbers of '3, 7 and 8' in the color coding table, the positions of the encrypted object correspond to the colors of '3, 7 and 8' respectively are 'moderate blue, water duck and dark cyan', then 'in a default image formed by' navy blue, dark blue, moderate blue, pure blue, dark green, pure green, water duck and dark blue 'from left to right is replaced with white by an image processing module, obtaining images with the colors of navy blue, deep blue, white, pure blue, deep green, pure green, white and deep sky blue from left to right, randomly disturbing the images obtained after the replacement to obtain intermediate images, wherein the values of' 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9 'of the encrypted objects correspond to' the first last color, the second last color, the third last color, the fourth last color, the fifth last color, the sixth last color, the seventh last color, the eighth last color, the ninth last color and the tenth last color 'in a color coding table after the hexadecimal codes are ordered from small to large respectively, and the encrypted objects are' 3 2. 5, 7, 8 and 9 'respectively correspond to the third last color, the second last color, the fifth last color, the seventh last color, the eighth last color and the ninth last color' in the color coding table, respectively randomly inserting the corresponding colors into the intermediate images in sequence according to the sequence of the encrypted objects in the real-time detection data to obtain transmission images, converting the transmission images into data streams, and transmitting the data streams to a server or a platform; in the encryption process, the positions of the encrypted objects are converted into the password image information, and then the password image information is converted into the data stream to be transmitted to the server or the platform, so that the real data of the image transmission cannot be determined even if other people acquire the data stream of the transmission image, and the safety of the information transmission is improved.
Specifically, the transmission images are different according to the difference of the detectors, and the same detector can cause the difference of the transmission images due to the difference of the detected data, namely, after a third person acquires the images, the accurate position of the data cannot be determined, the transmission images are rectangular images with the height of one pixel, the length of the transmission images is greater than N pixels, and N is the number of bits of the data detected by the detector; that is, in the above example, the length of the transmission image is "9+6" pixels, 9 is the number of bits of data detected by the detector, and 6 is the number of encryption objects.
The invention also provides a computer storage medium storing program instructions, wherein the program instructions, when run, control a device in which the computer storage medium is located to perform any one of the methods described above.
The invention also provides a processor for running a program, wherein the program runs to execute the method of any one of the above.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of computer programs, which may be stored on a non-transitory computer readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, they should be considered as the scope of the description of the present specification as long as there is no contradiction between the combinations of the technical features.
The foregoing examples have been presented to illustrate only a few embodiments of the invention and are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.
Claims (8)
1. A wireless cascading remote debugging and upgrading method is characterized by comprising the following steps:
s1, storing debugging or upgrading data to a server or a platform, encrypting the debugging or upgrading data by a control command of the server or the platform, and transmitting the encrypted debugging or upgrading data to a wireless module at a controller end by the control command of the server or the platform;
s2, the controller caches the debugging or upgrading data, acquires the detector to be debugged or upgraded from the debugging or upgrading data, and forwards the debugging or upgrading data to the detector to be upgraded in a transparent transmission mode;
s3, debugging or upgrading the detector to be debugged or upgraded according to the debugging or upgrading data, judging whether the detector to be debugged or upgraded is successful, and if so, feeding back the success of the debugging or upgrading to the controller by the detector; if not, the detector feeds back failure of debugging or upgrading to the controller, and the debugging or upgrading is finished; the controller acquires feedback information of the detector, then synchronously modifies parameters of the machine body, keeps consistent with the parameters of the detector, forwards information of whether the detector to be debugged or upgraded is debugged or not or whether the detector to be debugged or upgraded is successful or the parameters of the detector after the detector to be debugged or upgraded are successfully, and finally completes the whole parameter modification or upgrading process by recording and monitoring the platform.
2. The method for remote debugging and upgrading in a wireless cascading manner according to claim 1, wherein before the detector transmits the collected real-time data to the controller, the method comprises the following steps: reading real-time detection data of a detector, analyzing and processing the real-time detection data through a data analysis and processing module, obtaining the position of each numerical value in the real-time detection data, obtaining a plurality of encryption objects in the real-time detection data, and obtaining the position of each numerical value in the plurality of encryption objects in the real-time detection data;
replacing colors corresponding to the positions of the encryption objects in the default image with white through an image processing module;
and randomly scrambling each color in the replaced default image to obtain an intermediate image, then carrying out an inverse lookup table method on the encrypted object to inquire the color corresponding to the position of the encrypted object in a hexadecimal incremental color coding list, sequentially randomly inserting the color into the intermediate image according to the sequence of the encrypted object in the real-time detection data to obtain a transmission image, converting the transmission image into a data stream, and transmitting the data stream to a server or a platform.
3. The method for remote debugging and upgrading in a wireless cascading manner according to claim 2, wherein the step of obtaining the position of each value in the real-time detection data comprises the steps of comparing the real-time detection data with the data detected at the previous time, intercepting the changed value individually, determining the value as an encryption object, and determining the number of bits of each encryption object in the real-time detection data; and sequentially arranging the digits according to the sequence positions to form an array, then carrying out data analysis, determining whether an incremental array with a tolerance of one exists in the array, if so, eliminating the numbers between the head items and the tail items in the incremental array to form a new array, wherein the new array is the position of the encryption object, and if not, taking the array as the position of the encryption object.
4. The method for remote debugging and upgrading in a wireless cascading manner according to claim 2, wherein the default images are different according to different detectors, the default images are rectangular images with a height of one pixel, the length of the default images is N pixels, N is the number of bits of data detected by the detectors, and the corresponding colors after the hexadecimal codes of the other colors except black and white are sequenced are sequentially filled into the pixels of the default images to obtain the default images.
5. The method for remote debugging and upgrading in a wireless cascading manner according to claim 2, wherein the step of replacing the color corresponding to the position of the encrypted object in the default image with white through the image processing module comprises the step of searching the color corresponding to the position of the encrypted object in a color coding table of hexadecimal codes of the other colors except black and white, which are ordered from small to large through a lookup table method, and replacing the color corresponding to the position of the encrypted object in the default image with white through the image processing module.
6. The method for remote debugging and upgrading in a wireless cascading manner according to claim 2, wherein the transmission image is a rectangular image with a height of one pixel, the length of the transmission image is greater than "N" pixels, and "N" is the number of bits of data detected by the detector.
7. A computer storage medium storing program instructions, wherein the program instructions, when executed, control a device in which the computer storage medium is located to perform the method of any one of the preceding claims.
8. A processor for running a program, wherein the program when run performs the method of any one of the above.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310352683.6A CN116455884B (en) | 2023-04-04 | 2023-04-04 | Remote debugging and upgrading method in wireless cascading mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310352683.6A CN116455884B (en) | 2023-04-04 | 2023-04-04 | Remote debugging and upgrading method in wireless cascading mode |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116455884A true CN116455884A (en) | 2023-07-18 |
CN116455884B CN116455884B (en) | 2023-12-29 |
Family
ID=87126461
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310352683.6A Active CN116455884B (en) | 2023-04-04 | 2023-04-04 | Remote debugging and upgrading method in wireless cascading mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116455884B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020140571A1 (en) * | 2001-01-29 | 2002-10-03 | Hayes Patrick H. | System and method for using a hand held device to display product information |
JP2009218800A (en) * | 2008-03-10 | 2009-09-24 | Tani Electronics Corp | Encryption method utilizing colors, and message providing method utilizing color photographic image |
CN104363091A (en) * | 2014-12-01 | 2015-02-18 | 国家计算机网络与信息安全管理中心 | Encryption and decryption method capable of automatically retrieving keys and selecting algorithms |
US20150180840A1 (en) * | 2013-12-24 | 2015-06-25 | Hyundai Motor Company | Firmware upgrade method and system thereof |
CN106445578A (en) * | 2016-07-19 | 2017-02-22 | 北京华海隆科技有限公司 | Remote hardware upgrading method and apparatus, and wireless temperature and humidity monitor |
CN109542077A (en) * | 2017-09-21 | 2019-03-29 | 武汉理工大学 | Automobile controller remote upgrade method based on car networking |
CN109729234A (en) * | 2017-10-31 | 2019-05-07 | 六安市华海电子器材科技有限公司 | A kind of image transfer method |
WO2020244070A1 (en) * | 2019-06-06 | 2020-12-10 | 平安科技(深圳)有限公司 | Digital information encryption method and apparatus, computer device, and storage medium |
CN112822254A (en) * | 2020-12-31 | 2021-05-18 | 山东向明环保科技有限公司 | Data acquisition and transmission system and method for remotely upgrading and allocating parameters on line |
CN113132080A (en) * | 2021-04-19 | 2021-07-16 | 青岛冠成软件有限公司 | Image processing method and device, electronic equipment and storage medium |
CN113805916A (en) * | 2021-08-16 | 2021-12-17 | 江铃汽车股份有限公司 | Upgrading method, system, readable storage medium and vehicle |
CN115102855A (en) * | 2022-03-08 | 2022-09-23 | 上海锐铼水务科技有限公司 | Intelligent water meter embedded software online upgrading method and system |
CN115857983A (en) * | 2022-10-19 | 2023-03-28 | 之江实验室 | FPGA remote upgrading method with encryption verification function |
-
2023
- 2023-04-04 CN CN202310352683.6A patent/CN116455884B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020140571A1 (en) * | 2001-01-29 | 2002-10-03 | Hayes Patrick H. | System and method for using a hand held device to display product information |
JP2009218800A (en) * | 2008-03-10 | 2009-09-24 | Tani Electronics Corp | Encryption method utilizing colors, and message providing method utilizing color photographic image |
US20150180840A1 (en) * | 2013-12-24 | 2015-06-25 | Hyundai Motor Company | Firmware upgrade method and system thereof |
CN104363091A (en) * | 2014-12-01 | 2015-02-18 | 国家计算机网络与信息安全管理中心 | Encryption and decryption method capable of automatically retrieving keys and selecting algorithms |
CN106445578A (en) * | 2016-07-19 | 2017-02-22 | 北京华海隆科技有限公司 | Remote hardware upgrading method and apparatus, and wireless temperature and humidity monitor |
CN109542077A (en) * | 2017-09-21 | 2019-03-29 | 武汉理工大学 | Automobile controller remote upgrade method based on car networking |
CN109729234A (en) * | 2017-10-31 | 2019-05-07 | 六安市华海电子器材科技有限公司 | A kind of image transfer method |
WO2020244070A1 (en) * | 2019-06-06 | 2020-12-10 | 平安科技(深圳)有限公司 | Digital information encryption method and apparatus, computer device, and storage medium |
CN112822254A (en) * | 2020-12-31 | 2021-05-18 | 山东向明环保科技有限公司 | Data acquisition and transmission system and method for remotely upgrading and allocating parameters on line |
CN113132080A (en) * | 2021-04-19 | 2021-07-16 | 青岛冠成软件有限公司 | Image processing method and device, electronic equipment and storage medium |
CN113805916A (en) * | 2021-08-16 | 2021-12-17 | 江铃汽车股份有限公司 | Upgrading method, system, readable storage medium and vehicle |
CN115102855A (en) * | 2022-03-08 | 2022-09-23 | 上海锐铼水务科技有限公司 | Intelligent water meter embedded software online upgrading method and system |
CN115857983A (en) * | 2022-10-19 | 2023-03-28 | 之江实验室 | FPGA remote upgrading method with encryption verification function |
Also Published As
Publication number | Publication date |
---|---|
CN116455884B (en) | 2023-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105184537B (en) | A kind of the cloud commodity distribution control method and system of real time monitoring cargo state | |
US20210350546A1 (en) | Adaptive video streaming | |
CN108897293B (en) | Loom control method, loom control system, computer device, and storage medium | |
CN103414840B (en) | A kind of data-hiding method based on image set | |
CN116455884B (en) | Remote debugging and upgrading method in wireless cascading mode | |
CN103530932A (en) | System and method for real-time invoice authenticity verifying | |
CN113572669B (en) | Scene processing method and device, intelligent gateway and processor | |
CN116016693A (en) | Compression processing method and system for printing data of portable printer | |
EP3496016B1 (en) | Method and system for reading information codes | |
GB2350515A (en) | Video encoder | |
CN106921973A (en) | Wireless network configuration method, device and system | |
US20210194580A1 (en) | Wireless data communication | |
KR20180099327A (en) | Method and apparatus for masking and unmasking of video data | |
NZ208426A (en) | Addressable catv converter: setting secure address into converter memory | |
CN113839967B (en) | Internet of things equipment fraud prevention and control system based on big data technology | |
CN115623357B (en) | Wireless remote sensing communication method and system for pump room of water supply equipment | |
CN111897504B (en) | Data display method and device, computer readable storage medium and processor | |
US6697429B2 (en) | Motion video image transmission system using frame-to-frame comparison processing | |
CN113988244A (en) | Anti-counterfeiting dot matrix generation and verification method, system, equipment and medium | |
KR101583598B1 (en) | Camera, service server, system and method for processing high-resolution image | |
US11805571B2 (en) | Mesh network management | |
CN116980969B (en) | Informationized management method and system for residence data | |
CN113114982B (en) | Internet of things data transmission method and system | |
CN212009571U (en) | Terminal | |
CN211577910U (en) | Equipment anti-channel conflict activation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |