CN116757603A - Intelligent warehouse management and control system and method based on big data application - Google Patents
Intelligent warehouse management and control system and method based on big data application Download PDFInfo
- Publication number
- CN116757603A CN116757603A CN202310766299.0A CN202310766299A CN116757603A CN 116757603 A CN116757603 A CN 116757603A CN 202310766299 A CN202310766299 A CN 202310766299A CN 116757603 A CN116757603 A CN 116757603A
- Authority
- CN
- China
- Prior art keywords
- module
- information
- encryption
- electrically connected
- warehouse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000004891 communication Methods 0.000 claims abstract description 20
- 230000008569 process Effects 0.000 claims abstract description 19
- 238000007726 management method Methods 0.000 claims description 84
- 230000007246 mechanism Effects 0.000 claims description 21
- 230000005540 biological transmission Effects 0.000 claims description 14
- 238000006467 substitution reaction Methods 0.000 claims description 12
- 238000006243 chemical reaction Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 7
- 238000012423 maintenance Methods 0.000 claims description 7
- 238000012550 audit Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 claims description 6
- 238000011084 recovery Methods 0.000 claims description 6
- 238000004880 explosion Methods 0.000 claims description 4
- 230000006399 behavior Effects 0.000 claims description 3
- 230000008447 perception Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims 1
- 230000004044 response Effects 0.000 claims 1
- 238000013461 design Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The invention relates to the technical field of intelligent storage and discloses an intelligent storage management and control system and a method thereof based on big data application. The intelligent warehouse management and control system and the method based on big data application can effectively identify and double-authenticate the user entering the warehouse management system and using the information sensing equipment through the design of the system, and an alarm sounder is arranged in the authentication process, so that the intelligent warehouse management and control system can be used for alarming and sounding when the identity authentication fails, the safety of the information authentication of the system before use is effectively improved, and meanwhile, the safety of the intelligent warehouse management and control system is used for transmitting communication data information.
Description
Technical Field
The invention relates to the technical field of intelligent warehousing, in particular to an intelligent warehousing management and control system and method based on big data application.
Background
The warehouse is taken as an important link of modern logistics, not only can realize the function of storing goods, but also can bear the task of being well connected with the upstream and downstream of an enterprise supply chain. Therefore, the storage safety is guaranteed, the storage operation efficiency and the service quality are improved, and the storage management level and the technical level are continuously improved.
The China patent discloses an intelligent warehouse integrated management and control system and a method thereof (grant bulletin number CN 115271592B) based on big data application, and the patent technology comprises an environment monitoring module: the system is used for monitoring and recording the warehouse environment in real time through various sensor devices and warning abnormal states; an operation equipment monitoring module: the system is used for monitoring various operation equipment in the warehouse in real time and recording the operation condition, and warning the abnormal state; the job management module: for managing products in a warehouse. Based on the big data application technology, the intelligent storage integrated system integrates a management information system, a warehouse equipment control system and a storage operation monitoring system which can be operated independently, thereby realizing intelligent storage integration, effectively reducing the cost in the storage process and improving the benefit and the safety of the whole logistics system; the distance between the tag reader and the tag is utilized to quickly sense and calculate the position information of the product, check the product in the warehouse at any time, so that manpower and material resources are saved, however, because the relatively important product is stored in the warehouse, strict control is needed for the personnel entering the warehouse to prevent occurrence of events such as storage information leakage, and the like, the existing intelligent storage management and control system has poor safety in the use process, so that a certain potential safety hazard exists in the use process. Accordingly, a person skilled in the art provides an intelligent warehouse management and control system and method based on big data application, so as to solve the problems set forth in the background art.
Disclosure of Invention
The invention aims to provide an intelligent warehouse management and control system and method based on big data application, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
the intelligent warehouse management and control system based on big data application comprises a network module, wherein an output end of the network module is electrically connected with an identity authentication module, an output end of the identity authentication module is electrically connected with a communication information conversion station and a matching module respectively, an output end of the communication information conversion station is electrically connected with information sensing equipment, an output end of the information sensing equipment is electrically connected with an information recording module and an information transmission module respectively, the inside of the network module comprises a firewall management module and an encryption hardware module, the inside of the identity authentication module comprises a face recognition module and a fingerprint recognition module, the output end of the matching module is electrically connected with a controller, and the output end of the controller is electrically connected with an alarm sounder.
As still further aspects of the invention: the input end of the identity authentication module is electrically connected with a power supply module, and the input end of the power supply module is electrically connected with a power supply state indicator and a power supply safety detection module respectively.
As still further aspects of the invention: the output end of the information recording module is electrically connected with a flash memory module, the output end of the flash memory module is electrically connected with an information storage card, and the information storage card comprises a secure encryption hardware card and a database module.
As still further aspects of the invention: the output end of the information transmission module is electrically connected with a decoder, and the output end of the decoder is electrically connected with a signal transmitter.
As still further aspects of the invention: the output end of the signal transmitter is electrically connected with a signal receiver, and the output end of the signal receiver is electrically connected with a communication service station.
As still further aspects of the invention: the output end of the network module is electrically connected with a warehouse management system, and the output end of the warehouse management system is electrically connected with an equipment foundation data input module.
As still further aspects of the invention: the intelligent operation and maintenance system display platform is electrically connected to the output end of the equipment basic data input module, and the warehouse management system comprises a warehouse management module, a warehouse management module and a warehouse management module.
The intelligent warehouse management and control method based on big data application comprises the following implementation method:
A. basic information of equipment contained in the warehouse management system can be transmitted to an intelligent operation and maintenance system display platform through an equipment basic data input module, so that a manager entering the warehouse can directly check the information, a warehouse management module contained in the warehouse management system can manage the warehouse information, a warehouse position management module can visually check the residual quantity of storage positions in the warehouse, the inventory management module can monitor the whole inventory of the warehouse in real time, and a warehouse outlet management module can monitor and manage the information of the warehouse outlet;
B. after entering a warehouse, a manager carries out identification and authentication on personal identity information through an identity authentication module, a face recognition module and a fingerprint recognition module are contained in the identity authentication module, double identity authentication can be carried out on an entering person, a power supply module can continuously supply power in the use process of the system, and a power supply explosion UN counter indicator and a power supply safety detection module can monitor and detect circuits used by the system in real time;
C. when personnel information passes authentication, the personnel information can enter a communication information conversion station and can use an information sensing device to send and transmit information, the information can be synchronously transmitted to the inside of an information recording module, the information recording module can directly store the information into an information storage card through a flash memory module after receiving the information, and the information is encrypted and stored by a secure encryption hardware card and a database module contained in the information storage card, and in the encryption process, an encryption algorithm is as follows:
the encryption algorithm is used for protecting data, and the AES (Advanced Encryption Standard) algorithm can be used for encrypting sensitive data such as inventory, a purchase order, a sales order and the like, and is a symmetric encryption algorithm with high-strength security and high encryption and decryption speed, and the encryption process mainly comprises the following steps:
and (3) key generation: a key of length 128, 192 or 256 bits is selected for encryption and decryption.
Plain text packet: the plain text is divided into groups according to a certain block length.
Initial wheel: a special operation is performed on the first set of data.
Round function: multiple round function operations are performed on each set of data, including byte substitution, row shifting, column confusion, and round key addition.
Ending the wheel: a special operation is performed on the last set of data.
Ciphertext output: and outputting the final encryption result as ciphertext.
The encryption and decryption processes are as described above, and specific implementation can refer to the standard document of the AES algorithm.
In addition to protecting data by using encryption algorithm, access control mechanism can be used to limit user access to sensitive data, for example, different user roles are set, different data tables and fields are given authority to operate according to different authority of roles, and audit mechanism can be used to record and monitor access behavior of user, and data backup and recovery mechanism can be used to ensure safety and integrity of data.
In summary, the storage information management encryption algorithm includes encryption, access control mechanism, audit mechanism, data backup and recovery mechanism and other aspects of using AES algorithm to encrypt the sensitive data, and these algorithms and mechanisms can help to protect the security and integrity of the sensitive data and prevent data leakage and damage;
D. when identity information authentication fails, the matching module gives a control instruction to the controller and controls the alarm sounder to alarm and sound, the information is converted into a digital signal through the decoder, and the information is transmitted to the communication service station through the signal transmitter and the signal receiver;
E. in the transmission process, a firewall management module and an encryption hardware module contained in the network module encrypt network information of the network module in real time, and the RFID technology flow in the perception measuring and calculating method in the information transmission process is as follows:
Sm=Rm+IXm
Sn=Rn+IXn
in the formula, I represents tag antenna induced current, sm and Sn represent tag antenna impedance and tag load impedance.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention can effectively identify and double authenticate the user entering the warehouse management system and using the information sensing equipment through the design of the system, and the alarm sounder is arranged in the authentication process, so that the alarm sounder can be used for alarming and sounding when the identity authentication fails, the safety of the information authentication before the use of the system is effectively improved, meanwhile, the communication network and the warehouse and management thereof and the storage information of the personnel can be effectively encrypted and prevented in the transmission process of the communication data information, and the safety of the system in the data storage and management of the personnel entering the warehouse information management and the warehouse system management platform thereof is effectively improved.
Drawings
FIG. 1 is a system schematic diagram of an intelligent warehouse management and control system and method based on big data application;
FIG. 2 is a schematic diagram of an intelligent warehouse management and control system and method thereof based on big data application;
FIG. 3 is a schematic diagram of an intelligent warehouse management and control system and its method based on big data application, and an identity authentication module system;
FIG. 4 is a schematic diagram of a network module system of the intelligent warehouse management and control system and method based on big data application;
fig. 5 is a schematic diagram of an intelligent warehouse management and control system based on big data application and a warehouse management system in the method thereof.
Detailed Description
Referring to fig. 1-5, an intelligent warehouse management and control system based on big data application and a method thereof are disclosed, the intelligent warehouse management and control system comprises a network module, wherein an output end of the network module is electrically connected with an identity authentication module, an output end of the identity authentication module is electrically connected with a communication information conversion station and a matching module respectively, an output end of the communication information conversion station is electrically connected with an information sensing device, an output end of the information sensing device is electrically connected with an information recording module and an information transmission module respectively, the inside of the network module comprises a firewall management module and an encryption hardware module, the inside of the identity authentication module comprises a face recognition module and a fingerprint recognition module, an output end of the matching module is electrically connected with a controller, and an output end of the controller is electrically connected with an alarm sounder.
Specifically, the input end of the identity authentication module is electrically connected with a power supply module, and the input end of the power supply module is electrically connected with a power supply state indicator and a power supply safety detection module respectively.
Specifically, the output end of the information recording module is electrically connected with a flash memory module, the output end of the flash memory module is electrically connected with an information storage card, and the information storage card comprises a secure encryption hardware card and a database module.
Specifically, the output end of the information transmission module is electrically connected with a decoder, and the output end of the decoder is electrically connected with a signal transmitter.
Specifically, the output end of the signal transmitter is electrically connected with a signal receiver, and the output end of the signal receiver is electrically connected with a communication service station.
Specifically, the output end of the network module is electrically connected with a warehouse management system, and the output end of the warehouse management system is electrically connected with an equipment foundation data input module.
Specifically, the output end of the equipment basic data input module is electrically connected with an intelligent operation and maintenance system display platform, and the interior of the warehouse management system comprises a warehouse management module, a warehouse management module and a warehouse management module.
The intelligent warehouse management and control method based on big data application comprises the following implementation method:
A. basic information of equipment contained in the warehouse management system can be transmitted to an intelligent operation and maintenance system display platform through an equipment basic data input module, so that a manager entering the warehouse can directly check the information, a warehouse management module contained in the warehouse management system can manage the warehouse information, a warehouse position management module can visually check the residual quantity of storage positions in the warehouse, the inventory management module can monitor the whole inventory of the warehouse in real time, and a warehouse outlet management module can monitor and manage the information of the warehouse outlet;
B. after entering a warehouse, a manager carries out identification and authentication on personal identity information through an identity authentication module, a face recognition module and a fingerprint recognition module are contained in the identity authentication module, double identity authentication can be carried out on an entering person, a power supply module can continuously supply power in the use process of the system, and a power supply explosion UN counter indicator and a power supply safety detection module can monitor and detect circuits used by the system in real time;
C. when personnel information passes authentication, the personnel information can enter a communication information conversion station and can use an information sensing device to send and transmit information, the information can be synchronously transmitted to the inside of an information recording module, the information recording module can directly store the information into an information storage card through a flash memory module after receiving the information, and the information is encrypted and stored by a secure encryption hardware card and a database module contained in the information storage card, and in the encryption process, an encryption algorithm is as follows:
the encryption algorithm is used for protecting data, and the AES (Advanced Encryption Standard) algorithm can be used for encrypting sensitive data such as inventory, a purchase order, a sales order and the like, and is a symmetric encryption algorithm with high-strength security and high encryption and decryption speed, and the encryption process mainly comprises the following steps:
and (3) key generation: a key of length 128, 192 or 256 bits is selected for encryption and decryption.
Plain text packet: the plain text is divided into groups according to a certain block length.
Initial wheel: a special operation is performed on the first set of data.
Round function: multiple round function operations are performed on each set of data, including byte substitution, row shifting, column confusion, and round key addition.
Ending the wheel: a special operation is performed on the last set of data.
Ciphertext output: and outputting the final encryption result as ciphertext.
The encryption and decryption processes are as described above, and specific implementation can refer to the standard document of the AES algorithm.
In addition to protecting data by using encryption algorithm, access control mechanism can be used to limit user access to sensitive data, for example, different user roles are set, different data tables and fields are given authority to operate according to different authority of roles, and audit mechanism can be used to record and monitor access behavior of user, and data backup and recovery mechanism can be used to ensure safety and integrity of data.
In summary, the storage information management encryption algorithm includes encryption, access control mechanism, audit mechanism, data backup and recovery mechanism and other aspects of using AES algorithm to encrypt the sensitive data, and these algorithms and mechanisms can help to protect the security and integrity of the sensitive data and prevent data leakage and damage;
the encryption process of the symmetric key encryption algorithm mainly comprises the following steps:
key expansion: the key is expanded into one or more key schedules based on the selected key length. Each key schedule contains several 32-bit words for key computation of subsequent rounds.
Initial wheel: the plaintext block is subjected to specific operations including byte substitution, row shifting, column confusion, and round key addition.
Round function: and carrying out operations of a plurality of rounds on the data obtained by the initial round according to a specified rule, wherein the operations comprise byte substitution, row shifting, column confusion, round key addition and the like.
Ending the wheel: in the last round, the column aliasing operation is omitted, and only byte substitution, row shifting and round key addition are performed.
Ciphertext output: and outputting the encryption result as ciphertext.
The following specifically describes the formula of the AES algorithm.
Byte substitution (SubBytes)
Byte substitution is an operation of substituting each byte in the plain text with another byte. It is an important nonlinear transformation in the AES algorithm. Byte substitution may be achieved by a 256 x 8S-box. The S-box is a pre-computed byte substitution table in which each input byte corresponds to an output byte. The S-box may prevent an attacker from deducing the original data by analyzing the encryption result.
The byte substitution operation can be expressed as the following formula:
where S [ ] S [ ] represents a 256×8S box, b_ { i, j } bi, j represents the ith row and jth column byte in the plaintext matrix.
Line shifting (ShiftRows)
A row shift is an operation of cyclically shifting each row in the plaintext matrix left by several bits. In the AES algorithm, row 1 is not shifted, row 2 is shifted left by 1 byte, row 3 is shifted left by 2 bytes, and row 4 is shifted left by 3 bytes.
The row shift operation can be expressed as the following formula:
\begin{bmatrix}b_{0,0}&b_{0,1}&b_{0,2}&b_{0,3}\\b_{1,0}&b_{1,1}&b_{1,2}&b_{1,3}\\b_{2,0}&b_{2,1}&b_{2,2}&b_{2,3}\\b_{3,0}&b_{3,1}&b_{3,2}&b_{3,3}\end{bmatrix}
\rightarrow
\begin{bmatrix}b_{0,0}&b_{;
D. when identity information authentication fails, the matching module gives a control instruction to the controller and controls the alarm sounder to alarm and sound, the information is converted into a digital signal through the decoder, and the information is transmitted to the communication service station through the signal transmitter and the signal receiver;
E. in the transmission process, a firewall management module and an encryption hardware module contained in the network module encrypt network information of the network module in real time, and the RFID technology flow in the perception measuring and calculating method in the information transmission process is as follows:
Sm=Rm+IXm
Sn=Rn+IXn
in the formula, I represents tag antenna induced current, sm and Sn represent tag antenna impedance and tag load impedance.
The working principle of the invention is as follows: basic information of equipment in the warehouse management system can be transmitted to an intelligent operation and maintenance system display platform through an equipment basic data input module, so that a manager entering the warehouse can directly check the information, the warehouse management module in the warehouse management system can manage and control the warehouse information, the warehouse position management module can visually check the residual quantity of storage positions in the warehouse, the warehouse management module can monitor and manage the whole warehouse in real time, the warehouse management module can monitor and manage the warehouse information, the manager can identify and authenticate personal identity information through an identity authentication module after entering the warehouse, a face recognition module and a fingerprint recognition module in the identity authentication module can perform double identity authentication on an entering person, and a power supply module can continuously supply power in the use process of the system, the power explosion UN counter indicator and the power safety detection module can monitor and detect the circuits used by the system in real time, when personnel information passes authentication, the personnel information can enter the communication information conversion station and use the information sensing equipment to send and transmit information, the information can be synchronously transmitted to the inside of the information recording module, the information recording module can directly store the information into the information storage card through the flash memory module after receiving the information, the information is encrypted and stored by the safety encryption hardware card and the database module contained in the information storage card, when identity information fails authentication, the matching module can give a control instruction to the controller and control the alarm sounder to alarm and sound, the information is converted into a digital signal through the decoder and is transmitted to the communication service station through the signal transmitter and the signal receiver, in the transmission process, the firewall management module and the encryption hardware module contained in the network module can encrypt the network information of the network module in real time.
The foregoing description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical solution of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.
Claims (8)
1. The intelligent warehouse management and control system based on big data application and the method thereof comprise a network module, and are characterized in that: the intelligent network comprises a network module, wherein an output end of the network module is electrically connected with an identity authentication module, an output end of the identity authentication module is electrically connected with a communication information conversion station and a matching module respectively, an output end of the communication information conversion station is electrically connected with an information sensing device, an output end of the information sensing device is electrically connected with an information recording module and an information transmission module respectively, the inside of the network module comprises a firewall management module and an encryption hardware module, the inside of the identity authentication module comprises a face recognition module and a fingerprint recognition module, the output end of the matching module is electrically connected with a controller, and the output end of the controller is electrically connected with an alarm sounder.
2. The intelligent warehouse management and control system and method based on big data application as claimed in claim 1, wherein: the input end of the identity authentication module is electrically connected with a power supply module, and the input end of the power supply module is electrically connected with a power supply state indicator and a power supply safety detection module respectively.
3. The intelligent warehouse management and control system and method based on big data application as claimed in claim 1, wherein: the output end of the information recording module is electrically connected with a flash memory module, the output end of the flash memory module is electrically connected with an information storage card, and the information storage card comprises a secure encryption hardware card and a database module.
4. The intelligent warehouse management and control system and method based on big data application as claimed in claim 1, wherein: the output end of the information transmission module is electrically connected with a decoder, and the output end of the decoder is electrically connected with a signal transmitter.
5. The intelligent warehouse management and control system and method based on big data application as claimed in claim 4, wherein: the output end of the signal transmitter is electrically connected with a signal receiver, and the output end of the signal receiver is electrically connected with a communication service station.
6. The intelligent warehouse management and control system and method based on big data application as claimed in claim 1, wherein: the output end of the network module is electrically connected with a warehouse management system, and the output end of the warehouse management system is electrically connected with an equipment foundation data input module.
7. The intelligent warehouse management and control system and method based on big data application as claimed in claim 6, wherein: the intelligent operation and maintenance system display platform is electrically connected to the output end of the equipment basic data input module, and the warehouse management system comprises a warehouse management module, a warehouse management module and a warehouse management module.
8. The intelligent warehouse management and control method based on big data application is characterized in that: the implementation method is as follows:
A. basic information of equipment contained in the warehouse management system can be transmitted to an intelligent operation and maintenance system display platform through an equipment basic data input module, so that a manager entering the warehouse can directly check the information, a warehouse management module contained in the warehouse management system can manage the warehouse information, a warehouse position management module can visually check the residual quantity of storage positions in the warehouse, the inventory management module can monitor the whole inventory of the warehouse in real time, and a warehouse outlet management module can monitor and manage the information of the warehouse outlet;
B. after entering a warehouse, a manager carries out identification and authentication on personal identity information through an identity authentication module, a face recognition module and a fingerprint recognition module are contained in the identity authentication module, double identity authentication can be carried out on an entering person, a power supply module can continuously supply power in the use process of the system, and a power supply explosion UN counter indicator and a power supply safety detection module can monitor and detect circuits used by the system in real time;
C. when personnel information passes authentication, the personnel information can enter a communication information conversion station and can use an information sensing device to send and transmit information, the information can be synchronously transmitted to the inside of an information recording module, the information recording module can directly store the information into an information storage card through a flash memory module after receiving the information, and the information is encrypted and stored by a secure encryption hardware card and a database module contained in the information storage card, and in the encryption process, an encryption algorithm is as follows:
the encryption algorithm is used for protecting data, and the AES (Advanced Encryption Standard) algorithm can be used for encrypting sensitive data such as inventory, a purchase order, a sales order and the like, and is a symmetric encryption algorithm with high-strength security and high encryption and decryption speed, and the encryption process mainly comprises the following steps:
and (3) key generation: a key of length 128, 192 or 256 bits is selected for encryption and decryption.
Plain text packet: the plain text is divided into groups according to a certain block length.
Initial wheel: a special operation is performed on the first set of data.
Round function: multiple round function operations are performed on each set of data, including byte substitution, row shifting, column confusion, and round key addition.
Ending the wheel: a special operation is performed on the last set of data.
Ciphertext output: and outputting the final encryption result as ciphertext.
The encryption and decryption processes are as described above, and specific implementation can refer to the standard document of the AES algorithm.
In addition to protecting data by using encryption algorithm, access control mechanism can be used to limit user access to sensitive data, for example, different user roles are set, different data tables and fields are given authority to operate according to different authority of roles, and audit mechanism can be used to record and monitor access behavior of user, and data backup and recovery mechanism can be used to ensure safety and integrity of data.
In summary, the storage information management encryption algorithm includes encryption, access control mechanism, audit mechanism, data backup and recovery mechanism and other aspects of using the AES algorithm to encrypt the sensitive data, where these algorithms and mechanisms can help to protect the security and integrity of the sensitive data, and prevent data leakage and damage.
A=A 0 -A 1 -A 0 -A 1 /P 0 *P 1
Wherein A is 0 For the total information quantity to be encrypted, A is the information quantity of encryption tasks processed by a symmetric algorithm encryption module, A 1 Processing information quantity maximum value, P of encryption task for asymmetric algorithm encryption module 0 Decryption time for second order set value, P 1 Decryption time estimated for the response time calculation module;
D. when identity information authentication fails, the matching module gives a control instruction to the controller and controls the alarm sounder to alarm and sound, the information is converted into a digital signal through the decoder, and the information is transmitted to the communication service station through the signal transmitter and the signal receiver;
E. in the transmission process, a firewall management module and an encryption hardware module contained in the network module encrypt network information of the network module in real time, and the RFID technology flow in the perception measuring and calculating method in the information transmission process is as follows:
Sm=Rm+IXm
Sn=Rn+IXn
in the formula, I represents tag antenna induced current, sm and Sn represent tag antenna impedance and tag load impedance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310766299.0A CN116757603A (en) | 2023-06-27 | 2023-06-27 | Intelligent warehouse management and control system and method based on big data application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310766299.0A CN116757603A (en) | 2023-06-27 | 2023-06-27 | Intelligent warehouse management and control system and method based on big data application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116757603A true CN116757603A (en) | 2023-09-15 |
Family
ID=87951170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310766299.0A Pending CN116757603A (en) | 2023-06-27 | 2023-06-27 | Intelligent warehouse management and control system and method based on big data application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116757603A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128547A1 (en) * | 2002-12-31 | 2004-07-01 | Robert Laidlaw | Method and system for modular authentication and session management |
CN204204029U (en) * | 2014-10-24 | 2015-03-11 | 深圳市海洋船舶代理有限公司 | A kind of ship's husband's logistic management system |
CN107705057A (en) * | 2017-08-23 | 2018-02-16 | 太仓宏璟辅龙信息科技有限公司 | A kind of warehouse intelligent management system |
CN108053001A (en) * | 2017-12-14 | 2018-05-18 | 上海密尔克卫化工储存有限公司 | The information safety authentication method and system of electronics warehouse receipt |
CN108537481A (en) * | 2018-03-27 | 2018-09-14 | 北京华科众合科技有限公司 | A kind of intelligent warehousing system and storage method based on cloud service |
CN110443544A (en) * | 2019-07-16 | 2019-11-12 | 格力电器(武汉)有限公司 | Storage management method, device, storage case and warehousing system |
CN110837989A (en) * | 2019-08-21 | 2020-02-25 | 航天万源实业有限公司 | Intelligent control and data management method for goods packaging based on QR (quick response) code |
CN111932177A (en) * | 2020-08-10 | 2020-11-13 | 山东工业职业学院 | Intelligence commodity circulation garden goods blending device for business administration |
CN113132379A (en) * | 2021-04-16 | 2021-07-16 | 贵州华宁科技股份有限公司 | Intelligent security system of warehousing system |
CN114266525A (en) * | 2021-12-31 | 2022-04-01 | 深圳市凯东源现代物流股份有限公司 | Collection-warehouse collection-distribution type storage and distribution system |
CN114697043A (en) * | 2022-03-14 | 2022-07-01 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on block chain technology and authentication method thereof |
CN115271614A (en) * | 2022-08-30 | 2022-11-01 | 浙江中昊物流技术有限公司 | Green low-carbon intelligent warehouse management platform |
CN115423411A (en) * | 2022-09-20 | 2022-12-02 | 苏州金泰晨信息科技有限公司 | Logistics storage management system and method |
CN115953113A (en) * | 2023-02-16 | 2023-04-11 | 武汉欧特英吉工业有限公司 | Remote visual warehouse management control system |
-
2023
- 2023-06-27 CN CN202310766299.0A patent/CN116757603A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128547A1 (en) * | 2002-12-31 | 2004-07-01 | Robert Laidlaw | Method and system for modular authentication and session management |
CN204204029U (en) * | 2014-10-24 | 2015-03-11 | 深圳市海洋船舶代理有限公司 | A kind of ship's husband's logistic management system |
CN107705057A (en) * | 2017-08-23 | 2018-02-16 | 太仓宏璟辅龙信息科技有限公司 | A kind of warehouse intelligent management system |
CN108053001A (en) * | 2017-12-14 | 2018-05-18 | 上海密尔克卫化工储存有限公司 | The information safety authentication method and system of electronics warehouse receipt |
CN108537481A (en) * | 2018-03-27 | 2018-09-14 | 北京华科众合科技有限公司 | A kind of intelligent warehousing system and storage method based on cloud service |
CN110443544A (en) * | 2019-07-16 | 2019-11-12 | 格力电器(武汉)有限公司 | Storage management method, device, storage case and warehousing system |
CN110837989A (en) * | 2019-08-21 | 2020-02-25 | 航天万源实业有限公司 | Intelligent control and data management method for goods packaging based on QR (quick response) code |
CN111932177A (en) * | 2020-08-10 | 2020-11-13 | 山东工业职业学院 | Intelligence commodity circulation garden goods blending device for business administration |
CN113132379A (en) * | 2021-04-16 | 2021-07-16 | 贵州华宁科技股份有限公司 | Intelligent security system of warehousing system |
CN114266525A (en) * | 2021-12-31 | 2022-04-01 | 深圳市凯东源现代物流股份有限公司 | Collection-warehouse collection-distribution type storage and distribution system |
CN114697043A (en) * | 2022-03-14 | 2022-07-01 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on block chain technology and authentication method thereof |
CN115271614A (en) * | 2022-08-30 | 2022-11-01 | 浙江中昊物流技术有限公司 | Green low-carbon intelligent warehouse management platform |
CN115423411A (en) * | 2022-09-20 | 2022-12-02 | 苏州金泰晨信息科技有限公司 | Logistics storage management system and method |
CN115953113A (en) * | 2023-02-16 | 2023-04-11 | 武汉欧特英吉工业有限公司 | Remote visual warehouse management control system |
Non-Patent Citations (1)
Title |
---|
高儒灏: "基于有源RFID的仓库管理系统", 《计算机系统应用》, vol. 18, no. 12, pages 150 - 152 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102077177B (en) | Method and system for validating a succession of events experienced by a device | |
CN107231231B (en) | Method and system for terminal equipment to safely access Internet of things | |
CN104463007A (en) | Data authentication method and apparatus thereof | |
CN103281189A (en) | Light weight class safe protocol certification system and method for radio frequency identification equipment | |
EP2854434A1 (en) | Wireless communication method for an Electronic Shelf Label (ESL) system | |
CN110298196A (en) | A kind of electronic information security storage system and storage method | |
CN102081744A (en) | Path identification system and secure interaction method thereof | |
US11496285B2 (en) | Cryptographic side channel resistance using permutation networks | |
CN108376290A (en) | A kind of control method, device and server that financial self-service equipment is safeguarded | |
CN102571754A (en) | Method for protecting security of visualized information system | |
CN101976365B (en) | Safe radio frequency identification system | |
CN106130777A (en) | System safeguarded by a kind of industrial equipment based on cloud computing | |
CN101488179A (en) | Authentication method and apparatus for wireless radio frequency recognition system | |
KR101544110B1 (en) | Supervisory control and data acquisition system | |
US6810355B1 (en) | Balance and a method for operating a balance | |
CN102693438A (en) | Privacy protection radio frequency identification password protocol method and system | |
CN116757603A (en) | Intelligent warehouse management and control system and method based on big data application | |
CN104599097B (en) | A kind of method and device of fortune paper money bag electronic sealing monitoring | |
CN115118751A (en) | Block chain-based supervision system, method, equipment and medium | |
CN114844713A (en) | Video stream encryption method based on cryptographic algorithm and related equipment | |
KR101067792B1 (en) | A unity monitoring system of a container ship and a container certification security method using an E-Seal Tag | |
CN112632583A (en) | Internet of things integrated management system | |
CN102324005A (en) | Security authentication method, system and device for terminal without computing capability | |
JP2000289814A (en) | Control system for spare apparatus stock data | |
CN116993124A (en) | System for serving informatization management of manufacturing industry |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |