CN117424756B - Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment - Google Patents

Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment Download PDF

Info

Publication number
CN117424756B
CN117424756B CN202311735851.6A CN202311735851A CN117424756B CN 117424756 B CN117424756 B CN 117424756B CN 202311735851 A CN202311735851 A CN 202311735851A CN 117424756 B CN117424756 B CN 117424756B
Authority
CN
China
Prior art keywords
data
encryption
machine
control
scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311735851.6A
Other languages
Chinese (zh)
Other versions
CN117424756A (en
Inventor
安郁熙
王者胜
徐连建
张鸣
王威
宋玉斌
艾国昌
张青梅
杨爱萍
信明博
刘上
张铁军
马翠翠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaxia Tianxin Intelligent Internet Of Things Co ltd
Original Assignee
Huaxia Tianxin Intelligent Internet Of Things Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaxia Tianxin Intelligent Internet Of Things Co ltd filed Critical Huaxia Tianxin Intelligent Internet Of Things Co ltd
Priority to CN202311735851.6A priority Critical patent/CN117424756B/en
Publication of CN117424756A publication Critical patent/CN117424756A/en
Application granted granted Critical
Publication of CN117424756B publication Critical patent/CN117424756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01DMEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
    • G01D21/00Measuring or testing not otherwise provided for
    • G01D21/02Measuring two or more variables by means not covered by a single other subclass
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/20Analytics; Diagnosis
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/30Control
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Biomedical Technology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the field of mining integrated machines, and discloses a mining variable-frequency speed-regulating asynchronous integrated machine control encryption method, a device and electronic equipment, wherein the method can be applied to a server and comprises the following steps: acquiring first acquisition data of an Internet of things component related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; encrypting the control scheme and issuing the encrypted control scheme to the all-in-one machine, wherein the all-in-one machine is used for receiving the control scheme and acquiring second acquired data of the sensor assembly so as to match the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy, so as to determine the equipment frequency modulation scheme of the mining equipment; the scheme can control mining equipment more reasonably.

Description

Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment
Technical Field
The invention relates to the technical field of mining integrated machines, in particular to a mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment.
Background
The technical field of mining integrated machines is focused on developing and applying highly integrated mechanical and electronic equipment so as to improve the safety, efficiency and reliability of mining operations. The integrated equipment integrates various technologies, such as variable frequency speed regulation technology, an automatic control system, a sensor network and the like, and aims to realize accurate control of mining equipment. Through frequency conversion adjustment, the power and the speed of the mining equipment can be optimized according to actual requirements, so that the purposes of saving energy and improving production efficiency are achieved. In addition, this field is also focused on improving the level of intelligence of the equipment, by integrating advanced sensors and control algorithms to adapt to the complexity and variability of the mining environment.
In the traditional method, the integrated machine can only collect the sensor information directly connected with the integrated machine, so that the comprehensiveness of understanding and controlling the whole environment is limited. The lack of a comprehensive sense of the surrounding environment results in control strategies that may not be accurate or reasonable enough to affect the efficiency and safety of the device. Secondly, the traditional method has loopholes in the aspect of data transmission security, and is easy to be interfered by the outside or illegally accessed, so that the security risk is increased. In addition, these methods are also relatively weak in terms of adaptability and flexibility, and it is difficult to adjust the control strategy in real time to cope with changing mining environments and equipment conditions. These deficiencies therefore limit the optimum performance of mining equipment and the safety of the overall operation.
Disclosure of Invention
The invention provides a method and a device for controlling encryption by using a variable-frequency speed-regulating asynchronous integrated machine and electronic equipment.
In order to solve the technical problems, the invention is realized as follows:
in a first aspect, the present application provides a mining variable frequency speed regulation asynchronous all-in-one machine control encryption method, which is applied to a server, wherein the server interacts with an internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, and the method includes: acquiring first acquisition data of an Internet of things component related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, and the all-in-one machine is used for receiving the control scheme, acquiring second acquired data of the sensor assembly and matching the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy so as to determine the equipment frequency modulation scheme of the mining equipment.
Preferably, the encrypting the control scheme includes: encrypting the data range by adopting a first encryption key to obtain first encrypted data; encrypting the equipment frequency modulation scheme by adopting a second encryption key to obtain second encrypted data, and obtaining a scheme decryption key of the second encryption key; and encrypting the first encrypted data, the second encrypted data and the scheme decryption key by adopting a third encryption key to form an encryption result, and sending the encryption result to the all-in-one machine, wherein the third encryption key adopts a public key of the all-in-one machine.
Preferably, the integrated machine is used for: receiving an encryption result, and obtaining a private key corresponding to a public key of the all-in-one machine, so as to decrypt the encryption result according to the private key, thereby obtaining first encryption data, second encryption data and a scheme decryption key; matching is carried out according to the first encrypted data and the second acquired data of the sensor assembly, and a matching result is determined; and acquiring target encrypted data from the second encrypted data according to the matching result, and adopting a scheme decryption key to decrypt the target encrypted data to acquire the equipment frequency modulation scheme of the mining equipment.
Preferably, the matching according to the first encrypted data and the second collected data of the sensor assembly includes: acquiring a data decryption key corresponding to the first encryption key from a server; and decrypting the first encrypted data by adopting the data decryption key to obtain the data range of the sensor assemblies of the plurality of groups of all-in-one machines, and matching according to the second acquired data to determine a matching result.
Preferably, the matching according to the first encrypted data and the second collected data of the sensor assembly includes: acquiring a first encryption key from a server; encrypting the second acquired data of the sensor assembly by adopting the first encryption key to obtain third encrypted data; and matching according to the first encrypted data and the third encrypted data to determine a matching result.
Preferably, the first encrypted data includes a boundary value and an intermediate value of a data range of a sensor assembly of the all-in-one machine, and the matching is performed according to the first encrypted data and the third encrypted data to determine a matching result, including: and carrying out encryption matching according to the first encryption data and the third encryption data, and determining encryption matching data containing the third encryption data in the first encryption data as a matching result.
Preferably, the first encryption data includes a boundary value of a data range of a sensor assembly of the all-in-one machine, the first encryption key is an encryption key based on homomorphic encryption, and the matching is performed according to the first encryption data and the third encryption data to determine a matching result, including: and determining whether the third encrypted data is in the data range of the first encrypted data according to the encryption comparison of the first encrypted data and the third encrypted data so as to determine encryption matching data from the first encrypted data as a matching result.
Preferably, the decrypting key adopting the scheme decrypts to obtain the equipment frequency modulation scheme of the mining equipment, and the method comprises the following steps: acquiring a storage position and a storage name of an encryption result; and decrypting by adopting the storage position, the storage name and the scheme decryption key of the encryption result to obtain the equipment frequency modulation scheme of the mining equipment, wherein the effective times of the scheme decryption key are one time.
In a second aspect, the application provides a mining Variable Frequency Speed Governing (VFSG) asynchronous all-in-one machine control encryption device, is applied to the server, the server is interacted and is controlled the all-in-one with the relevant thing networking subassembly of all-in-one, the all-in-one is used for interacting and controlling the mining equipment that the all-in-one is relevant with the sensor subassembly, the device includes: the first data acquisition module is used for acquiring first acquisition data of the Internet of things component related to the all-in-one machine; the control scheme acquisition module is used for analyzing the first acquired data and determining a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; the control scheme issuing module is used for encrypting the control scheme and issuing the encrypted control scheme to the all-in-one machine, and the all-in-one machine is used for receiving the control scheme and acquiring second acquisition data of the sensor assembly so as to match the data range of the sensor assembly of the all-in-one machine according to the second acquisition data and the control strategy, so as to determine the equipment frequency modulation scheme of the mining equipment.
In a third aspect, the present application provides an electronic device, including: a memory and at least one processor; the memory is used for storing computer execution instructions; the at least one processor is configured to execute computer-executable instructions stored in the memory, such that the at least one processor performs the method according to the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to the first aspect.
Compared with the prior art, the invention has the advantages and positive effects that:
according to the invention, the first acquired data and the deep analysis of the data are acquired through the Internet of things component, so that the control scheme is more accurate and efficient, the operation of mining equipment is optimized, and the energy consumption and the cost are reduced. Secondly, the encryption of the control scheme ensures the security of data transmission, effectively prevents the risks of data leakage and unauthorized access, and enhances the security of the whole system. In addition, the frequency modulation scheme is determined and adjusted according to the sensor data acquired for the second time, so that the adaptability and the flexibility of the system are improved, and the mining equipment can better cope with a variable working environment. In a comprehensive view, the method improves the performance of the mining equipment, enhances the safety and reliability of operation, and improves the efficiency of resource utilization.
The application provides a mining variable frequency speed regulation asynchronous all-in-one machine control encryption method, which can be applied to a server, wherein the server interacts with an Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, and the method comprises the following steps: acquiring first acquisition data of an Internet of things component related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, and the all-in-one machine is used for receiving the control scheme, acquiring second acquired data of the sensor assembly and matching the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy so as to determine the equipment frequency modulation scheme of the mining equipment.
The method and the device can be applied to the scene that the mining integrated machine controls the mining equipment, the server can be arranged in the scheme, the Internet of things component can be deployed in the surrounding environment of the mining equipment or the mining equipment, and the Internet of things component can be equipment such as a sensor. The server interacts with the Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with the sensor component and controlling mining equipment related to the all-in-one machine. The server can acquire the first acquired data of the Internet of things component, analyze the first acquired data and determine a control scheme containing a plurality of groups of control strategies, and the plurality of groups of control strategies can respectively correspond to different data of the sensor component of the integrated machine, so that the first acquired data of the sensor component and the second acquired data of the control scheme are analyzed in the integrated machine, and the equipment frequency modulation scheme of the mining equipment is determined. According to the scheme, the Internet of things components with different dimensions are additionally arranged on the mining equipment or in the environment around the mining equipment (such as the temperature and humidity sensor can only be adopted for analysis before, the existing scheme can increase the acquisition of environmental images and other dimensional data for analysis), the data of the Internet of things components are acquired through the server to form a plurality of groups of control strategies and are issued to the integrated machine, the integrated machine can combine the second acquired data of the sensor components for analysis, and further the mining equipment is reasonably controlled according to the data of the Internet of things components and the sensor components, so that a better control effect is achieved.
Specifically, the method can be applied to a server, the server interacts with the internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with the sensor component and controlling mining equipment related to the all-in-one machine. The server can acquire first acquired data of a plurality of Internet of things components related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise data ranges of a plurality of sensor assemblies of the integrated machine and equipment frequency modulation schemes in the data ranges; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, the all-in-one machine is used for receiving the control scheme, acquiring second acquisition data of each sensor assembly, matching according to the second acquisition data and the data range of the sensor assembly of the all-in-one machine in the control strategy, determining the equipment frequency modulation scheme of the mining equipment, and controlling the mining equipment according to the equipment frequency modulation scheme.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and do not constitute a limitation on the invention. In the drawings:
FIG. 1 is a schematic flow chart of a mining variable frequency speed regulation asynchronous all-in-one control encryption method according to one embodiment of the application;
FIG. 2 is a schematic diagram of the steps of a mining variable frequency speed regulation asynchronous all-in-one control encryption method according to one embodiment of the present application;
fig. 3 is a schematic structural diagram of a mining variable frequency speed regulation asynchronous integrated machine control encryption device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The method and the device can be applied to a scene that the mining integrated machine controls mining equipment, as shown in fig. 1, the server can be arranged, the Internet of things component can be deployed in the surrounding environment of the mining equipment or the mining equipment, and the Internet of things component can be information acquisition equipment such as a sensor. The server interacts with the Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with the sensor component and controlling mining equipment related to the all-in-one machine. According to the scheme, the sensing equipment related to the mining equipment can be divided in advance, for example, the sensing equipment directly connected with the integrated machine can be divided into sensor components, and the sensing equipment added later and the sensing equipment not directly connected with the integrated machine components are divided into Internet of things components.
Specifically, the environmental data to be collected by the integrated machine includes temperature, humidity, environmental image, gas composition and vibration intensity. The acquisition method should use multi-element sensing technology including infrared sensing, image recognition, chemical sensors and accelerometers. The post-added sensing devices include newly added sensing devices and sensing devices that are not directly connected to the all-in-one machine. The device specifically comprises a camera, an environment sensor for measuring temperature, humidity and gas components, and a seismic wave monitor. Through the internet of things technology, wireless connection and data transmission between the sensing equipment and the all-in-one machine are realized.
In addition, through addding the networking of multi-dimensional thing subassembly in the environment, add the networking of multi-dimensional thing subassembly in mining equipment and surrounding environment to realize all-round data acquisition. For example, environmental image acquisition (using cameras), gas composition analysis (using chemical sensors), and vibration monitoring (using accelerometers) are added.
The server can acquire the first acquired data of the Internet of things component, analyze the first acquired data, determine a control scheme containing a plurality of groups of control strategies and send the control scheme to the integrated machine. The multiple groups of control strategies can respectively correspond to different data of the sensor assembly of the integrated machine, so that the equipment frequency modulation scheme of the mining equipment is determined in the integrated machine according to the control scheme and the second acquired data of the sensor assembly to control the mining equipment. According to the scheme, the Internet of things component is additionally arranged on the mining equipment or in the environment around the mining equipment, the data of the Internet of things component are acquired through the server, so that a plurality of groups of control strategies are formed and issued to the integrated machine, the integrated machine can analyze the second acquired data of the sensor component, and further the mining equipment is reasonably controlled according to the data of the Internet of things component and the sensor component, so that a better control effect is achieved.
Specifically, the method can be applied to a server, the server interacts with the internet of things components related to the integrated machine and controls the integrated machine, the integrated machine is used for interacting with the sensor components and controlling mining equipment related to the integrated machine, and the server can acquire first acquired data of the multiple internet of things components related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise data ranges of a plurality of sensor assemblies of the integrated machine and equipment frequency modulation schemes in the data ranges; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, the all-in-one machine is used for receiving the control scheme, acquiring second acquisition data of each sensor assembly, matching according to the second acquisition data and the data range of the sensor assembly of the all-in-one machine in the control strategy, determining the equipment frequency modulation scheme of the mining equipment, and controlling the mining equipment according to the equipment frequency modulation scheme.
Specifically, the embodiment of the application provides a mining variable-frequency speed-regulating asynchronous all-in-one machine control encryption method, which is applied to a server, wherein the server interacts with an internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, as shown in fig. 2, and the method comprises the following steps:
Step 202, acquiring first acquired data of an internet of things component related to the integrated machine.
And 204, analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and a frequency modulation scheme of the equipment in the data range. The server may preset an analysis model, which is a model obtained after training according to a large amount of training data.
After the server receives the data collected by the sensor component of the all-in-one machine, the data is processed by utilizing a data analysis algorithm, specifically a decision tree, a support vector machine or a neural network, so that key information is extracted from the sensor data and is used for making a control scheme. The control scheme comprises a plurality of control strategies such as temperature regulation, vibration monitoring and gas component detection, and the like, and aims to ensure efficient and safe operation of mining equipment. Multiple control strategies are cooperatively executed to address challenges associated with environmental changes, such as temperature increases that may affect gas composition, and related strategies need to be adjusted simultaneously. The training data comprise historical temperature records, vibration data and gas component analysis, and originate from actual mining site operation, so that the accuracy and the practicability of an analysis model are ensured. The analysis model adopts a deep learning network, comprises a convolutional neural network and a cyclic neural network, processes images and time sequence data, is structurally designed to be that an input layer receives various sensor data, a hidden layer extracts data characteristics, and an output layer generates a control strategy based on the characteristics.
And 206, encrypting the control scheme and issuing the encrypted control scheme to the all-in-one machine, wherein the all-in-one machine is used for receiving the control scheme and acquiring second acquired data of the sensor assembly so as to match the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy, so as to determine the equipment frequency modulation scheme of the mining equipment. When the data of the sensor component of the all-in-one machine is inconsistent with the data range of the control strategy, an alarm can be sent out.
In the invention, the control scheme is firstly encrypted and issued to the all-in-one machine. This encryption ensures the security and integrity of the control scheme during transmission. After receiving the encrypted control scheme, the all-in-one machine decrypts and acquires the content of the all-in-one machine. At the same time, the integrated machine continues to collect a second batch of data of the sensor assembly, which reflects the current status of the mining equipment and its environment.
The data matching process includes comparing the second batch of collected data to a control strategy in the control scheme. Specifically, the all-in-one machine compares the sensor data range defined in the control strategy with the second batch of collected data to check whether any deviation or abnormal condition exists. This matching process is based on predefined rules and algorithms, including threshold judgment, trend analysis, or pattern recognition.
The method of determining the frequency modulation scheme is based on the matching result. If the matching result shows that the current data is consistent with the preset control strategy, the all-in-one machine maintains the running state of the equipment according to the control strategy. If the matching result shows that the data deviates from the preset range of the control strategy, the integrated machine can adjust the operation parameters of the mining equipment, such as changing the operation frequency of the equipment, starting safety measures or adjusting the working mode of the equipment, so that the high-efficiency and safe operation of the equipment is ensured.
The application provides a mining variable frequency speed regulation asynchronous all-in-one machine control encryption method, which can be applied to a server, wherein the server interacts with an Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, and the method comprises the following steps: acquiring first acquisition data of an Internet of things component related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, and the all-in-one machine is used for receiving the control scheme, acquiring second acquired data of the sensor assembly and matching the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy so as to determine the equipment frequency modulation scheme of the mining equipment.
The method and the device can be applied to the scene that the mining integrated machine controls the mining equipment, the server can be arranged in the scheme, the Internet of things component can be deployed in the surrounding environment of the mining equipment or the mining equipment, and the Internet of things component can be equipment such as a sensor. The server interacts with the Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with the sensor component and controlling mining equipment related to the all-in-one machine. The server can acquire the first acquired data of the Internet of things component, analyze the first acquired data and determine a control scheme containing a plurality of groups of control strategies, and the plurality of groups of control strategies can respectively correspond to different data of the sensor component of the integrated machine, so that the first acquired data of the sensor component and the second acquired data of the control scheme are analyzed in the integrated machine, and the equipment frequency modulation scheme of the mining equipment is determined. According to the scheme, the Internet of things component is additionally arranged on the mining equipment or in the environment around the mining equipment, the data of the Internet of things component are acquired through the server, so that a plurality of groups of control strategies are formed and issued to the integrated machine, the integrated machine can analyze the second acquired data of the sensor component, and further the mining equipment is reasonably controlled according to the data of the Internet of things component and the sensor component, so that a better control effect is achieved.
The server can encrypt the data range and the equipment frequency modulation scheme respectively in an encryption mode, send the encrypted data range and the equipment frequency modulation scheme to the integrated machine, add a scheme decryption key of the equipment frequency modulation scheme to the data, encrypt the data together, form an encryption result and send the encryption result to the integrated machine. Specifically, as an optional embodiment, the encrypting the control scheme includes: encrypting the data range by adopting a first encryption key to obtain first encrypted data; encrypting the equipment frequency modulation scheme by adopting a second encryption key to obtain second encrypted data, and obtaining a scheme decryption key of the second encryption key; and encrypting the first encrypted data, the second encrypted data and the scheme decryption key by adopting a third encryption key to form an encryption result, and sending the encryption result to the all-in-one machine, wherein the third encryption key adopts a public key of the all-in-one machine.
The third encryption key is a public key disclosed by the all-in-one machine, a private key corresponding to the public key in the all-in-one machine is stored in the local part of the all-in-one machine, and the all-in-one machine can obtain the first encryption data, the second encryption data and the scheme decryption key in a mode of decrypting the private key. Specifically, as an alternative embodiment, the integrated machine is configured to: receiving an encryption result, and obtaining a private key corresponding to a public key of the all-in-one machine, so as to decrypt the encryption result according to the private key, thereby obtaining first encryption data, second encryption data and a scheme decryption key; matching is carried out according to the first encrypted data and the second acquired data of the sensor assembly, and a matching result is determined; and acquiring target encrypted data from the second encrypted data according to the matching result, and adopting a scheme decryption key to decrypt the target encrypted data to acquire the equipment frequency modulation scheme of the mining equipment. According to the scheme, the second acquired data can be respectively matched with the data ranges of the control strategies, so that the data range which the second acquired data accords with is determined, and the equipment frequency modulation scheme corresponding to the data range is extracted to control the mining equipment.
The second collected data and the data range can be matched in a plaintext manner, and the first encrypted data can be decrypted for matching. Specifically, as an alternative embodiment, the matching according to the first encrypted data and the second collected data of the sensor assembly includes: acquiring a data decryption key corresponding to the first encryption key from a server; and decrypting the first encrypted data by adopting the data decryption key to obtain the data range of the sensor assemblies of the plurality of groups of all-in-one machines, and matching according to the second acquired data to determine a matching result.
The model of the server is obtained after a large amount of data is trained, an analysis result of the model has high value, in order to prevent the analysis result from being leaked, the second collected data and the data range can be matched in a ciphertext mode, and the second collected data can be encrypted by adopting a first encryption key so as to be matched in an encryption state. Specifically, as an alternative embodiment, the matching according to the first encrypted data and the second collected data of the sensor assembly includes: acquiring a first encryption key from a server; encrypting the second acquired data of the sensor assembly by adopting the first encryption key to obtain third encrypted data; and matching according to the first encrypted data and the third encrypted data to determine a matching result.
When the data obtained by encrypting the same data by adopting the same key is the same, and the first encrypted data can be obtained by encrypting the boundary value and the intermediate value (each data is encrypted respectively) of the data range in the encrypted state, the corresponding third encrypted data corresponds to the data of the sensor assembly, and if the data of the sensor assembly accords with the data range, the third encrypted data is the same as at least one value in the first encrypted data, so that the data range which accords with the second acquired data of the sensor assembly can be determined by adopting a mode of encrypting and matching the boundary value and the intermediate value. Specifically, as an optional embodiment, the first encrypted data includes a boundary value and an intermediate value of a data range of a sensor assembly of the all-in-one machine, and the matching according to the first encrypted data and the third encrypted data to determine a matching result includes: and carrying out encryption matching according to the first encryption data and the third encryption data, and determining encryption matching data containing the third encryption data in the first encryption data as a matching result.
In another scheme, the boundary value and the second collected data can be encrypted by adopting a homomorphic encryption scheme, so that the size comparison is performed to determine the data range in which the second collected data accords. Specifically, as an optional embodiment, the first encryption data includes a boundary value of a data range of a sensor assembly of the all-in-one machine, the first encryption key is an encryption key based on homomorphic encryption, and the matching is performed according to the first encryption data and the third encryption data to determine a matching result, including: and determining whether the third encrypted data is in the data range of the first encrypted data according to the encryption comparison of the first encrypted data and the third encrypted data so as to determine encryption matching data from the first encrypted data as a matching result.
When decrypting the encrypted data of the device frequency modulation scheme, if the all-in-one machine decrypts all the device frequency modulation schemes, data leakage may be caused. Therefore, the scheme can decrypt the device frequency modulation scheme according to the storage position of the encryption result (preventing the encryption result from being copied to other folders for decryption, and the other time), the storage name (preventing the encryption result from being copied to the folder for decryption, and the scheme decryption key (one time valid). Specifically, as an optional embodiment, the decrypting the solution decryption key to obtain the equipment frequency modulation scheme of the mining equipment includes: acquiring a storage position and a storage name of an encryption result; and decrypting by adopting the storage position, the storage name and the scheme decryption key of the encryption result to obtain the equipment frequency modulation scheme of the mining equipment, wherein the effective times of the scheme decryption key are one time. By limiting the decryption scheme, the probability of data leakage can be reduced.
On the basis of the above embodiment, the embodiment of the present application further provides a mining variable frequency speed regulation asynchronous all-in-one machine control encryption device, which is applied to a server, wherein the server interacts with an internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, as shown in fig. 3, and the device comprises:
The first data obtaining module 302 is configured to obtain first collected data of an internet of things component related to the all-in-one machine.
The control scheme obtaining module 304 is configured to analyze the first collected data, determine a control scheme of the integrated machine for mining equipment related to the integrated machine, where the control scheme includes a plurality of groups of control policies, and the control policies include a data range of a sensor assembly of the integrated machine and a frequency modulation scheme of the equipment within the data range.
The control scheme issuing module 306 is configured to encrypt the control scheme, and issue the encrypted control scheme to the all-in-one machine, where the all-in-one machine is configured to receive the control scheme, obtain second collected data of the sensor assembly, and match the data range of the sensor assembly of the all-in-one machine according to the second collected data and the data range of the sensor assembly of the all-in-one machine in the control policy, so as to determine an equipment frequency modulation scheme of the mining equipment.
The implementation manner of the embodiment of the present application is similar to the implementation manner of the embodiment of the method, and the specific implementation manner may refer to the specific implementation manner of the embodiment of the method, which is not repeated herein.
The application provides a mining variable frequency speed regulation asynchronous all-in-one machine control encryption method, which can be applied to a server, wherein the server interacts with an Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with a sensor component and controlling mining equipment related to the all-in-one machine, and the method comprises the following steps: acquiring first acquisition data of an Internet of things component related to the integrated machine; analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range; the control scheme is encrypted, the encrypted control scheme is issued to the all-in-one machine, and the all-in-one machine is used for receiving the control scheme, acquiring second acquired data of the sensor assembly and matching the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy so as to determine the equipment frequency modulation scheme of the mining equipment.
The method and the device can be applied to the scene that the mining integrated machine controls the mining equipment, the server can be arranged in the scheme, the Internet of things component can be deployed in the surrounding environment of the mining equipment or the mining equipment, and the Internet of things component can be equipment such as a sensor. The server interacts with the Internet of things component related to the all-in-one machine and controls the all-in-one machine, and the all-in-one machine is used for interacting with the sensor component and controlling mining equipment related to the all-in-one machine. The server can acquire the first acquired data of the Internet of things component, analyze the first acquired data and determine a control scheme containing a plurality of groups of control strategies, and the plurality of groups of control strategies can respectively correspond to different data of the sensor component of the integrated machine, so that the first acquired data of the sensor component and the second acquired data of the control scheme are analyzed in the integrated machine, and the equipment frequency modulation scheme of the mining equipment is determined. According to the scheme, the Internet of things component is additionally arranged on the mining equipment or in the environment around the mining equipment, the data of the Internet of things component are acquired through the server, so that a plurality of groups of control strategies are formed and issued to the integrated machine, the integrated machine can analyze the second acquired data of the sensor component, and further the mining equipment is reasonably controlled according to the data of the Internet of things component and the sensor component, so that a better control effect is achieved.
On the basis of the above embodiment, the present application further provides an electronic device, including: a memory and at least one processor; the memory is used for storing computer execution instructions; the at least one processor is configured to execute computer-executable instructions stored in the memory, such that the at least one processor performs the method as described in the above embodiments.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the processes of the data processing method embodiment, and can achieve the same technical effects, so that repetition is avoided and no further description is given here. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random ACGess Memory, RAM), magnetic disk or optical disk.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flowchart and/or block of the flowchart illustrations and/or block diagrams, and combinations of flowcharts and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. According to the definitions herein, the computer-readable medium does not include a transitory computer-readable medium (transmission medium), such as a modulated data signal and carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present invention and is not intended to limit the present invention. Various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. The mining variable-frequency speed-regulating asynchronous integrated machine control encryption method is characterized by being applied to a server, wherein the server interacts with an Internet of things component related to the integrated machine and controls the integrated machine, and the integrated machine is used for interacting with a sensor component and controlling mining equipment related to the integrated machine, and the method comprises the following steps:
acquiring first acquisition data of an Internet of things component related to the integrated machine;
analyzing the first acquired data to determine a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range;
encrypting the control scheme and issuing the encrypted control scheme to the all-in-one machine, wherein the all-in-one machine is used for receiving the control scheme and acquiring second acquired data of the sensor assembly so as to match the data range of the sensor assembly of the all-in-one machine according to the second acquired data and the control strategy to determine the equipment frequency modulation scheme of the mining equipment,
wherein, encrypt the control scheme, include:
encrypting the data range by adopting a first encryption key to obtain first encrypted data;
Encrypting the equipment frequency modulation scheme by adopting a second encryption key to obtain second encrypted data, and obtaining a scheme decryption key of the second encryption key;
and encrypting the first encrypted data, the second encrypted data and the scheme decryption key by adopting a third encryption key to form an encryption result, and sending the encryption result to the all-in-one machine, wherein the third encryption key adopts a public key of the all-in-one machine.
2. The mining variable frequency speed regulation asynchronous all-in-one machine control encryption method according to claim 1, wherein the all-in-one machine is used for:
receiving an encryption result, and obtaining a private key corresponding to a public key of the all-in-one machine, so as to decrypt the encryption result according to the private key, thereby obtaining first encryption data, second encryption data and a scheme decryption key;
matching is carried out according to the first encrypted data and the second acquired data of the sensor assembly, and a matching result is determined;
and acquiring target encrypted data from the second encrypted data according to the matching result, and adopting a scheme decryption key to decrypt the target encrypted data to acquire the equipment frequency modulation scheme of the mining equipment.
3. The mining variable frequency speed control asynchronous all-in-one machine control encryption method according to claim 2, wherein the matching according to the first encryption data and the second collected data of the sensor assembly comprises:
Acquiring a data decryption key corresponding to the first encryption key from a server;
and decrypting the first encrypted data by adopting the data decryption key to obtain the data range of the sensor assemblies of the plurality of groups of all-in-one machines, and matching according to the second acquired data to determine a matching result.
4. The mining variable frequency speed control asynchronous all-in-one machine control encryption method according to claim 2, wherein the matching according to the first encryption data and the second collected data of the sensor assembly comprises:
acquiring a first encryption key from a server;
encrypting the second acquired data of the sensor assembly by adopting the first encryption key to obtain third encrypted data;
and matching according to the first encrypted data and the third encrypted data to determine a matching result.
5. The mining variable frequency speed asynchronous all-in-one machine control encryption method according to claim 4, wherein the first encryption data includes a boundary value and an intermediate value of a data range of a sensor assembly of the all-in-one machine, and the matching is performed according to the first encryption data and the third encryption data to determine a matching result, comprising:
and carrying out encryption matching according to the first encryption data and the third encryption data, and determining encryption matching data containing the third encryption data in the first encryption data as a matching result.
6. The mining variable frequency speed asynchronous all-in-one machine control encryption method according to claim 4, wherein the first encryption data comprises a boundary value of a data range of a sensor assembly of the all-in-one machine, the first encryption key is an encryption key based on homomorphic encryption, the matching is performed according to the first encryption data and the third encryption data to determine a matching result, and the method comprises:
and determining whether the third encrypted data is in the data range of the first encrypted data according to the encryption comparison of the first encrypted data and the third encrypted data so as to determine encryption matching data from the first encrypted data as a matching result.
7. The mining variable frequency speed regulation asynchronous all-in-one machine control encryption method according to claim 2, wherein the scheme decryption key is adopted to decrypt, and the equipment frequency modulation scheme of the mining equipment is obtained, and the method comprises the following steps:
acquiring a storage position and a storage name of an encryption result;
and decrypting by adopting the storage position, the storage name and the scheme decryption key of the encryption result to obtain the equipment frequency modulation scheme of the mining equipment, wherein the effective times of the scheme decryption key are one time.
8. The utility model provides a mining asynchronous all-in-one control encryption device of variable frequency speed governing, its characterized in that is applied to the server, the server interacts and controls the all-in-one with the relevant thing networking subassembly of all-in-one, the all-in-one is used for interacting and controlling the mining equipment that the all-in-one is relevant with the sensor subassembly, the device includes:
The first data acquisition module is used for acquiring first acquisition data of the Internet of things component related to the all-in-one machine;
the control scheme acquisition module is used for analyzing the first acquired data and determining a control scheme of the integrated machine for mining equipment related to the integrated machine, wherein the control scheme comprises a plurality of groups of control strategies, and the control strategies comprise a data range of a sensor assembly of the integrated machine and an equipment frequency modulation scheme in the data range;
the control scheme issuing module is used for encrypting the control scheme and issuing the encrypted control scheme to the all-in-one machine, the all-in-one machine is used for receiving the control scheme and acquiring second acquisition data of the sensor assembly so as to match the data range of the sensor assembly of the all-in-one machine according to the second acquisition data and the control strategy to determine the equipment frequency modulation scheme of the mining equipment,
wherein, encrypt the control scheme, include:
encrypting the data range by adopting a first encryption key to obtain first encrypted data;
encrypting the equipment frequency modulation scheme by adopting a second encryption key to obtain second encrypted data, and obtaining a scheme decryption key of the second encryption key;
and encrypting the first encrypted data, the second encrypted data and the scheme decryption key by adopting a third encryption key to form an encryption result, and sending the encryption result to the all-in-one machine, wherein the third encryption key adopts a public key of the all-in-one machine.
9. An electronic device, comprising: a memory and at least one processor;
the memory is used for storing computer execution instructions;
the at least one processor is configured to execute computer-executable instructions stored in the memory, such that the at least one processor performs the method of any one of claims 1-7.
CN202311735851.6A 2023-12-18 2023-12-18 Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment Active CN117424756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311735851.6A CN117424756B (en) 2023-12-18 2023-12-18 Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311735851.6A CN117424756B (en) 2023-12-18 2023-12-18 Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN117424756A CN117424756A (en) 2024-01-19
CN117424756B true CN117424756B (en) 2024-03-01

Family

ID=89528751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311735851.6A Active CN117424756B (en) 2023-12-18 2023-12-18 Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN117424756B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106383536A (en) * 2016-11-11 2017-02-08 北京派得伟业科技发展有限公司 Greenhouse smart control system and method
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN113835390A (en) * 2021-08-16 2021-12-24 国网新源控股有限公司 Block chain-based pumped storage power station distributed control method and related equipment
CN115001730A (en) * 2022-03-02 2022-09-02 上海交通大学 Role attribute-based access control system and method in distributed scene
CN115118486A (en) * 2022-06-24 2022-09-27 蚂蚁区块链科技(上海)有限公司 Internet of things system, and method and device for acquiring data based on block chain
KR20230017428A (en) * 2021-07-28 2023-02-06 이정규 Smart lawn control system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106383536A (en) * 2016-11-11 2017-02-08 北京派得伟业科技发展有限公司 Greenhouse smart control system and method
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
KR20230017428A (en) * 2021-07-28 2023-02-06 이정규 Smart lawn control system and method
CN113835390A (en) * 2021-08-16 2021-12-24 国网新源控股有限公司 Block chain-based pumped storage power station distributed control method and related equipment
CN115001730A (en) * 2022-03-02 2022-09-02 上海交通大学 Role attribute-based access control system and method in distributed scene
CN115118486A (en) * 2022-06-24 2022-09-27 蚂蚁区块链科技(上海)有限公司 Internet of things system, and method and device for acquiring data based on block chain

Also Published As

Publication number Publication date
CN117424756A (en) 2024-01-19

Similar Documents

Publication Publication Date Title
Hassanzadeh et al. Towards effective security control assignment in the Industrial Internet of Things
EP3607484B1 (en) Multilevel intrusion detection in automation and control systems
Shang et al. Intrusion detection algorithm based on OCSVM in industrial control system
Phillips et al. An evaluation of machine learning-based anomaly detection in a SCADA system using the modbus protocol
Karabiyik et al. Digital forensics for IoT and WSNS
US20190260580A1 (en) System and method for controlling access to encrypted vehicular data
Dairi et al. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
US20210360002A1 (en) Time-stamping for industrial unidirectional communication device with data integrity management
Wolsing et al. Can industrial intrusion detection be simple?
CN110661832A (en) Information processing method, cloud server and system
CN117424756B (en) Mining variable-frequency speed-regulating asynchronous integrated machine control encryption method and device and electronic equipment
Wu et al. Alert correlation for detecting cyber-manufacturing attacks and intrusions
CN104866783A (en) File storage method and device
WO2021247149A1 (en) Privacy preserving unidirectional communication device
Aljawarneh Formulating models to survive multimedia big content from integrity violation
CN104182691B (en) data encryption method and device
CN111379664A (en) Wind power generation equipment monitoring method and device, computer equipment and storage medium
CN112995111B (en) Block chain-based Internet of things security detection method, equipment, system and medium
Matsuda et al. Cyber security risks of technical components in industry 4.0
EP4031949B1 (en) Methods and systems for providing data from an internal data processing system of an industrial plant to an external data processing system
Ray et al. Hybrid Cryptography and Steganography Method to Provide Safe Data Transmission in IoT
CN116611097B (en) Land resource management method and device based on administrative data and electronic equipment
Hemmer et al. A Process Mining Tool for Supporting IoT Security
CN114401112B (en) Bypass deployment real-time deep packet detection method for malicious traffic encrypted by TLS
CN113794704B (en) Feature library file updating method and device, storage medium and processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant