CN104699046B - It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control - Google Patents
It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control Download PDFInfo
- Publication number
- CN104699046B CN104699046B CN201510071768.2A CN201510071768A CN104699046B CN 104699046 B CN104699046 B CN 104699046B CN 201510071768 A CN201510071768 A CN 201510071768A CN 104699046 B CN104699046 B CN 104699046B
- Authority
- CN
- China
- Prior art keywords
- code
- bytes
- password
- power station
- remote control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000001360 synchronised effect Effects 0.000 claims description 38
- 238000007689 inspection Methods 0.000 claims description 16
- 230000005611 electricity Effects 0.000 claims description 14
- 125000004122 cyclic group Chemical group 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000002955 isolation Methods 0.000 abstract description 3
- 241000196324 Embryophyta Species 0.000 description 9
- 238000006243 chemical reaction Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 239000013078 crystal Substances 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 241000894007 species Species 0.000 description 2
- 241000531891 Alburnus alburnus Species 0.000 description 1
- 241001269238 Data Species 0.000 description 1
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention discloses a kind of system that power station remote manipulation is realized with public network, it is made up of remote control center and each controlled power station;Remote control center carries out remote control to certain power station, send controlling instruction code, the instruction code becomes 128 saltus step codes after instructing encryption equipment scrambled through remote control, correspondence power station is sent to by internet or other public networks, power station, which is received, to be sent remote control instruction decryption device to revert to former instruction code after being decrypted to manipulate equipment, realize that power station is unattended after saltus step code.The system main feature:1st, remote control instruction encryption equipment is using saltus step code coding techniques, and the saltus step code that same operational order is generated after coding every time is not repeated, 2, the saltus step code after coding be magnanimity code, 3, dynamic encryption and decryption password;Above-mentioned 3 features make it that cutting code, barcode scanning and supercomputer technology cracks as impossible.4th, remote control instruction decryption device can realize the intimate physical isolation of public network and private network, so public network can be used to disclose transmission for the control instruction after encryption.
Description
Technical field
It is specifically a kind of real with public network the present invention relates to being realized with public network to photovoltaic or wind power station remote control technology field
Now to photovoltaic plant or the method and system of wind power station remote control.
Background technology
The photovoltaic or wind power station monitoring system of prior art can only be based on power stations in itself, because these power station generating capacity
It is smaller, it is large number of, it is mostly all remote, bleak and desolate, scattered, for security consideration, such as to realize teletransmission operation and control
System instruction, it is necessary to build dedicated communications network, it is impossible to utilize such as internet common network resource, is otherwise operated and control instruction
It may be intercepted by the person of sabotaging, so as to attack power station, cause to be in all power station whole stations on consolidated network and stop hair
Electricity;If built between smaller, large number of, remote, the scattered each photovoltaic plant of these generating capacity and center of the centralized monitor
Dedicated communications network, its investment will be very huge, and maintenance cost is very high, there is also potential safety hazard, because building special
Network is huge, many by region, is sought unavoidably by the person of sabotaging, and is such as sought by the person of sabotaging, and only need to must locate insertion seeking,
All power stations in network can be attacked, so technology can only be supervised by Internet Tele to photovoltaic plant at present
Depending on and long-range direct operation and control to power station can not be realized.
The content of the invention
In order to solve the above problems, the invention provides a kind of with public network realization is to the method for power station remote control and is
System, can not only safely realize the remote control to being controlled power station using public communication network, and safe in special
Network.
The technical solution adopted by the present invention:It is a kind of to be realized with public network to photovoltaic or the system of wind power station remote control, including
True form generator for producing operation or control instruction true form, is connected to instruction true form being encoded into jump with true form generator
The remote control commands encryption coder of time-varying code and with remote control commands encryption coder be connected to by saltus step code by because
Special net is sent to the saltus step code dispensing device in controlled power station;The saltus step code that described controlled power station includes being used to receive saltus step code connects
Receiving apparatus, the saltus step code for being connected to receive with saltus step code reception device is decoded as instructing the remote control commands solution of true form
Close device and with remote control commands decipher be connected to receive instruction true form and perform operation controlled power plant operation control be
System.
According to another aspect of the present invention there is provided a kind of method realized with public network to being controlled power station remote control, including
Remote control instruction scrambled algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change method;Described remote control refers to
Scrambled algorithm is made to comprise the following steps:
S1:Remote control commands encryption coder after upper electricity(2)Initialization, checks whether there is synchronous counting, such as
Synchronous counting is not present on inspection, then first assigns initial value to synchronous counting;As there is synchronous counting on inspection, then no longer carry out
Synchronous counting is initialized;
S2:Cryptographic check is encoded, coding password is such as not present on inspection, then by the power station generation for 9 bytes specified in advance
Code and the seed code for 5 bytes specified produce coding password by non-uniform encoding algorithm, and process is as follows:Use power station code
Instead of encoding in password, the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, is encoded
Low 5 byte of password, is still replaced encoding password with power station code, adds number after a constant to insert computing the highest order of seed
Array B, calls nonlinear algorithm, obtains encoding high 5 byte of password, takes low 4 byte to be merged into previous obtained low 5 byte
Complete 9 encode passwords and are stored in eeprom memory;
If there is coding password, program enters the link for receiving presumptive instruction, when receiving presumptive instruction data,
Program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, divides 3
Secondary computing, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining
Two bytes are respectively written into power station address code and device address code in former instruction code, take out coding password, call non-linear volume
Code algorithm, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, remained
Under two bytes be respectively written into device address code and power station address code in former instruction code, take out coding password, call non-thread
Property encryption algorithm, the saltus step code of 5 bytes and kept in calculating;Synchronous counting is put into preceding 3 bytes of computing array again
In, remaining two bytes are respectively written into command code and power station address code in former instruction code, take out coding password, call non-thread
Property encryption algorithm, calculate rear 5 bytes saltus step code and keep in;Last byte of computing array is finally write into power station
Address code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;Preserve new synchronous counting
It is worth eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), by saltus step
Code dispensing device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet;
Described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as passes through
Check and synchronous counting is not present, then first assign initial value to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as through inspection
Look into and there is synchronous counting, then no longer synchronize counting initialization;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes identical with remote control commands encryption equipment
Power station code and seed code pass through non-uniform encoding algorithm and produce decoding password, this decoding password and remote control commands
Coding password in encryption equipment is identical, produces process also identical;If there is decoding password, program, which enters, receives saltus step code
Link, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, non-linear decoded algorithm is called, to 16 bytes, 128 saltus step code divisions
Do not decoded, first solve five bytes in low five bytes, secondary solution, finally solve high five bytes, by decoding, presumptive instruction is
Through appearing in array;
(S4):The true and false instructed in checking array, first checking for synchronometer numerical value in each section of byte of decoded array is
It is no identical and compared with upper sub-value whether rationally increase, will decoded synchronometer numerical value with every time decoding after record in EEPROM
Synchronometer numerical value in memory is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former
Exceed certain value more than the latter, be also false code, otherwise the verification of synchronometer numerical value is correct;Then each section is checked in decoded array
Power station address it is whether consistent with device address, if it is consistent show instruction be it is genuine, ELSE instruction be it is counterfeit, will be new same
Step count update reverts to 4 bytes, 32 presumptive instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, power plant operation control system is given control instruction by serial port J2 and performs operation
Or control;
Described encoding and decoding password is dynamic change, often encodes, decodes once, encoding and decoding password just changes once;Institute
The encoding and decoding password dynamic change method stated comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding is obtained
Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, called nonlinear algorithm, obtain new explanation
High 5 byte of code password, takes low 4 byte to be merged into the new decoding password of 9 complete bytes simultaneously with previous obtained low 5 byte
It is stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, obtains newly encoded
Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly organized
High 5 byte of code password, takes low 4 to be merged into the newly encoded password of 9 complete bytes with previous low 5 obtained and be stored in
Eeprom memory.
Beneficial effects of the present invention:1st, instruction true form is converted to that digit is a lot, numerical value before being transmitted by network
Discrete very big saltus step code, combinations of values is up to 1,000,100,000,000 grades of amount, and each saltus step code is only once effectively, make to cut code technology and
Barcode scanning technology is cracked as impossible;
2nd, for producing saltus step code and being dynamic change by the encoding and decoding password of saltus step code decoding, often encode, decode one
Secondary, encoding and decoding password just changes once, and this, which to derive a large amount of intercepted datas using supercomputer, cracks as impossible;
3rd, remote control instruction decoder effectively can isolate the control private network in controlled power station and internet, only decrypted
Confirm that correct control instruction could enter Control of Power Plant private network, and other any data can not all enter power station control on internet
Private network processed, can be effectively ensured the safety in power station.So the security in instruction transmit process is very high, higher than prior art in private network
On transmission.
4th, due to internet or other public networks can be used to transmit, expense is very low, and general photovoltaic plant all has been turned on
Internet, so not needing additional investment construction network, or only increases the investment of very little.
5th, because an instruction only has 16 bytes 128 in encoded, so by bandwidth very little needed for network transmission,
The reliability of control is very high.
Brief description of the drawings
Fig. 1 is remote control functional-block diagram;
Fig. 2 is the saltus step code form after operation or control instruction true form form, encryption;
Fig. 3 is remote control commands encryptor circuit schematic diagram;
Fig. 4 is remote control commands decipher circuit theory diagrams;
Fig. 5 is remote control commands scrambled algorithm flow chart;
Fig. 6 is remote control commands deciphering algorithm flow chart;
Fig. 7 is non-uniform encoding algorithm flow chart;
Fig. 8 is non-linear decoded algorithm flow chart;
Fig. 9 is that encoding and decoding password is dynamic change flow chart.
Embodiment
The following is the specific embodiment of the present invention, it is described further in conjunction with accompanying drawing.
As shown in figure 1, a kind of realize the system controlled power station remote with public network, it is characterised in that:Including for producing
Operation or the true form generator 1 of control instruction true form, are connected to that true form will be instructed to be encoded into saltus step code with true form generator 1
Remote control commands encryption coder 2 and with remote control commands encryption equipment 2 be connected to by saltus step code sent by internet
Saltus step code dispensing device 3 to photovoltaic plant;Described controlled power station includes being used for the saltus step code reception device for receiving saltus step code
4, the saltus step code for being connected to receive with saltus step code reception device 4 is decoded as instructing the remote control commands decipher of true form
5 and it is connected to receive instruction true form with remote control commands decipher 5 and performs the controlled power plant operation control system of operation
6。
As shown in Fig. 2 true form generator(1)The instruction true form of generation is 4 bytes totally 32;First character section is 8
Power station address code, complete zero without can control 255 power stations altogether.Second byte is operable or control device address in 8 stations
Code, can control 255 operable or controllable devices altogether.Low four of 3rd byte and the 4th byte totally 12 be control
Parameter, is divided into 4096 ranks by the control parameter of analog quantity, to ensure control accuracy.The Gao Siwei of 4th byte is class of operation
Code, can represent 16 kinds of class of operations, and the remote operation species in power station has breaker " combined floodgate ", breaker " separating brake ", active negative
Lotus " liter ", burden with power " drop ", burden with power " setting ", load or burden without work " 3 kinds of modes ", load or burden without work " liter ", load or burden without work
" drop ", load or burden without work " setting " totally 11 kinds of classifications;Instruction code digit provides 16 operation species, can meet manipulation request.
As shown in figure 3, remote control commands encryption coder(2)Hardware circuit is by PIC16F series monolithics U1, outside
Oscillating circuit, outside eeprom memory U2, serial port level conversion core piece U3 and serial interface J1 compositions;The 1 of PIC single chip microcomputer U1
Pin connects positive source, and 14 pin ground connection, 2 pin and 3 pin connect the outside oscillating circuit being made up of crystal oscillator X1 and electric capacity C1, C2, and 4 pin pass through
Resistance R1 is connected to positive supply;The pin of serial input pin 5 that PIC single chip microcomputer U1 is used for receiving data is connected to serial port level conversion core piece
U3 the 9th pin, the pin of serial output pin 6 of single-chip microcomputer is connected to serial port level conversion core piece U3 the 10th pin;U3 16 pin connect electricity
Source positive pole, 15 pin ground connection;U3 7 pin, 8 pin connect serial interface J1 2 pin and 3 pin respectively;U3 1 pin and the indirect electric capacity of 3 pin
C19,2 pin meet the indirect electric capacity C21 of positive source, 4 pin and 5 pin by electric capacity C20, and 6 pin are grounded by electric capacity C22, and serial ports connects
Mouth J1 5 pin ground connection;Outside eeprom memory U2 1,2,3,4 pin ground connection, 8 pin connect positive source, 5,6,7 pin respectively with list
The pin of piece machine 10,9,8 is connected, and R2, R3, R4 are pull-up resistors, and a termination positive source, the other end connects U2 5,6,7 pin, is respectively
5th, 6,7 pin provide pull-up current potential;The anode of light emitting diode is connected to the pin of single-chip microcomputer 11, negativing ending grounding by resistance R5.
As shown in figure 4, remote control commands decipher(5)Hardware circuit by PIC16F series monolithics U1, outside shake
Swing circuit, outside eeprom memory U2, serial port level chance-over circuit U3, serial ports seat J1, serial ports seat J2 and serial ports switching electricity
Road Q1-Q3, R6-R10 composition, PIC single chip microcomputer U1 1 pin connects positive source, and 14 pin are grounded, and 2 pin and 3 pin are connect by crystal oscillator X1 and electricity
Hold the outside oscillating circuit of C1, C2 composition, Singlechip clock is provided by external crystal-controlled oscillation, 4 pin are reset circuit, are connect by resistance R1
To positive supply, the pin of PIC single chip microcomputer 5 is serial input pin, for receiving data, is connected to the 9th of serial port level conversion core piece U3
Pin, the pin of PIC single chip microcomputer 6 is serial output pin, is coupled with serial port level conversion core piece U3's by transistor Q2, Q3
11 pin and 10 pin, Q2 base stage and Q1 colelctor electrode connect, and are connected by resistance R8 with positive source, and Q1 emitter stage connects
Ground, base stage is connected by resistance R7 with 7 pin of single-chip microcomputer;Q3 base stage is also connected by resistance R6 with 7 pin of single-chip microcomputer, and it is sent out
Emitter-base bandgap grading and Q2 emitter stage is connected simultaneously be connected with 6 pin of single-chip microcomputer, and Q2 colelctor electrode and U3 11 pin are connected, Q2 colelctor electrode and
U3 10 pin are connected, a pull-up resistor R10 termination positive source, a termination serial port level conversion core piece U3 to 11 pin;Serial ports
Electrical level transferring chip U3 is serial port level chance-over circuit, and its function is into suitable PC by 0-5V level conversions of encoder serial ports
Machine -15V -+15V serial ports level, U3 16 pin connect positive source, 15 pin ground connection, 7 pin, 8 pin connect respectively serial ports seat J1 2 pin and
The indirect electric capacity C19 of 3 pin, 1 pin and 3 pin, 2 pin meet the indirect electric capacity C21 of positive source, 4 pin and 5 pin, 6 pin by electric capacity C20
It is grounded by electric capacity C22, serial interface J1 5 pin ground connection, serial port level conversion core piece U3 14 pin, 13 pin connect serial ports and connect respectively
Mouth J2 2 pin and 3 pin, serial interface J2 5 pin ground connection;Outside eeprom memory U2 1,2,3,4 pin ground connection, 8 pin connect electricity
Source positive pole, 5,6,7 pin are connected with the pin of single-chip microcomputer 10,9,8 respectively, and R2, R3, R4 are pull-up resistors, and one terminates positive source, separately
One end connects outside eeprom memory U2 5,6,7 pin respectively, and pull-up current potential is provided for 5,6,7 pin;The anode of light emitting diode
The pin of single-chip microcomputer 11, negativing ending grounding are connected to by resistance R5.
According to another aspect of the present invention, it is a kind of that the method controlled power station remote, including remote control instruction are realized with public network
Scrambled algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change method;As shown in figure 5, described remote control
Instruction scrambled algorithm comprises the following steps:
S1:Remote control commands encryption equipment after upper electricity(2)Initialization, checks whether there is synchronous counting, such as through inspection
Look into the absence of synchronous counting, then first assign initial value to synchronous counting;As there is synchronous counting on inspection, then no longer synchronize
Count initialization;
S2:Cryptographic check is encoded, coding password is such as not present on inspection, then by the power station generation for 9 bytes specified in advance
Code and the seed code for 5 bytes specified produce coding password by non-uniform encoding algorithm, if close in the presence of encoding
Code, program enters the link for receiving presumptive instruction, and when receiving presumptive instruction data, program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, divides 3
Secondary computing, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining
Two bytes are respectively written into power station address code and device address code in former instruction code, take out coding password, call non-linear volume
Code algorithm, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, remained
Under two bytes be respectively written into device address code and power station address code in former instruction code, take out coding password, call non-thread
Property encryption algorithm, the saltus step code of 5 bytes and kept in calculating;Synchronous counting is put into preceding 3 bytes of computing array again
In, remaining two bytes are respectively written into command code and power station address code in former instruction code, take out coding password, call non-thread
Property encryption algorithm, calculate rear 5 bytes saltus step code and keep in;Last byte of computing array is finally write into power station
Address code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;Preserve new synchronous counting
It is worth eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), by saltus step
Code dispensing device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet or other public networks;
As shown in fig. 6, described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as passes through
Check and synchronous counting is not present, then first assign initial value to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as through inspection
Look into and there is synchronous counting, then no longer synchronize counting initialization;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes identical with remote control commands encryption equipment
Power station code and seed code pass through non-uniform encoding algorithm and produce decoding password, this decoding password and remote control commands
Coding password in encryption equipment is identical, produces process with step S2;If there is decoding password, program, which enters, receives saltus step
Code link, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, non-linear decoded algorithm is called, to 16 bytes, 128 saltus step code divisions
Do not decoded, first solve five bytes in low five bytes, secondary solution, finally solve high five bytes, pass through decoding, presumptive instruction code
It is already present in array;
(S4):The true and false instructed in checking array, first checking for synchronometer numerical value in each section of byte of decoded array is
It is no identical and compared with upper sub-value whether rationally increase, will decoded synchronometer numerical value with every time decoding after record in EEPROM
Synchronometer numerical value in memory is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former
Exceed certain value more than the latter, be also false code, otherwise the verification of synchronometer numerical value is correct;Then each section is checked in decoded array
Power station address it is whether consistent with device address, if it is consistent show instruction be it is genuine, ELSE instruction be it is counterfeit, will be new same
Step count update reverts to 4 bytes, 32 original control instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, power plant operation control system is given control instruction by serial port J2 and performs operation
Or control;
As shown in figure 9, encoding and decoding password dynamic change method comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding is obtained
Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, called nonlinear algorithm, obtain new explanation
High 5 byte of code password, takes low 4 byte to be merged into the new decoding password of 9 complete bytes simultaneously with previous obtained low 5 byte
It is stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, obtains newly encoded
Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly organized
High 5 byte of code password, takes low 4 byte to be merged into the newly encoded password of 9 complete bytes simultaneously with previous obtained low 5 byte
It is stored in eeprom memory.
Wherein n is positive integer, and n value is different, and obtained encoding and decoding password is also different, therefore encoding and decoding password dynamically becomes
Changing has uncertainty so that the probability being cracked is extremely low.
As shown in fig. 7, the non-uniform encoding algorithm described in remote control instruction scrambled algorithm comprises the following steps:
A1:Define two temporary variables aux, key and the array B of 5 bytes;
A2:Power station code or coding password lowest order are put into key, seed code or synchronous counting are inserted array B's
0-2, and power station address and device address are respectively implanted the 3 of B, in 4;
A3:By right cyclic shifts of array B one;
A4:Judge the 6th of B [4] and B [4] the 1st state, during if 11, make aux=10111010, if
When 10, aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
A5:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
A6:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
A7:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
A8:Judge aux highest orders, B [2] highest order, B [4] highest order, key lowest order, this four are measured " 1 "
Number is even number, then B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten
Into " 1 ";
A9:Judge whether mono- byte of key has moved to right, if it is not, key then is moved to right into one, and skip to step A3;If key
One byte has been moved to right, that is, is circulated 8 times, skipped to step A10;
A10:Judge whether coding 9+a byte of password has all circulated, inserted if it is not, will then encode the next byte of password
Key, skips to step A3;If so, then output result, this result is the low 5 byte position of saltus step code, scrambled is instructed according to remote control
The S3 steps of link, can obtain completely 16 bytes, 128 saltus step codes;
Wherein a is positive integer, and implication is a byte of multi cycle, its object is to upset the order of coding, in theory can be with
Multi cycle is arbitrarily secondary, so even saltus step code is trapped, because order is random, multi cycle is several when interceptor does not know coding
It is secondary, decoded so also not knowing since whom, our own decoder is in decoding, and same multi cycle a times can be just
Really decoding, further increases security.
Non-uniform encoding algorithm has two purposes, and one is to produce coding password or decoding password, and two be that original instruction is carried out
Scrambled becomes saltus step code.When non-uniform encoding algorithm is used as coding password or decoding password is produced, step A2 is using electricity
Stand code, and seed code is inserted into array B, carry out algorithm computing, obtain encoding low 5 byte of password, then by seed
Highest order, which adds, inserts operand group B after a constant, computing obtains encoding high 5 byte of password, takes its low 4 byte to be obtained with previous
Low 5 byte be merged into the coding password of 9 complete bytes or decode password and be stored in eeprom memory;
When non-uniform encoding algorithm is used as remote control instruction scrambled, step A2 is using coding password, and by synchronometer
Number inserts array B, and algorithm output result is saltus step code.
As shown in figure 8, described non-linear decoded algorithm comprises the following steps:
B1:Define two temporary variables aux, key and the array B of 5 bytes;
B2:Decoding password lowest order is put into key, low 5 bytes of the saltus step received code are inserted to B 0-4 positions;
B3:Judge B [4] the 6th and the 1st state with B [4], during if 11, make aux=10111010, if
For 10 when, make aux=01011100, during if 01, make aux=01110100, during if 00, make aux=10101110;
B4:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
B5:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
B6:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
B7:Judge aux highest orders, B [2] highest order, B [4] highest order, key highest order, this four are measured " 1 "
Number is even number, and B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into
“1”;
B8:By left cyclic shifts of array B one;
B9:Judge whether mono- byte of key has moved to left, if it is not, key then is moved to left into one, and skip to step B3;If key
One byte has been moved to right, that is, has been circulated 8 times, skipped to step B10;
B10:Judge whether coding 9+a byte of password has all circulated, inserted if it is not, will then encode the next byte of password
Key, skips to step B3;If so, then output result, can be by 128 saltus steps codes according to the S3 steps of remote control instruction decryption code link
All solve, wherein a is positive integer, its value is equal with the value of a in step A10.
In use, staff passes through serial port by operating true form generator 1 to produce 4 bit instruction true forms of byte 32
J1 will instruct true form to be sent to remote control commands encryption coder 2, and remote control commands encryption coder 2 is receiving instruction
After true form, remote control commands encryption equipment 2 will instruct true form and coding password through controlling instruction scrambled algorithm too far and calling
Non-uniform encoding algorithm is encoded into 16 bytes, 128 saltus step codes, then sends it to saltus step code hair by serial port J1
Device 3 is sent, saltus step code dispensing device 3 uses PC communication equipments, and it sends the saltus step code after scrambled by internet
To controlled power station;The saltus step code reception device 4 in controlled power station is also PC communication equipments, it from receiving saltus step code on internet, and
Remote control commands descrambler 5 is sent to by serial port J1;Receiving 16 bytes that saltus step code reception device 4 is sent
After 128 saltus step codes, remote control commands descrambler 5 is by saltus step code and decoding password is by deciphering algorithm and calls non-thread
Property decoding algorithm by its deciphering, examine check and correction, be reduced into operation or control instruction true form, then by serial port J2 be sent to by
Control power plant operation control system 6 to perform operation or control, if what is received is false code, can not be exported by J2, and report an error.
The experiment carried out the following is the present invention with regard to security, the reliability of Encoding and Decoding and experimental data, wherein n take
1, a takes 1:
1st, 10 same operational orders 52 87 are sent to remote control commands encryption coder 2 after electricity operation on machine
Be sequentially generated after A6 01, coding saltus step code be:
06 87 0C E1 13 E7 A5 30 43 20 DC 75 55 C9 C4 12
A3 01 A0 FE 8B DD EF D6 21 E6 61 45 4B 17 99 12
DC F9 2C CC BB 61 68 9D 22 CC BC BF 35 BD 38 12
B3 DF 2C DC 39 CF BD 22 5C 2F 88 A1 35 99 BB 12
D4 DA 34 AD 0F AE 36 E4 7F C7 D0 9B E3 96 2C 12
5F 3C 1C C0 53 F2 C1 BD C8 4E 5F 85 66 14 64 12
DF CA D7 AC 09 BC ED 19 8E A2 F1 46 BB ED 75 12
82 08 97 EA D6 AE 9B CE 50 7C 4F 8C CB DF 7D 12
01 93 74 A3 0E F3 E8 F6 20 B1 2A AA 34 3E ED 12
9C ED 3A 10 11 E1 BC 06 7B 23 94 A9 D9 99 09 12
Drawn by more operational orders and transmission times, saltus step code has the characteristics that:(1)Without duplication code;(2)From each
Its changing rule can not be found in group hopping code;
2nd, saltus step code is sent into remote control commands decipher 6 successively to be decoded, decoded result is 52 87
A6 01, illustrates that, for legal saltus step code, remote control commands decipher 6 can reliably be reduced into former instruction code;
3rd, same saltus step code is decoded, solves for the first time as 52 87 A6 01, decode, can report an error again, illustrate same
Group hopping code can only once effectively, and the code of intercepting and capturing is invalid;
4th, a certain position of some saltus step code is deliberately given up, the decoding of frame hopping decoder is re-fed into, program reports an error, illustrates saltus step code
With uniqueness, the code of modification is invalid;
5th, the saltus step code of rear generation is first such as sent into decoding, can correctly solves true form, then the saltus step first produced code is sent to
Decoding then shows " mistake ";This function negates old instruction with new command, it is ensured that controlled plant can only perform newest instruction;
If the 6, cracked by the way of barcode scanning, theoretical calculation saltus step code amount is 2 120 powers=1,329,200,000,000 hundred million hundred million hundred million,
Judge to need altogether 0.01 second according to one group of number of hair, the decoding of remote control commands decipher is swept, be actually subjected to be much larger than 0.01 second, swept
Whole codes then take 421.49 hundred million hundred million hundred million years, it is seen that the probability swept to goes to zero.
In summary, the present invention has high security and high reliability, and is easy to implement, and cost is low.It can not only use
The public networks such as internet are controlled to photovoltaic plant, and can have has the control private network of power station producing region with public internet
Effect isolation, its isolating power is equivalent to physical isolation, and it is that can be achieved to photovoltaic plant, wind power station etc. respectively to coordinate central monitoring system
Plant the unattended of power station.
Claims (3)
1. a kind of realized to photovoltaic or the method for wind power station remote control with public network, it is characterised in that:Including remote control instruction encryption
The method of encryption algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change;Described remote control instruction scrambled
Algorithm comprises the following steps:
S1:Remote control commands encryption equipment after upper electricity(2)Initialization, checks whether there is synchronous counting, such as on inspection not
There is synchronous counting, then first assign initial value to synchronous counting;As there is synchronous counting on inspection, then counting is no longer synchronized
Initialization;
S2:Encode cryptographic check, coding password be such as not present on inspection, then by the power station code of 9 bytes specified in advance and
The seed code for 5 bytes specified produces coding password by non-uniform encoding algorithm, if there is coding password, journey
Sequence enters the link for receiving presumptive instruction, and when receiving presumptive instruction data, program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, point 3 fortune
Calculate, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining two
Byte is respectively written into power station address code and device address code in former instruction code, takes out coding password, calls non-uniform encoding to calculate
Method, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, it is remaining
Two bytes are respectively written into device address code and power station address code in former instruction code, take out coding password, call non-linear volume
Code algorithm, the saltus step code of 5 bytes and keeps in calculating;Synchronous counting is put into preceding 3 bytes of computing array again, remained
Under two bytes be respectively written into command code and power station address code in former instruction code, take out coding password, call non-linear volume
Code algorithm, calculates the saltus step code of rear 5 bytes and keeps in;Last byte of computing array is finally write into power station address
Code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;New synchronometer numerical value is preserved to arrive
Eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), sent out by saltus step code
Send device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet or other public networks;
Described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as on inspection
In the absence of synchronous counting, then initial value first is assigned to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as on inspection
Through there is synchronous counting, then counting initialization is no longer synchronized;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes and remote control commands encryption equipment identical
Power station code and seed code produce decoding password by non-uniform encoding algorithm, this decoding password and remote control commands encryption
Coding password in device is identical, produces process with step S2;If there is decoding password, program, which enters, receives saltus step code ring
Section, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, calls non-linear decoded algorithm, 16 bytes, 128 saltus step code divisions are not entered
Row decoding, first solves five bytes in low five bytes, secondary solution, finally solves high five bytes, and by decoding, presumptive instruction code is
Appear in array;
(S4):The true and false that instructs in checking array, first check in each section of byte of decoded array synchronometer numerical value whether phase
With and with whether rationally increase compared with upper sub-value, decoded synchronometer numerical value is stored with being recorded after decoding every time in EEPROM
Synchronometer numerical value in device is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former is more than
The latter exceedes certain value, is also false code, and otherwise the verification of synchronometer numerical value is correct;Then each section in decoded array of electricity is checked
Whether station address is consistent with device address, if unanimously showing that instruction is genuine, ELSE instruction is counterfeit, by new synchronometer
Number updates reverts to 4 bytes, 32 original control instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, giving power plant operation control system control instruction by serial port J2 performs operation or control
System;
Described encoding and decoding password dynamic change method comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding password is obtained
It is low 5, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain new decoding password
It is high 5, take low 4 to be merged into 9 complete new decoding passwords with previous low 5 obtained and be stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, newly encoded password is obtained
It is low 5, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly encoded password
It is high 5, take low 4 to be merged into 9 complete newly encoded passwords with previous low 5 obtained and be stored in eeprom memory.
2. it is according to claim 1 it is a kind of with public network realize to photovoltaic or the method for wind power station remote control, its feature exists
In:Described non-uniform encoding algorithm comprises the following steps:
A1:Define two temporary variables aux, key and the computing array B of 5 bytes;
A2:Power station code or coding password lowest order are put into key, seed code or synchronous counting are inserted to array B 0-2
Position, and power station address and device address are respectively implanted the 3 of B, in 4;
A3:By right cyclic shifts of array B one;
A4:Judge the 6th of B [4] and B [4] the 1st state, during if 11, make aux=10111010, during if 10,
Aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
A5:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
A6:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
A7:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
A8:Judge aux highest orders, B [2] highest order, B [4] highest order, key lowest order, the number of this four amounts " 1 "
For even number, then B [4] highest order is rewritten into " 0 ", the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into
“1”;
A9:Judge whether mono- byte of key has moved to right, if it is not, key then is moved to right into one, and skip to step A3;If key mono-
Byte has been moved to right, that is, has been circulated 8 times, skipped to step A10;
A10:Judge whether coding 9+a byte of password has all circulated, if it is not, will then encode the next byte of password inserts key,
Skip to step A3;If so, then output result, a is positive integer;
When non-uniform encoding algorithm is used as coding password or decoding password is produced, step A2 uses power station code, and by seed
Code inserts array B, carries out algorithm computing, is encoded or decoded low 5 bytes of password, then the highest order of seed is added
Operand group B is inserted after one constant, computing is encoded or decoded high 5 bytes of password, take its low 4 byte to be obtained with previous
To low 5 bytes be merged into the coding password of 9 complete bytes or decode password and be stored in eeprom memory;
When non-uniform encoding algorithm is used as remote control instruction scrambled, step A2 is put synchronous counting using coding password
Enter array B, algorithm output result is saltus step code.
3. it is according to claim 1 it is a kind of with public network realize to photovoltaic or the method for wind power station remote control, its feature exists
In:Described non-linear decoded algorithm comprises the following steps:
B1:Define two temporary variables aux, key and the computing array B of 5 bytes;
B2:Decoding password lowest order is put into key, successively by low 5 bytes of the saltus step received code, in 5 bytes and high 5
Byte is respectively implanted computing array B 0-4 positions;
B3:Judge B [4] the 6th and the 1st state with B [4], during if 11, aux=10111010 are made, if 10
When, aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
B4:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
B5:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
B6:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
B7:Judge aux highest orders, B [2] highest order, B [4] highest order, key highest order, the number of this four amounts " 1 "
For even number, B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into " 1 ";
B8:By left cyclic shifts of array B one;
B9:Judge whether mono- byte of key has moved to left, if it is not, key then is moved to left into one, and skip to step B3;If key mono-
Byte has been moved to right, that is, has been circulated 8 times, skipped to step B10;
B10:Judge whether coding 9+a byte of password has all circulated, if it is not, will then encode the next byte of password inserts key,
Skip to step B3;If so, then output result, output result is control instruction true form, a is positive integer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510071768.2A CN104699046B (en) | 2015-02-10 | 2015-02-10 | It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510071768.2A CN104699046B (en) | 2015-02-10 | 2015-02-10 | It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104699046A CN104699046A (en) | 2015-06-10 |
CN104699046B true CN104699046B (en) | 2017-07-21 |
Family
ID=53346275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510071768.2A Active CN104699046B (en) | 2015-02-10 | 2015-02-10 | It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104699046B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110460156A (en) * | 2019-08-15 | 2019-11-15 | 北京嘉士宝科技有限公司 | Instruct transmission method, device and storage medium |
CN110535840A (en) * | 2019-08-15 | 2019-12-03 | 北京嘉士宝科技有限公司 | Data transmission method, device and storage medium |
CN112632646B (en) * | 2020-12-30 | 2022-09-23 | 国网河北省电力有限公司物资分公司 | Single-chip microcomputer serial port communication encryption method |
CN116175595B (en) * | 2023-04-28 | 2023-06-23 | 深圳市玛塔创想科技有限公司 | Remote control system of programming robot based on artificial intelligence |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69324077T2 (en) * | 1992-07-21 | 1999-11-18 | Matsushita Electric Industrial Co., Ltd. | Encryption and decryption device |
CN1728501A (en) * | 2004-07-28 | 2006-02-01 | 北京四方基业能源技术有限公司 | Automatic system for power distribution |
CN201207657Y (en) * | 2008-05-23 | 2009-03-11 | 北京瀚海新创科技有限公司 | Electric data transmission system |
CN102036164B (en) * | 2010-09-30 | 2014-02-05 | 国家电网公司 | Method, device and system for acquiring power battery information |
CN201838004U (en) * | 2010-11-02 | 2011-05-18 | 中国人民武装警察部队成都指挥学院 | Hardware encryption card for computer interface |
-
2015
- 2015-02-10 CN CN201510071768.2A patent/CN104699046B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN104699046A (en) | 2015-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104699046B (en) | It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control | |
CN109412794B (en) | Quantum key automatic charging method and system suitable for power business | |
CN101005352B (en) | Method, system, server and terminal device for preventing network game external store | |
CN104243144B (en) | A kind of communication key distribution method based on Android intelligent mobile terminal | |
CN102831352B (en) | Equipment authorization use method and equipment for method | |
CN110535653A (en) | A kind of safe distribution terminal and its means of communication | |
CN102223309B (en) | Safe communication system and implementation method based on message load segmentation, encryption and reorder | |
CN104637185A (en) | Offline box opening method of intelligent storage cabinet | |
CN107180175A (en) | Allocator and dispenser and delivery system | |
CN109756579B (en) | Block chain-based Internet of things information secure transmission system and transmission method | |
CN105515758A (en) | Data parallel cryptographic communication method and system based on Modbus protocol | |
CN103888292A (en) | Tool and method for operation and maintenance of distribution terminal | |
CN109617675A (en) | Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal | |
CN107395751A (en) | A kind of remote control system of intelligent household electrical appliance and method | |
CN101552792B (en) | A method and apparatus for transmitting information with dynamic secondary cipher key | |
CN205945769U (en) | Quantum key chip | |
CN107370751A (en) | One kind session key update method in smart device communication | |
CN104899500B (en) | A kind of elevator customer Rights Management System and method | |
CN108650096A (en) | A kind of industrial field bus control system | |
CN115603907A (en) | Method, device, equipment and storage medium for encrypting storage data | |
CN109166199A (en) | A kind of generation method of password, device and equipment | |
CN107872315A (en) | Data processing method and intelligent terminal | |
CN108038979B (en) | Sustainable operation method based on STS prepayment system | |
CN116367150B (en) | Data encryption transmission method | |
CN111563980B (en) | Bluetooth lock key generation and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |