CN104699046B - It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control - Google Patents

It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control Download PDF

Info

Publication number
CN104699046B
CN104699046B CN201510071768.2A CN201510071768A CN104699046B CN 104699046 B CN104699046 B CN 104699046B CN 201510071768 A CN201510071768 A CN 201510071768A CN 104699046 B CN104699046 B CN 104699046B
Authority
CN
China
Prior art keywords
code
bytes
password
power station
remote control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510071768.2A
Other languages
Chinese (zh)
Other versions
CN104699046A (en
Inventor
文庭荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510071768.2A priority Critical patent/CN104699046B/en
Publication of CN104699046A publication Critical patent/CN104699046A/en
Application granted granted Critical
Publication of CN104699046B publication Critical patent/CN104699046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a kind of system that power station remote manipulation is realized with public network, it is made up of remote control center and each controlled power station;Remote control center carries out remote control to certain power station, send controlling instruction code, the instruction code becomes 128 saltus step codes after instructing encryption equipment scrambled through remote control, correspondence power station is sent to by internet or other public networks, power station, which is received, to be sent remote control instruction decryption device to revert to former instruction code after being decrypted to manipulate equipment, realize that power station is unattended after saltus step code.The system main feature:1st, remote control instruction encryption equipment is using saltus step code coding techniques, and the saltus step code that same operational order is generated after coding every time is not repeated, 2, the saltus step code after coding be magnanimity code, 3, dynamic encryption and decryption password;Above-mentioned 3 features make it that cutting code, barcode scanning and supercomputer technology cracks as impossible.4th, remote control instruction decryption device can realize the intimate physical isolation of public network and private network, so public network can be used to disclose transmission for the control instruction after encryption.

Description

It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control
Technical field
It is specifically a kind of real with public network the present invention relates to being realized with public network to photovoltaic or wind power station remote control technology field Now to photovoltaic plant or the method and system of wind power station remote control.
Background technology
The photovoltaic or wind power station monitoring system of prior art can only be based on power stations in itself, because these power station generating capacity It is smaller, it is large number of, it is mostly all remote, bleak and desolate, scattered, for security consideration, such as to realize teletransmission operation and control System instruction, it is necessary to build dedicated communications network, it is impossible to utilize such as internet common network resource, is otherwise operated and control instruction It may be intercepted by the person of sabotaging, so as to attack power station, cause to be in all power station whole stations on consolidated network and stop hair Electricity;If built between smaller, large number of, remote, the scattered each photovoltaic plant of these generating capacity and center of the centralized monitor Dedicated communications network, its investment will be very huge, and maintenance cost is very high, there is also potential safety hazard, because building special Network is huge, many by region, is sought unavoidably by the person of sabotaging, and is such as sought by the person of sabotaging, and only need to must locate insertion seeking, All power stations in network can be attacked, so technology can only be supervised by Internet Tele to photovoltaic plant at present Depending on and long-range direct operation and control to power station can not be realized.
The content of the invention
In order to solve the above problems, the invention provides a kind of with public network realization is to the method for power station remote control and is System, can not only safely realize the remote control to being controlled power station using public communication network, and safe in special Network.
The technical solution adopted by the present invention:It is a kind of to be realized with public network to photovoltaic or the system of wind power station remote control, including True form generator for producing operation or control instruction true form, is connected to instruction true form being encoded into jump with true form generator The remote control commands encryption coder of time-varying code and with remote control commands encryption coder be connected to by saltus step code by because Special net is sent to the saltus step code dispensing device in controlled power station;The saltus step code that described controlled power station includes being used to receive saltus step code connects Receiving apparatus, the saltus step code for being connected to receive with saltus step code reception device is decoded as instructing the remote control commands solution of true form Close device and with remote control commands decipher be connected to receive instruction true form and perform operation controlled power plant operation control be System.
According to another aspect of the present invention there is provided a kind of method realized with public network to being controlled power station remote control, including Remote control instruction scrambled algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change method;Described remote control refers to Scrambled algorithm is made to comprise the following steps:
S1:Remote control commands encryption coder after upper electricity(2)Initialization, checks whether there is synchronous counting, such as Synchronous counting is not present on inspection, then first assigns initial value to synchronous counting;As there is synchronous counting on inspection, then no longer carry out Synchronous counting is initialized;
S2:Cryptographic check is encoded, coding password is such as not present on inspection, then by the power station generation for 9 bytes specified in advance Code and the seed code for 5 bytes specified produce coding password by non-uniform encoding algorithm, and process is as follows:Use power station code Instead of encoding in password, the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, is encoded Low 5 byte of password, is still replaced encoding password with power station code, adds number after a constant to insert computing the highest order of seed Array B, calls nonlinear algorithm, obtains encoding high 5 byte of password, takes low 4 byte to be merged into previous obtained low 5 byte Complete 9 encode passwords and are stored in eeprom memory;
If there is coding password, program enters the link for receiving presumptive instruction, when receiving presumptive instruction data, Program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, divides 3 Secondary computing, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining Two bytes are respectively written into power station address code and device address code in former instruction code, take out coding password, call non-linear volume Code algorithm, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, remained Under two bytes be respectively written into device address code and power station address code in former instruction code, take out coding password, call non-thread Property encryption algorithm, the saltus step code of 5 bytes and kept in calculating;Synchronous counting is put into preceding 3 bytes of computing array again In, remaining two bytes are respectively written into command code and power station address code in former instruction code, take out coding password, call non-thread Property encryption algorithm, calculate rear 5 bytes saltus step code and keep in;Last byte of computing array is finally write into power station Address code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;Preserve new synchronous counting It is worth eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), by saltus step Code dispensing device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet;
Described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as passes through Check and synchronous counting is not present, then first assign initial value to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as through inspection Look into and there is synchronous counting, then no longer synchronize counting initialization;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes identical with remote control commands encryption equipment Power station code and seed code pass through non-uniform encoding algorithm and produce decoding password, this decoding password and remote control commands Coding password in encryption equipment is identical, produces process also identical;If there is decoding password, program, which enters, receives saltus step code Link, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, non-linear decoded algorithm is called, to 16 bytes, 128 saltus step code divisions Do not decoded, first solve five bytes in low five bytes, secondary solution, finally solve high five bytes, by decoding, presumptive instruction is Through appearing in array;
(S4):The true and false instructed in checking array, first checking for synchronometer numerical value in each section of byte of decoded array is It is no identical and compared with upper sub-value whether rationally increase, will decoded synchronometer numerical value with every time decoding after record in EEPROM Synchronometer numerical value in memory is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former Exceed certain value more than the latter, be also false code, otherwise the verification of synchronometer numerical value is correct;Then each section is checked in decoded array Power station address it is whether consistent with device address, if it is consistent show instruction be it is genuine, ELSE instruction be it is counterfeit, will be new same Step count update reverts to 4 bytes, 32 presumptive instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, power plant operation control system is given control instruction by serial port J2 and performs operation Or control;
Described encoding and decoding password is dynamic change, often encodes, decodes once, encoding and decoding password just changes once;Institute The encoding and decoding password dynamic change method stated comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding is obtained Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, called nonlinear algorithm, obtain new explanation High 5 byte of code password, takes low 4 byte to be merged into the new decoding password of 9 complete bytes simultaneously with previous obtained low 5 byte It is stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, obtains newly encoded Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly organized High 5 byte of code password, takes low 4 to be merged into the newly encoded password of 9 complete bytes with previous low 5 obtained and be stored in Eeprom memory.
Beneficial effects of the present invention:1st, instruction true form is converted to that digit is a lot, numerical value before being transmitted by network Discrete very big saltus step code, combinations of values is up to 1,000,100,000,000 grades of amount, and each saltus step code is only once effectively, make to cut code technology and Barcode scanning technology is cracked as impossible;
2nd, for producing saltus step code and being dynamic change by the encoding and decoding password of saltus step code decoding, often encode, decode one Secondary, encoding and decoding password just changes once, and this, which to derive a large amount of intercepted datas using supercomputer, cracks as impossible;
3rd, remote control instruction decoder effectively can isolate the control private network in controlled power station and internet, only decrypted Confirm that correct control instruction could enter Control of Power Plant private network, and other any data can not all enter power station control on internet Private network processed, can be effectively ensured the safety in power station.So the security in instruction transmit process is very high, higher than prior art in private network On transmission.
4th, due to internet or other public networks can be used to transmit, expense is very low, and general photovoltaic plant all has been turned on Internet, so not needing additional investment construction network, or only increases the investment of very little.
5th, because an instruction only has 16 bytes 128 in encoded, so by bandwidth very little needed for network transmission, The reliability of control is very high.
Brief description of the drawings
Fig. 1 is remote control functional-block diagram;
Fig. 2 is the saltus step code form after operation or control instruction true form form, encryption;
Fig. 3 is remote control commands encryptor circuit schematic diagram;
Fig. 4 is remote control commands decipher circuit theory diagrams;
Fig. 5 is remote control commands scrambled algorithm flow chart;
Fig. 6 is remote control commands deciphering algorithm flow chart;
Fig. 7 is non-uniform encoding algorithm flow chart;
Fig. 8 is non-linear decoded algorithm flow chart;
Fig. 9 is that encoding and decoding password is dynamic change flow chart.
Embodiment
The following is the specific embodiment of the present invention, it is described further in conjunction with accompanying drawing.
As shown in figure 1, a kind of realize the system controlled power station remote with public network, it is characterised in that:Including for producing Operation or the true form generator 1 of control instruction true form, are connected to that true form will be instructed to be encoded into saltus step code with true form generator 1 Remote control commands encryption coder 2 and with remote control commands encryption equipment 2 be connected to by saltus step code sent by internet Saltus step code dispensing device 3 to photovoltaic plant;Described controlled power station includes being used for the saltus step code reception device for receiving saltus step code 4, the saltus step code for being connected to receive with saltus step code reception device 4 is decoded as instructing the remote control commands decipher of true form 5 and it is connected to receive instruction true form with remote control commands decipher 5 and performs the controlled power plant operation control system of operation 6。
As shown in Fig. 2 true form generator(1)The instruction true form of generation is 4 bytes totally 32;First character section is 8 Power station address code, complete zero without can control 255 power stations altogether.Second byte is operable or control device address in 8 stations Code, can control 255 operable or controllable devices altogether.Low four of 3rd byte and the 4th byte totally 12 be control Parameter, is divided into 4096 ranks by the control parameter of analog quantity, to ensure control accuracy.The Gao Siwei of 4th byte is class of operation Code, can represent 16 kinds of class of operations, and the remote operation species in power station has breaker " combined floodgate ", breaker " separating brake ", active negative Lotus " liter ", burden with power " drop ", burden with power " setting ", load or burden without work " 3 kinds of modes ", load or burden without work " liter ", load or burden without work " drop ", load or burden without work " setting " totally 11 kinds of classifications;Instruction code digit provides 16 operation species, can meet manipulation request.
As shown in figure 3, remote control commands encryption coder(2)Hardware circuit is by PIC16F series monolithics U1, outside Oscillating circuit, outside eeprom memory U2, serial port level conversion core piece U3 and serial interface J1 compositions;The 1 of PIC single chip microcomputer U1 Pin connects positive source, and 14 pin ground connection, 2 pin and 3 pin connect the outside oscillating circuit being made up of crystal oscillator X1 and electric capacity C1, C2, and 4 pin pass through Resistance R1 is connected to positive supply;The pin of serial input pin 5 that PIC single chip microcomputer U1 is used for receiving data is connected to serial port level conversion core piece U3 the 9th pin, the pin of serial output pin 6 of single-chip microcomputer is connected to serial port level conversion core piece U3 the 10th pin;U3 16 pin connect electricity Source positive pole, 15 pin ground connection;U3 7 pin, 8 pin connect serial interface J1 2 pin and 3 pin respectively;U3 1 pin and the indirect electric capacity of 3 pin C19,2 pin meet the indirect electric capacity C21 of positive source, 4 pin and 5 pin by electric capacity C20, and 6 pin are grounded by electric capacity C22, and serial ports connects Mouth J1 5 pin ground connection;Outside eeprom memory U2 1,2,3,4 pin ground connection, 8 pin connect positive source, 5,6,7 pin respectively with list The pin of piece machine 10,9,8 is connected, and R2, R3, R4 are pull-up resistors, and a termination positive source, the other end connects U2 5,6,7 pin, is respectively 5th, 6,7 pin provide pull-up current potential;The anode of light emitting diode is connected to the pin of single-chip microcomputer 11, negativing ending grounding by resistance R5.
As shown in figure 4, remote control commands decipher(5)Hardware circuit by PIC16F series monolithics U1, outside shake Swing circuit, outside eeprom memory U2, serial port level chance-over circuit U3, serial ports seat J1, serial ports seat J2 and serial ports switching electricity Road Q1-Q3, R6-R10 composition, PIC single chip microcomputer U1 1 pin connects positive source, and 14 pin are grounded, and 2 pin and 3 pin are connect by crystal oscillator X1 and electricity Hold the outside oscillating circuit of C1, C2 composition, Singlechip clock is provided by external crystal-controlled oscillation, 4 pin are reset circuit, are connect by resistance R1 To positive supply, the pin of PIC single chip microcomputer 5 is serial input pin, for receiving data, is connected to the 9th of serial port level conversion core piece U3 Pin, the pin of PIC single chip microcomputer 6 is serial output pin, is coupled with serial port level conversion core piece U3's by transistor Q2, Q3 11 pin and 10 pin, Q2 base stage and Q1 colelctor electrode connect, and are connected by resistance R8 with positive source, and Q1 emitter stage connects Ground, base stage is connected by resistance R7 with 7 pin of single-chip microcomputer;Q3 base stage is also connected by resistance R6 with 7 pin of single-chip microcomputer, and it is sent out Emitter-base bandgap grading and Q2 emitter stage is connected simultaneously be connected with 6 pin of single-chip microcomputer, and Q2 colelctor electrode and U3 11 pin are connected, Q2 colelctor electrode and U3 10 pin are connected, a pull-up resistor R10 termination positive source, a termination serial port level conversion core piece U3 to 11 pin;Serial ports Electrical level transferring chip U3 is serial port level chance-over circuit, and its function is into suitable PC by 0-5V level conversions of encoder serial ports Machine -15V -+15V serial ports level, U3 16 pin connect positive source, 15 pin ground connection, 7 pin, 8 pin connect respectively serial ports seat J1 2 pin and The indirect electric capacity C19 of 3 pin, 1 pin and 3 pin, 2 pin meet the indirect electric capacity C21 of positive source, 4 pin and 5 pin, 6 pin by electric capacity C20 It is grounded by electric capacity C22, serial interface J1 5 pin ground connection, serial port level conversion core piece U3 14 pin, 13 pin connect serial ports and connect respectively Mouth J2 2 pin and 3 pin, serial interface J2 5 pin ground connection;Outside eeprom memory U2 1,2,3,4 pin ground connection, 8 pin connect electricity Source positive pole, 5,6,7 pin are connected with the pin of single-chip microcomputer 10,9,8 respectively, and R2, R3, R4 are pull-up resistors, and one terminates positive source, separately One end connects outside eeprom memory U2 5,6,7 pin respectively, and pull-up current potential is provided for 5,6,7 pin;The anode of light emitting diode The pin of single-chip microcomputer 11, negativing ending grounding are connected to by resistance R5.
According to another aspect of the present invention, it is a kind of that the method controlled power station remote, including remote control instruction are realized with public network Scrambled algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change method;As shown in figure 5, described remote control Instruction scrambled algorithm comprises the following steps:
S1:Remote control commands encryption equipment after upper electricity(2)Initialization, checks whether there is synchronous counting, such as through inspection Look into the absence of synchronous counting, then first assign initial value to synchronous counting;As there is synchronous counting on inspection, then no longer synchronize Count initialization;
S2:Cryptographic check is encoded, coding password is such as not present on inspection, then by the power station generation for 9 bytes specified in advance Code and the seed code for 5 bytes specified produce coding password by non-uniform encoding algorithm, if close in the presence of encoding Code, program enters the link for receiving presumptive instruction, and when receiving presumptive instruction data, program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, divides 3 Secondary computing, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining Two bytes are respectively written into power station address code and device address code in former instruction code, take out coding password, call non-linear volume Code algorithm, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, remained Under two bytes be respectively written into device address code and power station address code in former instruction code, take out coding password, call non-thread Property encryption algorithm, the saltus step code of 5 bytes and kept in calculating;Synchronous counting is put into preceding 3 bytes of computing array again In, remaining two bytes are respectively written into command code and power station address code in former instruction code, take out coding password, call non-thread Property encryption algorithm, calculate rear 5 bytes saltus step code and keep in;Last byte of computing array is finally write into power station Address code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;Preserve new synchronous counting It is worth eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), by saltus step Code dispensing device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet or other public networks;
As shown in fig. 6, described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as passes through Check and synchronous counting is not present, then first assign initial value to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as through inspection Look into and there is synchronous counting, then no longer synchronize counting initialization;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes identical with remote control commands encryption equipment Power station code and seed code pass through non-uniform encoding algorithm and produce decoding password, this decoding password and remote control commands Coding password in encryption equipment is identical, produces process with step S2;If there is decoding password, program, which enters, receives saltus step Code link, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, non-linear decoded algorithm is called, to 16 bytes, 128 saltus step code divisions Do not decoded, first solve five bytes in low five bytes, secondary solution, finally solve high five bytes, pass through decoding, presumptive instruction code It is already present in array;
(S4):The true and false instructed in checking array, first checking for synchronometer numerical value in each section of byte of decoded array is It is no identical and compared with upper sub-value whether rationally increase, will decoded synchronometer numerical value with every time decoding after record in EEPROM Synchronometer numerical value in memory is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former Exceed certain value more than the latter, be also false code, otherwise the verification of synchronometer numerical value is correct;Then each section is checked in decoded array Power station address it is whether consistent with device address, if it is consistent show instruction be it is genuine, ELSE instruction be it is counterfeit, will be new same Step count update reverts to 4 bytes, 32 original control instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, power plant operation control system is given control instruction by serial port J2 and performs operation Or control;
As shown in figure 9, encoding and decoding password dynamic change method comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding is obtained Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, called nonlinear algorithm, obtain new explanation High 5 byte of code password, takes low 4 byte to be merged into the new decoding password of 9 complete bytes simultaneously with previous obtained low 5 byte It is stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, obtains newly encoded Low 5 byte of password, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly organized High 5 byte of code password, takes low 4 byte to be merged into the newly encoded password of 9 complete bytes simultaneously with previous obtained low 5 byte It is stored in eeprom memory.
Wherein n is positive integer, and n value is different, and obtained encoding and decoding password is also different, therefore encoding and decoding password dynamically becomes Changing has uncertainty so that the probability being cracked is extremely low.
As shown in fig. 7, the non-uniform encoding algorithm described in remote control instruction scrambled algorithm comprises the following steps:
A1:Define two temporary variables aux, key and the array B of 5 bytes;
A2:Power station code or coding password lowest order are put into key, seed code or synchronous counting are inserted array B's 0-2, and power station address and device address are respectively implanted the 3 of B, in 4;
A3:By right cyclic shifts of array B one;
A4:Judge the 6th of B [4] and B [4] the 1st state, during if 11, make aux=10111010, if When 10, aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
A5:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
A6:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
A7:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
A8:Judge aux highest orders, B [2] highest order, B [4] highest order, key lowest order, this four are measured " 1 " Number is even number, then B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten Into " 1 ";
A9:Judge whether mono- byte of key has moved to right, if it is not, key then is moved to right into one, and skip to step A3;If key One byte has been moved to right, that is, is circulated 8 times, skipped to step A10;
A10:Judge whether coding 9+a byte of password has all circulated, inserted if it is not, will then encode the next byte of password Key, skips to step A3;If so, then output result, this result is the low 5 byte position of saltus step code, scrambled is instructed according to remote control The S3 steps of link, can obtain completely 16 bytes, 128 saltus step codes;
Wherein a is positive integer, and implication is a byte of multi cycle, its object is to upset the order of coding, in theory can be with Multi cycle is arbitrarily secondary, so even saltus step code is trapped, because order is random, multi cycle is several when interceptor does not know coding It is secondary, decoded so also not knowing since whom, our own decoder is in decoding, and same multi cycle a times can be just Really decoding, further increases security.
Non-uniform encoding algorithm has two purposes, and one is to produce coding password or decoding password, and two be that original instruction is carried out Scrambled becomes saltus step code.When non-uniform encoding algorithm is used as coding password or decoding password is produced, step A2 is using electricity Stand code, and seed code is inserted into array B, carry out algorithm computing, obtain encoding low 5 byte of password, then by seed Highest order, which adds, inserts operand group B after a constant, computing obtains encoding high 5 byte of password, takes its low 4 byte to be obtained with previous Low 5 byte be merged into the coding password of 9 complete bytes or decode password and be stored in eeprom memory;
When non-uniform encoding algorithm is used as remote control instruction scrambled, step A2 is using coding password, and by synchronometer Number inserts array B, and algorithm output result is saltus step code.
As shown in figure 8, described non-linear decoded algorithm comprises the following steps:
B1:Define two temporary variables aux, key and the array B of 5 bytes;
B2:Decoding password lowest order is put into key, low 5 bytes of the saltus step received code are inserted to B 0-4 positions;
B3:Judge B [4] the 6th and the 1st state with B [4], during if 11, make aux=10111010, if For 10 when, make aux=01011100, during if 01, make aux=01110100, during if 00, make aux=10101110;
B4:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
B5:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
B6:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
B7:Judge aux highest orders, B [2] highest order, B [4] highest order, key highest order, this four are measured " 1 " Number is even number, and B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into “1”;
B8:By left cyclic shifts of array B one;
B9:Judge whether mono- byte of key has moved to left, if it is not, key then is moved to left into one, and skip to step B3;If key One byte has been moved to right, that is, has been circulated 8 times, skipped to step B10;
B10:Judge whether coding 9+a byte of password has all circulated, inserted if it is not, will then encode the next byte of password Key, skips to step B3;If so, then output result, can be by 128 saltus steps codes according to the S3 steps of remote control instruction decryption code link All solve, wherein a is positive integer, its value is equal with the value of a in step A10.
In use, staff passes through serial port by operating true form generator 1 to produce 4 bit instruction true forms of byte 32 J1 will instruct true form to be sent to remote control commands encryption coder 2, and remote control commands encryption coder 2 is receiving instruction After true form, remote control commands encryption equipment 2 will instruct true form and coding password through controlling instruction scrambled algorithm too far and calling Non-uniform encoding algorithm is encoded into 16 bytes, 128 saltus step codes, then sends it to saltus step code hair by serial port J1 Device 3 is sent, saltus step code dispensing device 3 uses PC communication equipments, and it sends the saltus step code after scrambled by internet To controlled power station;The saltus step code reception device 4 in controlled power station is also PC communication equipments, it from receiving saltus step code on internet, and Remote control commands descrambler 5 is sent to by serial port J1;Receiving 16 bytes that saltus step code reception device 4 is sent After 128 saltus step codes, remote control commands descrambler 5 is by saltus step code and decoding password is by deciphering algorithm and calls non-thread Property decoding algorithm by its deciphering, examine check and correction, be reduced into operation or control instruction true form, then by serial port J2 be sent to by Control power plant operation control system 6 to perform operation or control, if what is received is false code, can not be exported by J2, and report an error.
The experiment carried out the following is the present invention with regard to security, the reliability of Encoding and Decoding and experimental data, wherein n take 1, a takes 1:
1st, 10 same operational orders 52 87 are sent to remote control commands encryption coder 2 after electricity operation on machine Be sequentially generated after A6 01, coding saltus step code be:
06 87 0C E1 13 E7 A5 30 43 20 DC 75 55 C9 C4 12
A3 01 A0 FE 8B DD EF D6 21 E6 61 45 4B 17 99 12
DC F9 2C CC BB 61 68 9D 22 CC BC BF 35 BD 38 12
B3 DF 2C DC 39 CF BD 22 5C 2F 88 A1 35 99 BB 12
D4 DA 34 AD 0F AE 36 E4 7F C7 D0 9B E3 96 2C 12
5F 3C 1C C0 53 F2 C1 BD C8 4E 5F 85 66 14 64 12
DF CA D7 AC 09 BC ED 19 8E A2 F1 46 BB ED 75 12
82 08 97 EA D6 AE 9B CE 50 7C 4F 8C CB DF 7D 12
01 93 74 A3 0E F3 E8 F6 20 B1 2A AA 34 3E ED 12
9C ED 3A 10 11 E1 BC 06 7B 23 94 A9 D9 99 09 12
Drawn by more operational orders and transmission times, saltus step code has the characteristics that:(1)Without duplication code;(2)From each Its changing rule can not be found in group hopping code;
2nd, saltus step code is sent into remote control commands decipher 6 successively to be decoded, decoded result is 52 87 A6 01, illustrates that, for legal saltus step code, remote control commands decipher 6 can reliably be reduced into former instruction code;
3rd, same saltus step code is decoded, solves for the first time as 52 87 A6 01, decode, can report an error again, illustrate same Group hopping code can only once effectively, and the code of intercepting and capturing is invalid;
4th, a certain position of some saltus step code is deliberately given up, the decoding of frame hopping decoder is re-fed into, program reports an error, illustrates saltus step code With uniqueness, the code of modification is invalid;
5th, the saltus step code of rear generation is first such as sent into decoding, can correctly solves true form, then the saltus step first produced code is sent to Decoding then shows " mistake ";This function negates old instruction with new command, it is ensured that controlled plant can only perform newest instruction;
If the 6, cracked by the way of barcode scanning, theoretical calculation saltus step code amount is 2 120 powers=1,329,200,000,000 hundred million hundred million hundred million, Judge to need altogether 0.01 second according to one group of number of hair, the decoding of remote control commands decipher is swept, be actually subjected to be much larger than 0.01 second, swept Whole codes then take 421.49 hundred million hundred million hundred million years, it is seen that the probability swept to goes to zero.
In summary, the present invention has high security and high reliability, and is easy to implement, and cost is low.It can not only use The public networks such as internet are controlled to photovoltaic plant, and can have has the control private network of power station producing region with public internet Effect isolation, its isolating power is equivalent to physical isolation, and it is that can be achieved to photovoltaic plant, wind power station etc. respectively to coordinate central monitoring system Plant the unattended of power station.

Claims (3)

1. a kind of realized to photovoltaic or the method for wind power station remote control with public network, it is characterised in that:Including remote control instruction encryption The method of encryption algorithm, remote control instruction decryption code algorithm and encoding and decoding password dynamic change;Described remote control instruction scrambled Algorithm comprises the following steps:
S1:Remote control commands encryption equipment after upper electricity(2)Initialization, checks whether there is synchronous counting, such as on inspection not There is synchronous counting, then first assign initial value to synchronous counting;As there is synchronous counting on inspection, then counting is no longer synchronized Initialization;
S2:Encode cryptographic check, coding password be such as not present on inspection, then by the power station code of 9 bytes specified in advance and The seed code for 5 bytes specified produces coding password by non-uniform encoding algorithm, if there is coding password, journey Sequence enters the link for receiving presumptive instruction, and when receiving presumptive instruction data, program just enters scrambled link;
S3:128 bit encryptions encode link, determine the computing array of 16 bytes, and each computing is 5 bytes, point 3 fortune Calculate, synchronometer numerical value is taken out first from memory and is written to after Jia 1 in preceding 3 bytes of computing array, remaining two Byte is respectively written into power station address code and device address code in former instruction code, takes out coding password, calls non-uniform encoding to calculate Method, calculates the saltus step code of preceding 5 bytes and keeps in;Synchronous counting is put into preceding 3 bytes of computing array again, it is remaining Two bytes are respectively written into device address code and power station address code in former instruction code, take out coding password, call non-linear volume Code algorithm, the saltus step code of 5 bytes and keeps in calculating;Synchronous counting is put into preceding 3 bytes of computing array again, remained Under two bytes be respectively written into command code and power station address code in former instruction code, take out coding password, call non-linear volume Code algorithm, calculates the saltus step code of rear 5 bytes and keeps in;Last byte of computing array is finally write into power station address Code;Now the presumptive instruction code of 4 bytes 32 becomes the saltus step code of 16 bytes 128;New synchronometer numerical value is preserved to arrive Eeprom memory, is used in case next time calculates;
S4:Saltus step code is sent, and 128 saltus step codes are sent to saltus step code dispensing device by serial port J1(3), sent out by saltus step code Send device(3)Saltus step code is sent to controlled photovoltaic or wind power station by internet or other public networks;
Described remote control instruction decryption code algorithm comprises the following steps:
(S1):Remote control commands decipher after upper electricity(5)Initialization, checks whether there is synchronous counting, such as on inspection In the absence of synchronous counting, then initial value first is assigned to synchronous counting, this initial value is identical with remote control commands encryption equipment;Such as on inspection Through there is synchronous counting, then counting initialization is no longer synchronized;
(S2):Cryptographic check is decoded, decoding password is such as not present on inspection, then takes and remote control commands encryption equipment identical Power station code and seed code produce decoding password by non-uniform encoding algorithm, this decoding password and remote control commands encryption Coding password in device is identical, produces process with step S2;If there is decoding password, program, which enters, receives saltus step code ring Section, when serial port J1 receives the saltus step code data that control centre sends, program just enters decryption link;
(S3):Link is decrypted, decoding password is taken out, calls non-linear decoded algorithm, 16 bytes, 128 saltus step code divisions are not entered Row decoding, first solves five bytes in low five bytes, secondary solution, finally solves high five bytes, and by decoding, presumptive instruction code is Appear in array;
(S4):The true and false that instructs in checking array, first check in each section of byte of decoded array synchronometer numerical value whether phase With and with whether rationally increase compared with upper sub-value, decoded synchronometer numerical value is stored with being recorded after decoding every time in EEPROM Synchronometer numerical value in device is compared, if the former is less than or equal to the latter, this saltus step code is false code;If the former is more than The latter exceedes certain value, is also false code, and otherwise the verification of synchronometer numerical value is correct;Then each section in decoded array of electricity is checked Whether station address is consistent with device address, if unanimously showing that instruction is genuine, ELSE instruction is counterfeit, by new synchronometer Number updates reverts to 4 bytes, 32 original control instructions into eeprom memory, and by instruction;
(S5):Serial port J2 is selected, giving power plant operation control system control instruction by serial port J2 performs operation or control System;
Described encoding and decoding password dynamic change method comprises the following steps:
Controlled power station side:
C1:Controlled power station receives saltus step code, and decrypted code and checking are the controlling instruction codes of our station;
C2:The decoding password and 5 byte seed values of 9 bytes of taking-up;
C3:Seed is moved to right into circulation n;
C4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, new decoding password is obtained It is low 5, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain new decoding password It is high 5, take low 4 to be merged into 9 complete new decoding passwords with previous low 5 obtained and be stored in eeprom memory;
C5:The remote control commands encryption coder of control centre will be sent back to after the saltus step received code re-encoding;
Control centre side:
D1:The saltus step code sent in controlled power station is received, decoded and checking is the saltus step code originally sent;
D2:The coding password and 5 byte seed values of 9 bytes of taking-up;
D3:Seed is moved to right into circulation n;
D4:In the computing array B that seed is inserted to nonlinear algorithm, non-uniform encoding algorithm is called, newly encoded password is obtained It is low 5, the highest order of seed is added operand group B is inserted after a constant, call nonlinear algorithm, obtain newly encoded password It is high 5, take low 4 to be merged into 9 complete newly encoded passwords with previous low 5 obtained and be stored in eeprom memory.
2. it is according to claim 1 it is a kind of with public network realize to photovoltaic or the method for wind power station remote control, its feature exists In:Described non-uniform encoding algorithm comprises the following steps:
A1:Define two temporary variables aux, key and the computing array B of 5 bytes;
A2:Power station code or coding password lowest order are put into key, seed code or synchronous counting are inserted to array B 0-2 Position, and power station address and device address are respectively implanted the 3 of B, in 4;
A3:By right cyclic shifts of array B one;
A4:Judge the 6th of B [4] and B [4] the 1st state, during if 11, make aux=10111010, during if 10, Aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
A5:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
A6:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
A7:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
A8:Judge aux highest orders, B [2] highest order, B [4] highest order, key lowest order, the number of this four amounts " 1 " For even number, then B [4] highest order is rewritten into " 0 ", the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into “1”;
A9:Judge whether mono- byte of key has moved to right, if it is not, key then is moved to right into one, and skip to step A3;If key mono- Byte has been moved to right, that is, has been circulated 8 times, skipped to step A10;
A10:Judge whether coding 9+a byte of password has all circulated, if it is not, will then encode the next byte of password inserts key, Skip to step A3;If so, then output result, a is positive integer;
When non-uniform encoding algorithm is used as coding password or decoding password is produced, step A2 uses power station code, and by seed Code inserts array B, carries out algorithm computing, is encoded or decoded low 5 bytes of password, then the highest order of seed is added Operand group B is inserted after one constant, computing is encoded or decoded high 5 bytes of password, take its low 4 byte to be obtained with previous To low 5 bytes be merged into the coding password of 9 complete bytes or decode password and be stored in eeprom memory;
When non-uniform encoding algorithm is used as remote control instruction scrambled, step A2 is put synchronous counting using coding password Enter array B, algorithm output result is saltus step code.
3. it is according to claim 1 it is a kind of with public network realize to photovoltaic or the method for wind power station remote control, its feature exists In:Described non-linear decoded algorithm comprises the following steps:
B1:Define two temporary variables aux, key and the computing array B of 5 bytes;
B2:Decoding password lowest order is put into key, successively by low 5 bytes of the saltus step received code, in 5 bytes and high 5 Byte is respectively implanted computing array B 0-4 positions;
B3:Judge B [4] the 6th and the 1st state with B [4], during if 11, aux=10111010 are made, if 10 When, aux=01011100 is made, during if 01, aux=01110100 is made, during if 00, aux=10101110 are made;
B4:Judge the 3rd of B [3], exchange the high low bytes of aux if for 1;
B5:Judge the 0th of B [2], aux is multiplied by 4 if for 1;
B6:Judge the 0th of B [1], aux is multiplied by 2 if for 1;
B7:Judge aux highest orders, B [2] highest order, B [4] highest order, key highest order, the number of this four amounts " 1 " For even number, B [4] highest order is rewritten into " 0 ", and the number of this four amounts " 1 " is odd number, and B [4] highest order is rewritten into " 1 ";
B8:By left cyclic shifts of array B one;
B9:Judge whether mono- byte of key has moved to left, if it is not, key then is moved to left into one, and skip to step B3;If key mono- Byte has been moved to right, that is, has been circulated 8 times, skipped to step B10;
B10:Judge whether coding 9+a byte of password has all circulated, if it is not, will then encode the next byte of password inserts key, Skip to step B3;If so, then output result, output result is control instruction true form, a is positive integer.
CN201510071768.2A 2015-02-10 2015-02-10 It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control Active CN104699046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510071768.2A CN104699046B (en) 2015-02-10 2015-02-10 It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510071768.2A CN104699046B (en) 2015-02-10 2015-02-10 It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control

Publications (2)

Publication Number Publication Date
CN104699046A CN104699046A (en) 2015-06-10
CN104699046B true CN104699046B (en) 2017-07-21

Family

ID=53346275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510071768.2A Active CN104699046B (en) 2015-02-10 2015-02-10 It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control

Country Status (1)

Country Link
CN (1) CN104699046B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110460156A (en) * 2019-08-15 2019-11-15 北京嘉士宝科技有限公司 Instruct transmission method, device and storage medium
CN110535840A (en) * 2019-08-15 2019-12-03 北京嘉士宝科技有限公司 Data transmission method, device and storage medium
CN112632646B (en) * 2020-12-30 2022-09-23 国网河北省电力有限公司物资分公司 Single-chip microcomputer serial port communication encryption method
CN116175595B (en) * 2023-04-28 2023-06-23 深圳市玛塔创想科技有限公司 Remote control system of programming robot based on artificial intelligence

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69324077T2 (en) * 1992-07-21 1999-11-18 Matsushita Electric Industrial Co., Ltd. Encryption and decryption device
CN1728501A (en) * 2004-07-28 2006-02-01 北京四方基业能源技术有限公司 Automatic system for power distribution
CN201207657Y (en) * 2008-05-23 2009-03-11 北京瀚海新创科技有限公司 Electric data transmission system
CN102036164B (en) * 2010-09-30 2014-02-05 国家电网公司 Method, device and system for acquiring power battery information
CN201838004U (en) * 2010-11-02 2011-05-18 中国人民武装警察部队成都指挥学院 Hardware encryption card for computer interface

Also Published As

Publication number Publication date
CN104699046A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN104699046B (en) It is a kind of to be realized with public network to photovoltaic or the method and system of wind power station remote control
CN109412794B (en) Quantum key automatic charging method and system suitable for power business
CN101005352B (en) Method, system, server and terminal device for preventing network game external store
CN104243144B (en) A kind of communication key distribution method based on Android intelligent mobile terminal
CN102831352B (en) Equipment authorization use method and equipment for method
CN110535653A (en) A kind of safe distribution terminal and its means of communication
CN102223309B (en) Safe communication system and implementation method based on message load segmentation, encryption and reorder
CN104637185A (en) Offline box opening method of intelligent storage cabinet
CN107180175A (en) Allocator and dispenser and delivery system
CN109756579B (en) Block chain-based Internet of things information secure transmission system and transmission method
CN105515758A (en) Data parallel cryptographic communication method and system based on Modbus protocol
CN103888292A (en) Tool and method for operation and maintenance of distribution terminal
CN109617675A (en) Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal
CN107395751A (en) A kind of remote control system of intelligent household electrical appliance and method
CN101552792B (en) A method and apparatus for transmitting information with dynamic secondary cipher key
CN205945769U (en) Quantum key chip
CN107370751A (en) One kind session key update method in smart device communication
CN104899500B (en) A kind of elevator customer Rights Management System and method
CN108650096A (en) A kind of industrial field bus control system
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN109166199A (en) A kind of generation method of password, device and equipment
CN107872315A (en) Data processing method and intelligent terminal
CN108038979B (en) Sustainable operation method based on STS prepayment system
CN116367150B (en) Data encryption transmission method
CN111563980B (en) Bluetooth lock key generation and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant