CN110995840B - Remote terminal anti-dismantling control method suitable for excavator - Google Patents

Remote terminal anti-dismantling control method suitable for excavator Download PDF

Info

Publication number
CN110995840B
CN110995840B CN201911223958.6A CN201911223958A CN110995840B CN 110995840 B CN110995840 B CN 110995840B CN 201911223958 A CN201911223958 A CN 201911223958A CN 110995840 B CN110995840 B CN 110995840B
Authority
CN
China
Prior art keywords
gps
excavator
data
check
main controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911223958.6A
Other languages
Chinese (zh)
Other versions
CN110995840A (en
Inventor
宋之克
魏红敏
耿家文
刘立祥
范党平
赵艳萍
代刚强
袁海飞
郑鹏磊
仇超敏
姜奎
吴迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou XCMG Excavator Machinery Co Ltd
Original Assignee
Xuzhou XCMG Excavator Machinery Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuzhou XCMG Excavator Machinery Co Ltd filed Critical Xuzhou XCMG Excavator Machinery Co Ltd
Priority to CN201911223958.6A priority Critical patent/CN110995840B/en
Publication of CN110995840A publication Critical patent/CN110995840A/en
Application granted granted Critical
Publication of CN110995840B publication Critical patent/CN110995840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Operation Control Of Excavators (AREA)

Abstract

The invention discloses a remote terminal anti-disassembly control method suitable for an excavator, which strengthens the communication safety between a GPS terminal and a main controller through an irreversible encryption algorithm, a cloud end and an EDS algorithm, establishes reliable object communication connection, imposes punishment on the action of damaging the connection and better prevents malicious disassembly.

Description

Remote terminal anti-dismantling control method suitable for excavator
Technical Field
The invention belongs to the technical field of excavators, and particularly relates to a remote terminal anti-dismantling control method suitable for an excavator.
Background
The excavator comprehensively utilizes a remote anti-theft control technology to rent and manage fault maintenance machinery, the CAN bus is communicated with the controller, the data of the excavator are collected, the real-time position of the excavator and various parameters of equipment CAN be displayed in real time, meanwhile, a control command from a monitoring center is received, the control command is issued to the CAN bus, and the command control of the excavator is realized through the excavator controller, so that the remote anti-theft technology is required to be perfected in order to prevent the excavator from working abnormally due to misoperation, and the remote anti-theft control technology plays an important role in communication.
The existing GPS terminal and the controller only detect heartbeat signals once every 2 minutes, and simultaneously check whether the fixed password is correct, otherwise, the communication is judged to be abnormal, and the working speed is reduced. However, the check mode between the GPS and the main controller is too simple, the number of password groups is small, the password is easy to crack, and the management effectiveness and the reliability of remote control of the excavator are seriously influenced. The communication connection mode is too simple, and the behavior punishment strength of the broken connection mode is insufficient.
Disclosure of Invention
According to the defects of the prior art, the invention provides a remote terminal anti-dismantling control method suitable for an excavator.
The invention is realized according to the following technical scheme:
a remote terminal anti-dismantling control method suitable for an excavator comprises the following steps:
step one, the GPS sends information to the main controller of the excavator and stops timing, wherein the information comprises an information type and a random code A1;
step two, the main controller receives signals and stops timing, meanwhile, the GPS terminal and the main controller calculate a random code A2 according to an irreversible algorithm formula S = F (S) and stop time negotiated by the GPS terminal and the main controller and proofread with A1, the proofreading of A1= A2 is successful, otherwise, the proofreading fails;
step three, detecting whether data sent by the GPS terminal is a heartbeat signal or an instruction is issued, if the data is the heartbeat signal and the verification is successful, feeding back that the heartbeat is normal, if the data is the heartbeat signal and the verification is failed continuously within 4 minutes, reporting that the communication is abnormal and executing secondary vehicle locking, and executing primary vehicle locking after the data fails continuously for more than 8 minutes; if the command is issued and the verification is successful, executing the command, otherwise, not executing;
feeding back an execution result to the GPS terminal by the main controller to serve as a first check unit X1, wherein the failure X1=100, the success X1=0 and the result accounts for 70% of the total check score;
uploading data to a cloud platform by the GPS through a cloud system, displaying the states of the excavator and the GPS on a mobile phone APP, counting the abnormal communication condition of the GPS in a unified period by taking a region as a unit, reporting the abnormal alarm of more than 50% of vehicles, reporting the abnormal treatment of the GPS, and taking a statistical percentage value as a second check unit X2 which accounts for 10% of the total check value;
step six, when X1 + X2 + 10% is equal to or more than 70, executing a depth algorithm: recording the current time B before shutdown, representing B by 64 data out of order after startup, calculating the 64 data based on a DES symmetric encryption algorithm to obtain newly combined data C, and sending C to a controller as a key check variable for both sides to check; x1 + X2 + 10% <70, the GPS can continue to use under observation;
and step seven, when the cracking rate of the check variable C in the area is used as a third check unit X3, and when the cracking rate reaches 30%, judging that the GPS has serious problems and stopping using.
Further, f (S) = S in the formula of S = f (S)5*n5+s4*n4+s3*n3+ s2 N2+ s n 1; wherein s is the value formed by the random code A and the stop time, and n1, n2, n3, n4 and n5 are the fixed values agreed by both parties, which are respectively 10, 8, 2, 3 and 7.
Further, the primary locking is an operation of shielding the engine action of the excavator.
Further, the two-stage locking is an operation for limiting the rotation speed of the engine of the excavator at a low speed.
The invention has the beneficial effects that:
the invention is applied to a hydraulic excavator, and is a control technology which is cooperated with an excavator controller to work, establishes reliable object communication connection, imposes punishment on the action of destroying the connection, prevents the operations such as irregular disassembly and the like, and ensures the overall performance and the safety of the excavator.
Drawings
Fig. 1 is a flowchart of a remote terminal tamper control method for an excavator according to the present invention.
Detailed Description
In order to make the implementation objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be described in more detail below with reference to the accompanying drawings in the embodiments of the present invention. In the drawings, the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The described embodiments are only some, but not all embodiments of the invention. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the invention discloses a remote terminal anti-dismantling control method suitable for an excavator, which is a control strategy based on an irreversible encryption algorithm, a cloud end and a DES algorithm. The irreversible encryption algorithm is characterized in that a secret key is not needed in the encryption process, the system directly processes the encryption algorithm into a ciphertext after inputting the plaintext, the encrypted data cannot be decrypted, and the data can be really decrypted only by re-inputting the plaintext and re-processing the plaintext by the same irreversible encryption algorithm to obtain the same encrypted ciphertext which is re-identified by the system. The DES algorithm is a block algorithm using key encryption.
Continuing to refer to fig. 1, a remote terminal anti-dismantling control method for an excavator comprises the following steps:
step one, the GPS sends information to the main controller of the excavator and stops timing, wherein the information comprises an information type and a random code A1;
step two, the main controller receives signals and stops timing, meanwhile, the GPS terminal and the main controller calculate a random code A2 according to an irreversible algorithm formula S = F (S) and stop time negotiated by the GPS terminal and the main controller and proofread with A1, the proofreading of A1= A2 is successful, otherwise, the proofreading fails;
step three, detecting whether data sent by the GPS terminal is a heartbeat signal or an instruction is issued, if the data is the heartbeat signal and the verification is successful, feeding back that the heartbeat is normal, if the data is the heartbeat signal and the verification is failed continuously within 4 minutes, reporting that the communication is abnormal and executing secondary vehicle locking, and executing primary vehicle locking after the data fails continuously for more than 8 minutes; if the command is issued and the verification is successful, executing the command, otherwise, not executing;
feeding back an execution result to the GPS terminal by the main controller to serve as a first check unit X1, wherein the failure X1=100, the success X1=0 and the result accounts for 70% of the total check score;
uploading data to a cloud platform by the GPS through a cloud system, displaying the states of the excavator and the GPS on a mobile phone APP, counting the abnormal communication condition of the GPS in a unified period by taking a region as a unit, reporting the abnormal alarm of more than 50% of vehicles, reporting the abnormal treatment of the GPS, and taking a statistical percentage value as a second check unit X2 which accounts for 10% of the total check value;
step six, when X1 + X2 + 10% is equal to or more than 70, executing a depth algorithm: recording the current time B before shutdown, representing B by 64 data out of order after startup, calculating the 64 data based on a DES symmetric encryption algorithm to obtain newly combined data C, and sending C to a controller as a key check variable for both sides to check; x1 + X2 + 10% <70, the GPS can continue to use under observation;
and step seven, when the cracking rate of the check variable C in the area is used as a third check unit X3, and when the cracking rate reaches 30%, judging that the GPS has serious problems and stopping using.
In the formula, S = f (S) = S5*n5+s4*n4+s3*n3+ s2 N2+ s n 1; wherein s is the value formed by the random code A and the stop time, and n1, n2, n3, n4 and n5 are the fixed values agreed by both parties, which are respectively 10, 8, 2, 3 and 7.
The primary locking is an operation for shielding the excavator from the action of an engine.
The two-stage locking is the operation of limiting the rotating speed of the engine of the excavator and reducing the speed.
In conclusion, the invention strengthens the communication safety between the GPS terminal and the main controller through the irreversible encryption algorithm, the cloud end and the EDS algorithm, establishes reliable object communication connection, imposes punishment on the behavior of damaging the connection and better prevents malicious disassembly.
Finally, it should be noted that the above examples are only used to illustrate the technical solutions of the present invention and not to limit the same; although the present invention has been described in detail with reference to preferred embodiments, those skilled in the art will understand that: modifications to the specific embodiments of the invention or equivalent substitutions for parts of the technical features may be made; without departing from the spirit of the present invention, it is intended to cover all aspects of the invention as defined by the appended claims.

Claims (1)

1. A remote terminal anti-dismantling control method suitable for an excavator is characterized by comprising the following steps:
step one, the GPS sends information to the main controller of the excavator and stops timing, wherein the information comprises an information type and a random code A1;
step two, the main controller receives signals and stops timing, meanwhile, the GPS terminal and the main controller calculate a random code A2 according to an irreversible algorithm formula S = F (S) and stop time negotiated by the GPS terminal and the main controller and proofread with A1, the proofreading of A1= A2 is successful, otherwise, the proofreading fails;
step three, detecting whether data sent by the GPS terminal is a heartbeat signal or an instruction is issued, if the data is the heartbeat signal and the verification is successful, feeding back that the heartbeat is normal, if the data is the heartbeat signal and the verification is failed continuously within 4 minutes, reporting that the communication is abnormal and executing secondary vehicle locking, and executing primary vehicle locking after the data fails continuously for more than 8 minutes; if the command is issued and the verification is successful, executing the command, otherwise, not executing;
feeding back an execution result to the GPS terminal by the main controller to serve as a first check unit X1, wherein the failure X1=100, the success X1=0 and the result accounts for 70% of the total check score;
uploading data to a cloud platform by the GPS through a cloud system, displaying the states of the excavator and the GPS on a mobile phone APP, counting the abnormal communication condition of the GPS in a unified period by taking a region as a unit, reporting the abnormal alarm of more than 50% of vehicles, reporting the abnormal treatment of the GPS, and taking a statistical percentage value as a second check unit X2 which accounts for 10% of the total check value;
step six, when X1 + X2 + 10% is equal to or more than 70, executing a depth algorithm: recording the current time B before shutdown, representing B by 64 data out of order after startup, calculating the 64 data based on a DES symmetric encryption algorithm to obtain newly combined data C, and sending C to a controller as a key check variable for both sides to check; x1 + X2 + 10% <70, the GPS can continue to use under observation;
step seven, when the cracking rate of the check variable C in the area is used as a third check unit X3, when the cracking rate reaches 30%, judging that the GPS has serious problems, and stopping using the GPS;
f (S) = S in the formula of S = f (S)5*n5+s4*n4+s3*n3+ s2N2+ s n 1; wherein s is a value formed by the random code A and the stop time, and n1, n2, n3, n4 and n5 are fixed values which are agreed by the two parties and are respectively 10, 8, 2, 3 and 7;
the primary locking is the operation of shielding the action of an engine of the excavator;
the secondary locking is the operation of limiting the rotating speed of the engine of the excavator at low speed.
CN201911223958.6A 2019-12-04 2019-12-04 Remote terminal anti-dismantling control method suitable for excavator Active CN110995840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911223958.6A CN110995840B (en) 2019-12-04 2019-12-04 Remote terminal anti-dismantling control method suitable for excavator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911223958.6A CN110995840B (en) 2019-12-04 2019-12-04 Remote terminal anti-dismantling control method suitable for excavator

Publications (2)

Publication Number Publication Date
CN110995840A CN110995840A (en) 2020-04-10
CN110995840B true CN110995840B (en) 2021-08-24

Family

ID=70089793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911223958.6A Active CN110995840B (en) 2019-12-04 2019-12-04 Remote terminal anti-dismantling control method suitable for excavator

Country Status (1)

Country Link
CN (1) CN110995840B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111873941A (en) * 2020-07-16 2020-11-03 徐州徐工汽车制造有限公司 Vehicle remote control system and method for new energy automobile leasing business
CN115277788B (en) * 2022-08-23 2024-04-26 石家庄开发区天远科技有限公司 Engineering vehicle remote control system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN110042879A (en) * 2019-04-22 2019-07-23 青岛雷沃工程机械有限公司 A kind of excavator vehicle locking method based on MD5 algorithm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915576A (en) * 2015-12-18 2016-08-31 乐视致新电子科技(天津)有限公司 Vehicle remote control method, apparatus and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN110042879A (en) * 2019-04-22 2019-07-23 青岛雷沃工程机械有限公司 A kind of excavator vehicle locking method based on MD5 algorithm

Also Published As

Publication number Publication date
CN110995840A (en) 2020-04-10

Similar Documents

Publication Publication Date Title
CN109765880B (en) MD5 dynamic encryption algorithm-based T-BOX (T-BOX) anti-removal method and system
CN110995840B (en) Remote terminal anti-dismantling control method suitable for excavator
CN103529823B (en) A kind of safety access control method for automotive diagnostic system
CN111740974A (en) Network security emergency linkage system and method
CN102098179A (en) Computer state monitoring alarm method and system
CN115147956A (en) Data processing method and device, electronic equipment and storage medium
CN114266081A (en) Operation and maintenance computer safety protection system and method of power monitoring system
CN115987675B (en) Illegal external connection detection method and device, mobile terminal and storage medium
JP2020167494A (en) Message monitoring system, electronic control device for message transmission, and electronic control device for monitoring
Zhang et al. Investigating the impact of cyber attacks on power system reliability
CN111104655B (en) BMC login method and related device
CN104978302B (en) A kind of intelligent and safe USB interface control method based on TCM chips
CN114157489B (en) Communication domain controller safety communication method based on periodic authentication handshake mechanism
CN110647771B (en) Mysql database storage integrity verification protection method and device
CN111401760B (en) Safety and stability control device exception handling decision method and device
EP1979815B1 (en) Method of preserving the safe state of a redundant processor after occurence of a failure
JP2023528905A (en) Securing a connection between a vehicle and a remote management server for managing said vehicle
CN110700951A (en) Flameout control system, emergency stop alarm method and flameout control method
CN113901478B (en) Communication security verification method, device, equipment and storage medium
CN117149291B (en) BIOS control system and method of intelligent network card
CN112437038B (en) Method, device, equipment and medium for detecting DCS system intrusion
CN113233269B (en) Method and device for diagnosing attack on elevator network
CN113141612B (en) High-reliability management and control method and system for mobile terminal
CN114422162B (en) Production control large-area safety situation sensing system for thermal power generating unit
CN115766072A (en) Continuous credibility detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant