CN111343190A - Remote wireless data tamper-proof acquisition equipment and system - Google Patents

Remote wireless data tamper-proof acquisition equipment and system Download PDF

Info

Publication number
CN111343190A
CN111343190A CN202010148886.XA CN202010148886A CN111343190A CN 111343190 A CN111343190 A CN 111343190A CN 202010148886 A CN202010148886 A CN 202010148886A CN 111343190 A CN111343190 A CN 111343190A
Authority
CN
China
Prior art keywords
data
hard disk
tamper
remote wireless
cpu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010148886.XA
Other languages
Chinese (zh)
Inventor
任军
冯志刚
李俊
艾小亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baozhida Network Technology Co ltd
Original Assignee
Guizhou Baozhida Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Baozhida Network Technology Co ltd filed Critical Guizhou Baozhida Network Technology Co ltd
Priority to CN202010148886.XA priority Critical patent/CN111343190A/en
Publication of CN111343190A publication Critical patent/CN111343190A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a remote wireless data tamper-proof acquisition device and a system, relating to the technical field of remote wireless data acquisition systems and cloud computing, wherein the remote wireless data tamper-proof acquisition device and the system are characterized in that the acquisition device is butted with a target device to be acquired, remote data are acquired through a physical interface, and related data are encrypted to respectively form fingerprint data, a data private key and a data ciphertext to be transmitted to a cloud platform data center storage module for storage, when a user uses the related data, data comparison can be carried out on line to prevent artificial tampering of real data, once the acquisition device is bound with the target device, any physical disconnection needs manual authorization to be reused, if data modification occurs in the data acquisition process, the existing data acquisition process is cancelled, and the original version target data on the target device is uploaded again, therefore, the problems of unauthorized tampering detection data and data counterfeiting are solved.

Description

Remote wireless data tamper-proof acquisition equipment and system
Technical Field
The invention relates to the technical field of remote wireless data acquisition systems and cloud computing, in particular to remote wireless data tamper-resistant acquisition equipment and system.
Background
The development of the inspection and detection industry in recent years is full, the market space is large, particularly, a civil institution called as third-party inspection has a rather fast rise speed, data shows that China has more than 3 ten thousand inspection and detection institutions, earns more than 2000 billion elements, provides more than 3.5 billion inspection and detection reports to the society, has nearly 10 tens of thousands of reports in the inspection and detection industry on average every day, and some third-party inspection institutions newly entering the market can meet the unreasonable and unlawful requirements of enterprises without worrying about breaking through the principle in order to quickly occupy the market and obtain the market share, tamper related data or counterfeit on an online system without worrying about tampering, and the data is usually input manually or collected by a machine in a mode that can be modified by a background, so that the data counterfeiting is greatly increased, and a brand-new full-automatic data collection and tamper-proof system is urgently needed at present, the possibility of data counterfeiting is radically cured from the source.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a remote wireless data tamper-proof acquisition device and system, which solve the problems of tampering detection data and data counterfeiting.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme: the utility model provides a long-range wireless data prevents falsifying collection equipment and system, includes power conversion module, battery, encryption algorithm memory area, CPU, hard disk, physical interface and wireless communication module, the input of battery is connected with power conversion module's output electricity, the output of power conversion module and battery is connected with encryption algorithm memory area, CPU, hard disk, physical interface and wireless communication module electricity respectively, the output of encryption algorithm memory area and physical interface respectively with CPU's input signal connection, CPU's output and the input signal connection of hard disk, the output of hard disk and wireless communication module's input signal connection.
The physical interfaces comprise a USB interface, an RS458 interface, a CAN bus, an RS232 interface and a network port, and CAN configure specified file paths, serial port commands, Modbus commands and the like through configuration programs, so as to monitor and acquire target data in real time.
The wireless communication module comprises 4G data flow communication and WiFi wireless network communication.
The remote wireless data tamper-proof acquisition system comprises an external power supply system, target equipment, acquisition equipment and a cloud platform, wherein the external power supply system comprises direct current and alternating current, and the external power supply system supplies power to the acquisition equipment through a power supply conversion module.
The target device transmits target data to the CPU through the physical interface, the CPU performs fingerprint calculation on the target data through the data private key, encrypts the target data to form ciphertext data and transmits the ciphertext data to the hard disk, and finally the data private key, the fingerprint data and the ciphertext data are uploaded to the cloud platform through the wireless communication module.
The cloud platform converts the ciphertext data into decrypted data, compares the decrypted data with the data private key and the fingerprint data through a retrieval module of the cloud platform, if the comparison result shows that the data are not modified, the comparison is passed, stores the decrypted data into a storage module of the cloud platform, and if the comparison result shows that the data are modified, cancels the existing data acquisition process and uploads the original version target data on the target device again.
Preferably, the external power supply system comprises 220V alternating current, 380V alternating current, 5V direct current, 12V direct current and 24V direct current.
Preferably, the hard disk memory is 128G, the target data is read and encrypted and then stored in the hard disk, the target data is deleted, and after the encrypted data is uploaded to the cloud platform, the ciphertext data is removed from the hard disk.
Preferably, the hard disk is a SATA 3.0SSD hard disk.
Preferably, the CPUs adopt a Linux framework, and each CPU has a unique ID code which is a 512-bit hexadecimal numerical value.
Preferably, the CPU is AT91SAM9G45C-CU, and the working voltage is 0.9V to 1.1V.
Preferably, the encryption algorithm storage area stores 64 encryption algorithms including the SHA1 algorithm and the 3DES algorithm.
Preferably, the encryption algorithm storage area randomly selects an algorithm for encryption calculation, a remote upgrading encryption algorithm is adopted, and when the encryption private key is uploaded, the hexadecimal numerical values of the first four bits of the code represent the corresponding encryption algorithm.
Preferably, the acquisition equipment is bound with a cloud platform data interface when leaving a factory, and cannot be modified through configuration in a later period.
Preferably, the storage battery is a lithium battery, and the capacity of the storage battery is at least 5000 milliamperes.
(III) advantageous effects
The invention provides remote wireless data tamper-proof acquisition equipment and system, which have the following beneficial effects:
the invention is characterized in that the acquisition equipment is butted with target equipment to be acquired, remote data is acquired through a physical interface, and related data are encrypted to respectively form fingerprint data, a data private key and a data ciphertext to be transmitted to the storage module of the cloud platform data center for storage, when a user uses the related data, the data can be compared on line to prevent artificial falsification of real data.
Drawings
FIG. 1 is a schematic diagram of a remote wireless data tamper-resistant acquisition device of the present invention;
FIG. 2 is a schematic diagram of a remote wireless data tamper-resistant system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1-2, the present invention provides a technical solution: the utility model provides a long-range wireless data prevents falsifying collection equipment and system, including power conversion module, the battery, encryption algorithm storage area, CPU, the hard disk, physical interface and wireless communication module, the input of battery is connected with power conversion module's output electricity, power conversion module and the output of battery respectively with encryption algorithm storage area, CPU, the hard disk, physical interface and wireless communication module electricity are connected, encryption algorithm storage area and physical interface's output respectively with CPU's input signal connection, CPU's output and the input signal connection of hard disk, the output of hard disk and wireless communication module's input signal connection.
The physical interface comprises a USB interface, an RS458 interface, a CAN bus, an RS232 interface and a network interface.
The wireless communication module comprises 4G data flow communication and WiFi wireless network communication.
The remote wireless data tamper-proof acquisition system comprises an external power supply system, target equipment, acquisition equipment and a cloud platform, wherein the external power supply system comprises direct current and alternating current, and the external power supply system supplies power to the acquisition equipment through a power supply conversion module.
The target device transmits target data to the CPU through the physical interface, the CPU performs fingerprint calculation on the target data through the data private key, encrypts the target data to form ciphertext data and transmits the ciphertext data to the hard disk, and finally the data private key, the fingerprint data and the ciphertext data are uploaded to the cloud platform through the wireless communication module.
The cloud platform converts the ciphertext data into decrypted data, compares the decrypted data with the data private key and the fingerprint data through a retrieval module of the cloud platform, if the comparison result shows that the data are not modified, the comparison is passed, stores the decrypted data into a storage module of the cloud platform, and if the comparison result shows that the data are modified, cancels the existing data acquisition process and uploads the original version target data on the target device again.
As a technical optimization scheme of the invention, the external power supply system comprises 220V alternating current, 380V alternating current, 5V direct current, 12V direct current and 24V direct current.
As a technical optimization scheme of the invention, the memory of the hard disk is 128G, the target data is read and encrypted and then stored in the hard disk, the target data is deleted, and after the encrypted data is uploaded to the cloud platform, the ciphertext data is removed from the hard disk.
As a technical optimization scheme of the invention, the hard disk is a SATA 3.0SSD hard disk.
As a technical optimization scheme of the invention, the CPUs adopt a Linux architecture, and each CPU has a unique ID code which is a 512-bit hexadecimal numerical value.
As a technical optimization scheme of the invention, the CPU is AT91SAM9G45C-CU, and the working voltage is 0.9V to 1.1V.
As a technical optimization scheme of the invention, the encryption algorithm storage area stores 64 encryption algorithms, including SHA1 algorithm and 3DES algorithm.
As a technical optimization scheme of the invention, the encryption algorithm storage area randomly selects an algorithm for encryption calculation, adopts a remote upgrading encryption algorithm, and when uploading an encryption private key, the hexadecimal numerical value of the first four bits of the code represents the corresponding encryption algorithm.
As a technical optimization scheme of the invention, the collection equipment is bound with the cloud platform data interface when leaving the factory, and cannot be modified through configuration in the later period.
As a technical optimization scheme of the invention, the storage battery is a lithium battery, and the capacity of the storage battery is at least 5000 milliamperes.
It should be noted that, in this document, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. The utility model provides a long-range wireless data prevent falsifying collection equipment, includes power conversion module, battery, encryption algorithm memory area, CPU, hard disk, physical interface and wireless communication module, its characterized in that: the input end of the storage battery is electrically connected with the output end of the power supply conversion module, the output ends of the power supply conversion module and the storage battery are respectively and electrically connected with the encryption algorithm storage area, the CPU, the hard disk, the physical interface and the wireless communication module, the output ends of the encryption algorithm storage area and the physical interface are respectively in signal connection with the input end of the CPU, the output end of the CPU is in signal connection with the input end of the hard disk, and the output end of the hard disk is in signal connection with the input end of the wireless communication module;
the physical interface comprises a USB interface, an RS458 interface, a CAN bus, an RS232 interface and a network interface;
the wireless communication module comprises 4G data flow communication and WiFi wireless network communication;
the utility model provides a long-range wireless data prevents falsifying collection system, includes external power supply system, target device, collection equipment and cloud platform, its characterized in that: the external power supply system comprises direct current and alternating current, and supplies power to the acquisition equipment through the power supply conversion module;
the target device transmits target data to the CPU through a physical interface, the CPU performs fingerprint calculation on the target data through a data private key, encrypts the target data to form ciphertext data and transmits the ciphertext data to the hard disk, and finally uploads the data private key, the fingerprint data and the ciphertext data to the cloud platform through the wireless communication module;
the cloud platform converts the ciphertext data into decrypted data, compares the decrypted data with the data private key and the fingerprint data through a retrieval module of the cloud platform, if the comparison result shows that the data are not modified, the comparison is passed, stores the decrypted data into a storage module of the cloud platform, and if the comparison result shows that the data are modified, cancels the existing data acquisition process and uploads the original version target data on the target device again.
2. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the external power supply system comprises 220V alternating current, 380V alternating current, 5V direct current, 12V direct current and 24V direct current.
3. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the memory of the hard disk is 128G, the target data are read and encrypted and then stored in the hard disk, the target data are deleted, and after the encrypted data are uploaded to the cloud platform, the ciphertext data are removed from the hard disk.
4. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the hard disk is a SATA 3.0SSD hard disk.
5. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the CPU adopts a Linux architecture, and each CPU has a unique ID code which is a 512-bit hexadecimal numerical value.
6. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the CPU is AT91SAM9G45C-CU, and the working voltage is 0.9V-1.1V.
7. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the encryption algorithm storage area stores 64 encryption algorithms including the SHA1 algorithm and the 3DES algorithm.
8. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the encryption algorithm storage area randomly selects an algorithm for encryption calculation, a remote upgrading encryption algorithm is adopted, and when an encryption private key is uploaded, the hexadecimal numerical values of the first four encoded bits represent the corresponding encryption algorithm.
9. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the acquisition equipment is bound with a cloud platform data interface when leaving a factory, and cannot be modified through configuration at a later stage.
10. The remote wireless data tamper-proof acquisition device and system according to claim 1, wherein: the storage battery is a lithium battery, and the capacity of the storage battery is at least 5000 milliamperes.
CN202010148886.XA 2020-03-05 2020-03-05 Remote wireless data tamper-proof acquisition equipment and system Pending CN111343190A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010148886.XA CN111343190A (en) 2020-03-05 2020-03-05 Remote wireless data tamper-proof acquisition equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010148886.XA CN111343190A (en) 2020-03-05 2020-03-05 Remote wireless data tamper-proof acquisition equipment and system

Publications (1)

Publication Number Publication Date
CN111343190A true CN111343190A (en) 2020-06-26

Family

ID=71187238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010148886.XA Pending CN111343190A (en) 2020-03-05 2020-03-05 Remote wireless data tamper-proof acquisition equipment and system

Country Status (1)

Country Link
CN (1) CN111343190A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451282A (en) * 2023-06-15 2023-07-18 浙江亿视电子技术有限公司 Sensor data tamper-proof system and method for monitoring carbon emission of website

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115261A (en) * 2007-09-12 2008-01-30 中兴通讯股份有限公司 System and method for implementing different port switch in embedded system
CN102222254A (en) * 2011-04-10 2011-10-19 上海擎龙通信技术有限公司 Intelligent safe digital card
WO2017166644A1 (en) * 2016-03-31 2017-10-05 乐视控股(北京)有限公司 Data acquisition method and system
CN108011872A (en) * 2017-11-23 2018-05-08 深圳航信德诚科技有限公司 Personal information intelligent acquisition method and system
CN108471522A (en) * 2018-04-18 2018-08-31 成都零光量子科技有限公司 A kind of video frequency monitoring method that can not be distorted and system
CN109005180A (en) * 2018-08-10 2018-12-14 福州安佳智电子科技有限公司 A kind of micro moving evidence obtaining black box subsystem
CN110084055A (en) * 2019-05-08 2019-08-02 联陆智能交通科技(上海)有限公司 The anti-tamper system of car data and data access method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115261A (en) * 2007-09-12 2008-01-30 中兴通讯股份有限公司 System and method for implementing different port switch in embedded system
CN102222254A (en) * 2011-04-10 2011-10-19 上海擎龙通信技术有限公司 Intelligent safe digital card
WO2017166644A1 (en) * 2016-03-31 2017-10-05 乐视控股(北京)有限公司 Data acquisition method and system
CN108011872A (en) * 2017-11-23 2018-05-08 深圳航信德诚科技有限公司 Personal information intelligent acquisition method and system
CN108471522A (en) * 2018-04-18 2018-08-31 成都零光量子科技有限公司 A kind of video frequency monitoring method that can not be distorted and system
CN109005180A (en) * 2018-08-10 2018-12-14 福州安佳智电子科技有限公司 A kind of micro moving evidence obtaining black box subsystem
CN110084055A (en) * 2019-05-08 2019-08-02 联陆智能交通科技(上海)有限公司 The anti-tamper system of car data and data access method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116451282A (en) * 2023-06-15 2023-07-18 浙江亿视电子技术有限公司 Sensor data tamper-proof system and method for monitoring carbon emission of website
CN116451282B (en) * 2023-06-15 2023-09-01 浙江亿视电子技术有限公司 Sensor data tamper-proof system and method for monitoring carbon emission of website

Similar Documents

Publication Publication Date Title
CN103323045A (en) Method to detect tampering of data
CN108091079A (en) A kind of intelligent electric power self-help serving system
CN109462278B (en) Power system switching operation method based on PDA
CN105550924A (en) Security management system for rented house
CN103926899A (en) Multifunctional remote data monitoring system based on Internet of Things oil field
CN111323646A (en) System and method for reading ammeter
CN111343190A (en) Remote wireless data tamper-proof acquisition equipment and system
CN109598833A (en) Smart lock control system based on optical cable joining cabinet
CN104199407A (en) Intelligent IC (Integrated Circuit) card total pollution discharge amount monitoring and controlling system
CN204390320U (en) A kind of dynamic puzzle-lock system
CN104199470A (en) Energy flow supply control method, controller and control system
CN108183814A (en) The malfunction elimination method and apparatus of the communication channel of power information acquisition system
CN103729738A (en) Sewage drainage monitoring method
CN105915632A (en) Building engineering monitoring system based on 3D virtual reality technology
CN116956195A (en) Electric energy meter data freezing processing method and device, electronic equipment and storage medium
CN111754752A (en) Internet of things intelligent gas network system based on online algorithm and monitoring method
CN112116309A (en) User electricity consumption data acquisition method based on block chain
CN201725386U (en) Electric energy meter based on SM1 cryptographic algorithm
CN112099413B (en) Household electricity consumption data monitoring method and device
CN108010169A (en) A kind of self-service terminal system of paying dues of intelligent electric power
KR100894228B1 (en) Electronic type watt hour meter using NAND flash memory and method for saving wave data thereof
CN107861085A (en) Batch meter intelligent management system
CN113691390A (en) Cloud-end-coordinated edge node alarm system and method
CN202331194U (en) Intelligent instrument maintenance system
CN103343054A (en) Whole-process monitoring waste cooking oil recovery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200626

RJ01 Rejection of invention patent application after publication