CN113079147A - Data monitoring system and method based on industrial internet - Google Patents

Data monitoring system and method based on industrial internet Download PDF

Info

Publication number
CN113079147A
CN113079147A CN202110319836.8A CN202110319836A CN113079147A CN 113079147 A CN113079147 A CN 113079147A CN 202110319836 A CN202110319836 A CN 202110319836A CN 113079147 A CN113079147 A CN 113079147A
Authority
CN
China
Prior art keywords
data
module
verification
unit
industrial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110319836.8A
Other languages
Chinese (zh)
Other versions
CN113079147B (en
Inventor
朱荣辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Aipujing Software Co ltd
Original Assignee
Zhuhai Aipujing Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Aipujing Software Co ltd filed Critical Zhuhai Aipujing Software Co ltd
Priority to CN202110319836.8A priority Critical patent/CN113079147B/en
Publication of CN113079147A publication Critical patent/CN113079147A/en
Application granted granted Critical
Publication of CN113079147B publication Critical patent/CN113079147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Biomedical Technology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data monitoring system based on an industrial internet, which comprises a network server, a wireless intelligent gateway module, an intelligent terminal, a storage module, an access terminal, a monitoring module, a data emergency processing module and a standby repository. The invention can carry out high-efficiency safety monitoring on data, carry out multiple protection and warning when encountering illegal access data information, ensure that the data cannot be leaked, avoid causing loss, calculate the illegal access rate of each time period according to data analysis and data comparison, and adjust the verification method according to the illegal access rate, thereby achieving reasonable use of the verification method, reducing the system operation amount, prolonging the service life of the system, improving the verification accuracy and improving the safety of data monitoring, and can carry out emergency backup on the data through a standby repository, ensure that the data cannot be lost and avoid causing irretrievable results.

Description

Data monitoring system and method based on industrial internet
Technical Field
The invention relates to the technical field of industrial internet data monitoring, in particular to a data monitoring system and method based on an industrial internet.
Background
Industrial internetworking is the result of the convergence of global industrial systems with advanced computing, analytics, sensing technologies and internet connectivity. The industrial internet is connected with human-computer through intelligent machine connection, combines software and big data analysis, reconstructs global industry, stimulates productivity, and makes the world better, faster, safer, cleaner and more economical. The essence and core of the industrial internet is that the equipment, production lines, factories, suppliers, products and customers are tightly connected and converged through an industrial internet platform. The method can help the manufacturing industry to elongate an industrial chain, and form cross-equipment, cross-system, cross-factory and cross-regional interconnection and intercommunication, thereby improving the efficiency and promoting the intellectualization of the whole manufacturing service system. The method is also beneficial to promoting the melting development of the manufacturing industry, realizing the crossing development between the manufacturing industry and the service industry and efficiently sharing various key resources of the industrial economy. The data monitoring and collection of the industrial internet plays a decisive role for managers to analyze the industrial operation process.
However, when the conventional monitoring system encounters abnormal access, no corresponding protection processing is set for the abnormal access, which is easy to cause data leakage and data loss.
Disclosure of Invention
The present invention is directed to a data monitoring system and method based on the industrial internet, so as to solve the problems set forth in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: the utility model provides a data monitoring system based on industry internet, includes network server, wireless intelligent gateway module, intelligent terminal, storage module, access terminal, monitoring module, data emergency processing module and reserve repository, network server is used for carrying out platform formula control management to data monitoring system, wireless intelligent gateway module is used for carrying out automatic collection and arrangement to industrial data, intelligent terminal is used for carrying out manual collection and arrangement to industrial data, storage module is used for integrating the storage to industrial data, access terminal is used for the user to look over data, monitoring module is used for monitoring and warning access user's authority, data emergency processing module is used for the emergency processing to unusual visit, reserve repository is used for the secondary storage to industrial data, network server's output with wireless intelligent gateway module, The intelligent terminal the input of storage module is connected, the input of network server with wireless intelligent gateway module with the output of intelligent terminal is connected, the output of storage module with network server the access terminal the monitoring module the data emergency processing module with the input of reserve repository is connected, the input of storage module with the access terminal the monitoring module the data emergency processing module with the output of reserve repository is connected.
Further, the network server includes a central processing unit and an information transceiver unit, the central processing unit is configured to analyze, integrate and process data, and the information transceiver unit is configured to transmit and receive information.
Furthermore, the wireless intelligent gateway module comprises a data acquisition unit, a data statistics unit and a data transmission unit, wherein the data acquisition unit is used for acquiring industrial data, the data statistics unit is used for counting the industrial data, and the data transmission unit is used for transmitting the industrial data.
Furthermore, the intelligent terminal comprises a first input unit and a first display unit, wherein the first input unit is used for data input, and the first display unit is used for displaying system data.
Further, the storage module includes a local storage and a cloud storage, where the local storage is used for storing system data, and the cloud storage is used for backing up the system data.
Further, the access terminal comprises a second input unit, a second display unit and a verification unit, the second input unit is used for data input, the second display unit is used for displaying system data, the verification unit comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password verification comprises account verification and login password verification, each account only corresponds to one login password, and when the account verification and the login password verification are matched, the password verification is considered to be passed, otherwise, the password verification is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
the face recognition comprises a first camera, a first scanning module, a first calculating module and a second database, the first camera is used for photographing the face of an operator, the picture is transmitted to the first scanning module in real time, the mouth J of the operator is used as an original point, L is used as a left eye, R is used as a right eye, and F is used as a nose, the first scanning module carries out scanning modeling on the received picture to enable the picture to form a three-dimensional coordinate system, then the calculating module calculates the distance of L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively: l (x)1、y1、z1)、R(x2、y2、z2)、F(x3、y3、z3);
Thus calculating the distances thereof as: l ═ v (x)1 2+y1 2+z1 2)、R=√(x2 2+y2 2+z2 2)、F=√(x3 2+y3 2+z3 2);
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face identification passes, otherwise, the verification fails;
the handwriting recognition comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second calculating module and a third database, the intelligent writing terminal is used for writing verification characters, and the verification characters and the numbers stored in the third database are written after the handwriting recognition is finishedAccording to the comparison, a second camera is used for photographing the hand of an operator in the writing process, the photo is transmitted to a second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received photo, a pen point W is used as an original point to form a three-dimensional coordinate system, the coordinate position is determined, and a five-point coordinate value M (x) is taken4、y4、z4)、Q(x5、y5、z5)、P(x6、y6、z6),E(x7、y7、z7)、H(x8、y8、z8) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and M, Q, P, E and angles of H and the origin of W are calculated respectively as ≤ 1, < 2, < 3, < 4 and ≤ 5, and the calculation formula is as follows:
Cos∠1=(x4 2+y4 2-z4 2)/2x4y4
Cos∠2=(x5 2+y5 2-z5 2)/2x5y5
Cos∠3=(x6 2+y6 2-z6 2)/2x6y6
Cos∠4=(x7 2+y7 2-z7 2)/2x7y7
Cos∠5=(x8 2+y8 2-z8 2)/2x8y8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record failing to pass the verification is regarded as an illegal access data.
Further, the monitoring module comprises a data collecting unit, a curve fitting unit, an illegal access database, a comparing unit and an adjusting unit, wherein the data collecting unit is used for collecting and sorting the times and time of illegal access, the curve fitting unit is used for classifying and sorting the data collected by the data collecting unit and forming a curve graph, the illegal access rates of early, middle and late time periods are calculated, the comparing unit is used for comparing the data stored in the illegal access database, the adjusting unit is used for adjusting the used verification modes according to the comparison result, for example, four verification methods of password verification, sound recognition, face recognition and handwriting recognition are adopted in the time period with the highest illegal access rate, and three verification methods of the four verification methods are randomly selected in the second time period of the illegal access rate, two verification methods in the four verification methods are randomly selected in a time period with the lowest illegal access rate.
Furthermore, the data emergency processing module comprises a data primary processing unit, a data secondary processing unit and a data tertiary processing unit.
Further, the primary data processing unit comprises a code conversion module, the secondary data processing unit comprises a virtual database, the tertiary data processing unit comprises a formatting module, a conveying module and a positioning module, data are protected through triple emergency processing, and the data analysis process is as follows: f is the number of illegal accesses, when 1 is larger than or equal to F and larger than 0, the primary data processing unit is started, the code conversion module is enabled to convert industrial data into codes specific to a user, when 2 is larger than or equal to F and larger than 1, the secondary data processing unit is started, the virtual database is used, illegal accesses cannot acquire real data, data is protected in a double mode, when F is larger than 2, the tertiary data processing unit is started, the conveying module is enabled to transmit the stored data to the standby repository, the formatting module is enabled to permanently delete all data, the positioning module is used for positioning the IP address of the illegal accesses, and then positioning information is transmitted to a user terminal.
The invention also comprises a method of the data monitoring system based on the industrial internet, which comprises the following steps:
a) the wireless intelligent gateway module is used for automatically collecting and sorting industrial data, transmitting the collected industrial data to the network server, manually collecting the industrial data which cannot be automatically collected by using the intelligent terminal, and transmitting the data to the network server;
b) the network server carries out classification processing on the received data and transmits the data to the storage module;
c) the storage module stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) the access terminal is used for inquiring the data of the storage module, the monitoring module carries out four verification modes of password verification, voice recognition, face recognition and handwriting recognition on access to confirm whether the access module has access authority, and the data analysis process is as follows:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A is 1, the password authentication is passed, and when A is 0, the password authentication is not passed;
when B is 1, the voice recognition is passed, and when B is 0, the voice recognition is not passed;
when C is 1, the face identification is passed, and when C is 0, the face identification is not passed;
when D is 1, the handwriting recognition is passed, and when D is 0, the handwriting recognition is not passed;
if four verification modes are selected: if one of the items is 0, the verification is failed;
if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of them is 0, the verification fails, otherwise, the verification passes;
and if two verification modes are selected: there are several cases: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more items are 0, the verification fails, and otherwise, the verification passes;
if the verification is passed, the data stored in the storage module can be accessed, if the verification is not passed, the data is regarded as illegally accessed data, and the data emergency processing module is started;
e) the data emergency processing module performs multi-stage data protection on the storage module, and the data analysis process is as follows: when the data emergency processing module detects that the number of times of illegal access is equal to 1, primary protection is carried out, specific code conversion is carried out on data in the storage module, when the number of times of illegal access is detected to be equal to 2, secondary protection is carried out, a virtual database is generated, information misleading is carried out on illegal access, when the number of times of illegal access is detected to be greater than 2, tertiary protection is carried out, the data in the storage module is transmitted to the standby repository and then is automatically formatted permanently, the data is completely cleared, the IP address of the illegal access is located, and the IP address is transmitted to the user terminal.
Compared with the prior art, the invention has the following beneficial effects:
1. by arranging the network server, the wireless intelligent gateway module, the intelligent terminal, the storage module, the access terminal, the monitoring module and the data emergency processing module, the invention can carry out high-efficiency safety monitoring on data, carry out multiple protection and warning when illegal access data information is encountered, ensure that the data cannot be leaked, avoid loss, calculate the illegal access rate of each time period according to data analysis and data comparison and adjust the verification method according to the illegal access rate, thereby achieving reasonable use of the verification method, reducing the system operation amount, prolonging the service life of the system, improving the verification accuracy and improving the safety of data monitoring.
2. The invention can carry out emergency backup on the data by setting the standby repository, ensure that the data cannot be lost and avoid irretrievable consequences.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a block diagram of the invention as a whole;
FIG. 2 is a flow chart of the monitoring module of the present invention;
in the figure: 1. a network server; 2. a wireless intelligent gateway module; 3. an intelligent terminal; 4. a storage module; 5. accessing a terminal; 6. a monitoring module; 7. a data emergency processing module; 8. a backup repository; 9. a central processing unit; 10. an information transmitting/receiving unit; 11. a data acquisition unit; 12. a data statistics unit; 13. a data transmission unit; 14. a first input unit; 15. a first display unit; 16. storing locally; 17. cloud storage; 18. a second input unit; 19. a second display unit; 20. a verification unit; 21. a data collection unit; 22. a curved fitting unit; 23. illegally accessing the database; 24. a comparison unit; 25. an adjustment unit; 26. a data primary processing unit; 27. a data secondary processing unit; 28. and the data three-level processing unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: a data monitoring system based on industrial Internet comprises a network server 1, a wireless intelligent gateway module 2, an intelligent terminal 3, a storage module 4, an access terminal 5, a monitoring module 6, a data emergency processing module 7 and a spare repository 8, wherein the network server 1 is used for carrying out platform type control management on the data monitoring system, the wireless intelligent gateway module 2 is used for automatically collecting and arranging industrial data, the intelligent terminal 3 is used for manually collecting and arranging the industrial data, the storage module 4 is used for integrating and storing the industrial data, the access terminal 5 is used for a user to check the data, the monitoring module 6 is used for monitoring and warning the authority of the access user, the data emergency processing module 7 is used for emergently processing abnormal access, the spare repository 8 is used for secondary storage of the industrial data, the output of network server 1 with wireless intelligent gateway module 2 intelligent terminal 3 the input of storage module 4 is connected, the input of network server 1 with wireless intelligent gateway module 2 with the output of intelligent terminal 3 is connected, the output of storage module 4 with network server 1 access terminal 5 monitoring module 6 data emergency processing module 7 with the input of reserve repository 8 is connected, the input of storage module 4 with access terminal 5 monitoring module 6 data emergency processing module 7 with the output of reserve repository 8 is connected.
The network server 1 comprises a central processing unit 9 and an information transceiving unit 10, wherein the central processing unit 9 is used for analyzing and integrating data, and the information transceiving unit 10 is used for transceiving information.
The wireless intelligent gateway module 2 comprises a data acquisition unit 11, a data statistics unit 12 and a data transmission unit 13, wherein the data acquisition unit 11 is used for acquiring industrial data, the data statistics unit 12 is used for statistics of the industrial data, and the data transmission unit 13 is used for transmission of the industrial data.
The intelligent terminal 3 comprises a first input unit 14 and a first display unit 15, wherein the first input unit 14 is used for data input, and the first display unit 15 is used for displaying system data.
The storage module 4 includes a local storage 16 and a cloud storage 17, where the local storage 16 is used for storing system data, and the cloud storage 17 is used for backing up the system data.
The access terminal (5) comprises a second input unit (18), a second display unit (19) and a verification unit (20), the second input unit (18) is used for data input, the second display unit (19) is used for displaying system data, the verification unit (20) comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password verification comprises account verification and login password verification, each account only corresponds to one login password, and when the account verification and the login password verification are matched, the password verification is considered to be passed, otherwise, the password verification is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
the face recognition comprises a first camera, a first scanning module, a first calculating module and a second database, the first camera is used for photographing the face of an operator, the picture is transmitted to the first scanning module in real time, the mouth J of the operator is used as an original point, L is used as a left eye, R is used as a right eye, and F is used as a nose, the first scanning module carries out scanning modeling on the received picture to enable the picture to form a three-dimensional coordinate system, then the calculating module calculates the distance of L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively: l (x)1、y1、z1)、R(x2、y2、z2)、F(x3、y3、z3);
Thus calculating the distances thereof as: l ═ v (x)1 2+y1 2+z1 2)、R=√(x2 2+y2 2+z2 2)、F=√(x3 2+y3 2+z3 2);
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face identification passes, otherwise, the verification fails;
the handwriting recognition system comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second calculation module and a third database, the intelligent writing terminal is used for writing verification characters, the verification characters are compared with data stored in the third database after writing, the second camera is used for photographing the hand of an operator in the writing process, the picture is transmitted to the second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received picture, a pen point W is used as an original point to enable the received picture to form a three-dimensional coordinate system, the coordinate position is determined, five-point coordinate values are taken, and M (x is x) coordinate value4、y4、z4)、Q(x5、y5、z5)、P(x6、y6、z6),E(x7、y7、z7)、H(x8、y8、z8) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and M, Q, P, E and angles of H and the origin of W are calculated respectively as ≤ 1, < 2, < 3, < 4 and ≤ 5, and the calculation formula is as follows:
Cos∠1=(x4 2+y4 2-z4 2)/2x4y4
Cos∠2=(x5 2+y5 2-z5 2)/2x5y5
Cos∠3=(x6 2+y6 2-z6 2)/2x6y6
Cos∠4=(x7 2+y7 2-z7 2)/2x7y7
Cos∠5=(x8 2+y8 2-z8 2)/2x8y8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record failing to pass the verification is regarded as an illegal access data.
The monitoring module (6) comprises a data collection unit (21), a curve fitting unit (22), an illegal access database (23), a comparison unit (24) and an adjustment unit (25), the data collection unit (21) is used for collecting and sorting the times and time of illegal access, the curve fitting unit (22) is used for classifying and sorting the data collected by the data collection unit (21) and forming a curve graph, the illegal access rates of early, middle and late time periods are calculated, the comparison unit (24) is used for comparing the data stored in the illegal access database (23), the adjustment unit (25) is used for adjusting the used verification mode according to the comparison result, for example, four verification methods of password verification, voice recognition, face recognition and handwriting recognition are adopted in the time period with the highest illegal access rate, and randomly selecting three verification methods from the four verification methods in the time period with the second illegal access rate, and randomly selecting two verification methods from the four verification methods in the time period with the lowest illegal access rate.
The data emergency processing module 7 comprises a data primary processing unit 22, a data secondary processing unit 23 and a data tertiary processing unit 24.
The primary data processing unit 22 includes a code conversion module, the secondary data processing unit 23 includes a virtual database, the tertiary data processing unit 24 includes a formatting module, a conveying module and a positioning module, and data is protected through triple emergency processing, and the data analysis process is as follows: f is the number of illegal accesses, when 1 is not less than F >0, the primary data processing unit 22 is started to enable the code conversion module to convert industrial data into a code specific to a user, when 2 is not less than F >1, the secondary data processing unit 23 is started to enable the virtual database to enable illegal accesses to obtain real data and to perform double protection on the data, and when F >2, the tertiary data processing unit 24 is started to enable the conveying module to transmit the stored data to the standby repository 8, enable the formatting module to permanently delete all the data, enable the positioning module to position the IP address of the illegal access, and then convey positioning information to a user terminal.
The invention also comprises a method of the data monitoring system based on the industrial internet, which comprises the following steps:
a) the wireless intelligent gateway module 2 is used for automatically collecting and arranging industrial data, the collected industrial data are transmitted to the network server, the intelligent terminal 3 is used for manually collecting the industrial data which cannot be automatically collected, and the data are transmitted to the network server 1;
b) the network server 1 classifies the received data and transmits the data to the storage module 4;
c) the storage module 4 stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) the access terminal 5 is used for inquiring the data of the storage module 4, the monitoring module 6 is used for carrying out four verification modes of password verification, voice recognition, face recognition and handwriting recognition on access to confirm whether the access terminal has access authority, and the data analysis process is as follows:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A is 1, the password authentication is passed, and when A is 0, the password authentication is not passed;
when B is 1, the voice recognition is passed, and when B is 0, the voice recognition is not passed;
when C is 1, the face identification is passed, and when C is 0, the face identification is not passed;
when D is 1, the handwriting recognition is passed, and when D is 0, the handwriting recognition is not passed;
if four verification modes are selected: if one of the items is 0, the verification is failed;
if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of them is 0, the verification fails, otherwise, the verification passes;
and if two verification modes are selected: there are several cases: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more items are 0, the verification fails, and otherwise, the verification passes;
if the verification is passed, the data stored in the storage module 4 can be accessed, the data which is not passed is regarded as illegal access data, and the data emergency processing module 7 is started;
e) the data emergency processing module 7 performs multi-stage data protection on the storage module 4, and the data analysis process is as follows: when the data emergency processing module 7 detects that the number of times F of illegal access is 1, a first-level protection is performed to perform specific code conversion on the data in the storage module 4, when F is 2, a second-level protection is performed to generate a virtual database, information misleading is performed on the illegal access, when F is 2, a third-level protection is performed, the data in the storage module 4 is transmitted to the standby repository 8, then permanent formatting is automatically performed, the data is completely cleared, and the IP address of the illegal access is located and transmitted to the user terminal.
The specific implementation mode is as follows: during the use, use wireless intelligent gateway module 2 to carry out automatic collection to industrial data, use intelligent terminal 3 to carry out manual input to the industrial data that can't carry out automatic collection, data transmission to the network server 1 that will collect, network server 1 carries out the classification to the industrial data that receives, and carry the data of handling to storage module 4, the user can use access terminal 5 to visit the data of storage module 4 inside and look over, monitoring module 6 verifies the terminal of carrying out the visit, if verify and pass, then can look over the data of storage module 4 inside, if verify and fail, then start data emergency processing module 7 and carry out multiple protection to the data of storage module 4 inside, avoid data leakage, and with data emergency backup to reserve repository 8, avoid data loss.
The working principle of the invention is as follows:
referring to the attached drawings 1-2 of the specification, by arranging a network server 1, a wireless intelligent gateway module 2, an intelligent terminal 3, a storage module 4, an access terminal 5, a monitoring module 6 and a data emergency processing module 7, can carry out high-efficiency safety monitoring on data, carry out multiple protection and warning when encountering illegal access data information, ensure that the data cannot be leaked, avoid causing loss, and can calculate the illegal access rate of each time period according to data analysis and data comparison, and adjust the verification method according to the illegal access rate, thereby achieving reasonable use verification method, reducing system operation amount, prolonging service life of the system, and improves the accuracy of the verification, improves the security of the data monitoring, and through the backup repository 8, the data can be emergently backed up, so that the data cannot be lost, and irretrievable consequences are avoided.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The utility model provides a data monitoring system based on industry internet, includes web server (1), wireless intelligent gateway module (2), intelligent terminal (3), storage module (4), access terminal (5), monitoring module (6), data emergency processing module (7) and reserve repository (8), its characterized in that: the network server (1) is used for carrying out platform type control management on a data monitoring system, the wireless intelligent gateway module (2) is used for automatically collecting and arranging industrial data, the intelligent terminal (3) is used for manually collecting and arranging the industrial data, the storage module (4) is used for integrating and storing the industrial data, the access terminal (5) is used for checking the data by a user, the monitoring module (6) is used for monitoring and warning the authority of the access user, the data emergency processing module (7) is used for emergently processing abnormal access, the standby repository (8) is used for carrying out secondary storage on the industrial data, the output end of the network server (1) is connected with the wireless intelligent gateway module (2), the intelligent terminal (3) and the input end of the storage module (4), the input of network server (1) with wireless intelligent gateway module (2) with the output of intelligent terminal (3) is connected, the output of storage module (4) with network server (1), access terminal (5), monitoring module (6), data emergency processing module (7) with the input of reserve repository (8) is connected, the input of storage module (4) with access terminal (5), monitoring module (6), data emergency processing module (7) with the output of reserve repository (8) is connected.
2. The industrial internet-based data monitoring system of claim 1, wherein: the network server (1) comprises a central processing unit (9) and an information transceiving unit (10), wherein the central processing unit (9) is used for analyzing, integrating and processing data, and the information transceiving unit (10) is used for transceiving and processing information.
3. The industrial internet-based data monitoring system of claim 1, wherein: the wireless intelligent gateway module (2) comprises a data acquisition unit (11), a data statistics unit (12) and a data transmission unit (13), wherein the data acquisition unit (11) is used for acquiring industrial data, the data statistics unit (12) is used for statistics of the industrial data, and the data transmission unit (13) is used for transmitting the industrial data.
4. The industrial internet-based data monitoring system of claim 1, wherein: the intelligent terminal (3) comprises a first input unit (14) and a first display unit (15), wherein the first input unit (14) is used for data input, and the first display unit (15) is used for displaying system data.
5. The industrial internet-based data monitoring system of claim 1, wherein: the storage module (4) comprises a local storage (16) and a cloud storage (17), wherein the local storage (16) is used for storing system data, and the cloud storage (17) is used for backing up the system data.
6. The industrial internet-based data monitoring system of claim 1, wherein: the access terminal (5) comprises a second input unit (18), a second display unit (19) and a verification unit (20), the second input unit (18) is used for data input, the second display unit (19) is used for displaying system data, the verification unit (20) comprises password verification, voice recognition, face recognition and handwriting recognition and is used for verifying access authority, and the data analysis process is as follows:
the password verification comprises account verification and login password verification, each account only corresponds to one login password, and when the account verification and the login password verification are matched, the password verification is considered to be passed, otherwise, the password verification is not passed;
the voice recognition comprises a voice acquisition module, a first waveform conversion module and a first database, wherein the voice acquisition module is used for acquiring and processing voice of an operator, the acquired voice is transmitted to the first waveform conversion module, the first waveform conversion module converts the received voice into a waveform V, and then the waveform V is compared with data stored in the first database, if the comparison is successful, the voice recognition is successful, otherwise, the verification is failed;
the face recognition comprises a first camera, a first scanning module, a first calculating module and a second database, the first camera is used for photographing the face of an operator, the picture is transmitted to the first scanning module in real time, the mouth J of the operator is used as an original point, L is used as a left eye, R is used as a right eye, and F is used as a nose, the first scanning module carries out scanning modeling on the received picture to enable the picture to form a three-dimensional coordinate system, then the calculating module calculates the distance of L, R, F, and the positions of L, R, F in the three-dimensional coordinate system are respectively: l (x)1、y1、z1)、R(x2、y2、z2)、F(x3、y3、z3);
Thus calculating the distances thereof as: l ═ v (x)1 2+y1 2+z1 2)、R=√(x2 2+y2 2+z2 2)、F=√(x3 2+y3 2+z3 2);
Comparing the calculated result with the data stored in the second database, wherein if the comparison is successful, the face identification passes, otherwise, the verification fails;
the handwriting recognition system comprises an intelligent writing terminal, a pressure sensor, a second camera, a second scanning module, a second calculation module and a third database, the intelligent writing terminal is used for writing verification characters, the verification characters are compared with data stored in the third database after writing, the second camera is used for photographing the hand of an operator in the writing process, the picture is transmitted to the second scanning module in real time, the second scanning module carries out three-dimensional modeling on the received picture, a pen point W is used as an original point to enable the received picture to form a three-dimensional coordinate system, the coordinate position is determined, five-point coordinate values are taken, and M (x is x) coordinate value4、y4、z4)、Q(x5、y5、z5)、P(x6、y6、z6),E(x7、y7、z7)、H(x8、y8、z8) Wherein M is a thumb, Q is an index finger, P is a middle finger, E is a ring finger, H is a small finger, and M, Q, P, E and angles of H and the origin of W are calculated respectively as ≤ 1, < 2, < 3, < 4 and ≤ 5, and the calculation formula is as follows:
Cos∠1=(x4 2+y4 2-z4 2)/2x4y4
Cos∠2=(x5 2+y5 2-z5 2)/2x5y5
Cos∠3=(x62+y6 2-z6 2)/2x6y6
Cos∠4=(x7 2+y7 2-z7 2)/2x7y7
Cos∠5=(x8 2+y8 2-z8 2)/2x8y8
comparing the calculated < 1 >, the < 2 >, the < 3 >, the < 4 > and the < 5 with data stored in the third database, meanwhile, in the writing process, a pressure sensor can also collect the pressure generated by the acting point of each finger on a pen holder, and the pressure is compared with the data stored in the third database, meanwhile, data comparison is carried out on the handwriting of an operator, the pen holding posture and the hand acting point, if the comparison is passed, the handwriting verification is passed, otherwise, the handwriting is not passed;
the record failing to pass the verification is regarded as an illegal access data.
7. The industrial internet-based data monitoring system of claim 1, wherein: the monitoring module (6) comprises a data collection unit (21), a curve fitting unit (22), an illegal access database (23), a comparison unit (24) and an adjustment unit (25), the data collection unit (21) is used for collecting and sorting the times and time of illegal access, the curve fitting unit (22) is used for classifying and sorting the data collected by the data collection unit (21) and forming a curve graph, the illegal access rates of early, middle and late time periods are calculated, the comparison unit (24) is used for comparing the data stored in the illegal access database (23), the adjustment unit (25) is used for adjusting the used verification mode according to the comparison result, for example, four verification methods of password verification, voice recognition, face recognition and handwriting recognition are adopted in the time period with the highest illegal access rate, and randomly selecting three verification methods from the four verification methods in the time period with the second illegal access rate, and randomly selecting two verification methods from the four verification methods in the time period with the lowest illegal access rate.
8. The industrial internet-based data monitoring system of claim 1, wherein: the data emergency processing module (7) comprises a data primary processing unit (26), a data secondary processing unit (27) and a data tertiary processing unit (28).
9. The industrial internet-based data monitoring system of claim 8, wherein: the primary data processing unit (26) comprises a code conversion module, the secondary data processing unit (27) comprises a virtual database, the tertiary data processing unit (28) comprises a formatting module, a conveying module and a positioning module, data are protected through triple emergency processing, and the data analysis process is as follows: f is illegal access times, when the number of times is 1 ≧ F >0, the primary data processing unit (26) is started, the code conversion module is enabled to convert industrial data into codes specific to users, when the number of times is 2 ≧ F >1, the secondary data processing unit (27) is started, the virtual database is used, illegal access cannot acquire real data, data is protected in a double mode, when the number of times is F >2, the tertiary data processing unit (28) is started, the conveying module is enabled to transmit the stored data to the standby repository (8), the formatting module is enabled to delete all data permanently, the positioning module is used to position IP addresses illegally accessed, and positioning information is transmitted to a user terminal.
10. The method of an industrial internet-based data monitoring system according to any one of claims 1 to 9, wherein: the method comprises the following steps:
a) the wireless intelligent gateway module (2) is used for automatically collecting and arranging industrial data, the collected industrial data are transmitted to the network server, the intelligent terminal (3) is used for manually collecting the industrial data which cannot be automatically collected, and the data are transmitted to the network server (1);
b) the network server (1) classifies the received data and transmits the data to the storage module (4);
c) the storage module (4) stores the data and performs backup processing on the data to ensure that the data cannot be lost;
d) the access terminal (5) is used for inquiring the data of the storage module (4), the monitoring module (6) carries out four verification modes of password verification, voice recognition, face recognition and handwriting recognition on access to confirm whether the access terminal has access authority, and the data analysis process is as follows:
the password is verified as A, the voice is recognized as B, the face is recognized as C, the handwriting is verified as D,
when A is 1, the password authentication is passed, and when A is 0, the password authentication is not passed;
when B is 1, the voice recognition is passed, and when B is 0, the voice recognition is not passed;
when C is 1, the face identification is passed, and when C is 0, the face identification is not passed;
when D is 1, the handwriting recognition is passed, and when D is 0, the handwriting recognition is not passed;
if four verification modes are selected: if one of the items is 0, the verification is failed;
if three verification modes are selected: there are several cases: { A, B, C }, { A, B, D }, { A, C, D }, { B, C, D }, if one or more of them is 0, the verification fails, otherwise, the verification passes;
and if two verification modes are selected: there are several cases: { A, B }, { A, C }, { A, D }, { B, C }, { B, D }, and { C, D }, wherein if one or more items are 0, the verification fails, and otherwise, the verification passes;
if the verification is passed, the data stored in the storage module (4) can be accessed, the data which is not passed is regarded as illegally accessed data, and the data emergency processing module (7) is started;
e) the data emergency processing module (7) performs multi-stage data protection on the storage module (4), and the data analysis process is as follows: when the data emergency processing module (7) detects that the number of times F of illegal access is 1, primary protection is performed, specific code conversion is performed on data in the storage module (4), when F is 2, secondary protection is performed to generate a virtual database, information misleading is performed on the illegal access, when F is 2, tertiary protection is performed, the data in the storage module (4) is transmitted to the standby repository (8) and then is automatically formatted permanently, all data are cleared, the IP address of the illegal access is located, and the IP address is transmitted to a user terminal.
CN202110319836.8A 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet Active CN113079147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110319836.8A CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110319836.8A CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Publications (2)

Publication Number Publication Date
CN113079147A true CN113079147A (en) 2021-07-06
CN113079147B CN113079147B (en) 2022-12-02

Family

ID=76610748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110319836.8A Active CN113079147B (en) 2021-03-25 2021-03-25 Data monitoring system and method based on industrial internet

Country Status (1)

Country Link
CN (1) CN113079147B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10340254A (en) * 1997-04-11 1998-12-22 Hitachi Ltd Network system which can detect illegal use
JP2009169615A (en) * 2008-01-15 2009-07-30 Hitachi Computer Peripherals Co Ltd Data leakage prevention method and magnetic disk device to which same method is applied
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system
CN107483406A (en) * 2017-07-17 2017-12-15 北京捷通华声科技股份有限公司 A kind of method for authenticating user identity and equipment
CN108989466A (en) * 2018-08-30 2018-12-11 共享智能铸造产业创新中心有限公司 Industrial cloud platform management system
CN111080994A (en) * 2019-12-20 2020-04-28 成都华迈通信技术有限公司 Intelligent security system based on Internet of things
CN112462724A (en) * 2020-12-11 2021-03-09 四川川能智网实业有限公司 Data monitoring system based on industrial internet

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10340254A (en) * 1997-04-11 1998-12-22 Hitachi Ltd Network system which can detect illegal use
JP2009169615A (en) * 2008-01-15 2009-07-30 Hitachi Computer Peripherals Co Ltd Data leakage prevention method and magnetic disk device to which same method is applied
CN102148822A (en) * 2011-01-24 2011-08-10 辽宁国兴科技有限公司 Remote online data disaster-tolerant system
CN107483406A (en) * 2017-07-17 2017-12-15 北京捷通华声科技股份有限公司 A kind of method for authenticating user identity and equipment
CN108989466A (en) * 2018-08-30 2018-12-11 共享智能铸造产业创新中心有限公司 Industrial cloud platform management system
CN111080994A (en) * 2019-12-20 2020-04-28 成都华迈通信技术有限公司 Intelligent security system based on Internet of things
CN112462724A (en) * 2020-12-11 2021-03-09 四川川能智网实业有限公司 Data monitoring system based on industrial internet

Also Published As

Publication number Publication date
CN113079147B (en) 2022-12-02

Similar Documents

Publication Publication Date Title
CN105404860A (en) Method and device for managing information of lost person
CN108132957A (en) A kind of data base processing method and device
CN113051147A (en) Database cluster monitoring method, device, system and equipment
CN103237308B (en) Distributed intrusion detection method of vehicle ad hoc network
CN110813792A (en) Intelligent garbage recognition and classification method
CN112860676B (en) Data cleaning method applied to big data mining and business analysis and cloud server
CN116233902B (en) Wireless communication network anomaly identification system and method based on big data
CN110110752A (en) A kind of identification of rubbish and classification method, device and terminal device
CN104794013B (en) Alignment system running status, the method and device for establishing system running state model
CN115514784A (en) Multisource data acquisition middle platform based on Internet of things
CN117041269A (en) Real-time bidirectional synchronization system for synchronizing sub-database data
CN111930726A (en) Off-line form-based grade protection evaluation data acquisition and analysis method and system
CN113506096B (en) Inter-system interface method based on industrial internet identification analysis system
CN113079147B (en) Data monitoring system and method based on industrial internet
CN116383786B (en) Big data information supervision system and method based on Internet of things
CN110135196B (en) Data fusion tamper-proof method based on input data compression representation correlation analysis
CN116668105A (en) Attack path reasoning system combined with industrial control safety knowledge graph
CN117152808A (en) Public security multimedia security monitoring system and method
CN114722037B (en) Industrial Internet middleware data processing method, middleware and readable storage medium
CN115952211A (en) Data processing method and system based on artificial intelligence
CN113572792B (en) Engineering measurement intelligent management platform based on Internet of things
CN110113421A (en) A kind of big data information processing system based on Internet of Things
CN112835784B (en) Method for evaluating and optimizing interoperation capacity of complex giant system
CN114866546A (en) PaaS-based one-stop management system for monitoring platform
CN108229585A (en) The classifying method and system of a kind of daily record

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant