[go: up one dir, main page]

CN118827000A - Intelligent mining loading and transportation monitoring method and system - Google Patents

Intelligent mining loading and transportation monitoring method and system Download PDF

Info

Publication number
CN118827000A
CN118827000A CN202411303396.7A CN202411303396A CN118827000A CN 118827000 A CN118827000 A CN 118827000A CN 202411303396 A CN202411303396 A CN 202411303396A CN 118827000 A CN118827000 A CN 118827000A
Authority
CN
China
Prior art keywords
chaotic
sequence
node
preset
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411303396.7A
Other languages
Chinese (zh)
Other versions
CN118827000B (en
Inventor
王晓琴
吴东东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Fengqingheng Energy Technology Co ltd
Original Assignee
Shanxi Fengqingheng Energy Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Fengqingheng Energy Technology Co ltd filed Critical Shanxi Fengqingheng Energy Technology Co ltd
Priority to CN202411303396.7A priority Critical patent/CN118827000B/en
Publication of CN118827000A publication Critical patent/CN118827000A/en
Application granted granted Critical
Publication of CN118827000B publication Critical patent/CN118827000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)

Abstract

本发明属于安全监测技术领域,具体涉及基于智能化的矿山装车运输监测方法及系统,其方法包括:将关键监测数据的编码结果作为明文二值序列,根据第二混沌序列中第二混沌值的大小选择目标组合方式,在目标组合方式中获得前一个密文数据的组合字符,获得组合字符在霍夫曼树上对应的目标子节点,将目标子节点的父节点的另一个子节点作为起始节点,按照明文二值序列中明文二值数据的顺序和数值,在霍夫曼树上从起始节点开始进行游走,直到获得存在预设字符的终止节点,将终止节点对应的预设字符作为密文数据。本发明提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。

The present invention belongs to the field of safety monitoring technology, and specifically relates to a method and system for monitoring mine loading and transportation based on intelligence, wherein the method comprises: using the encoding result of key monitoring data as a plaintext binary sequence, selecting a target combination mode according to the size of a second chaotic value in a second chaotic sequence, obtaining a combination character of the previous ciphertext data in the target combination mode, obtaining a target child node corresponding to the combination character on a Huffman tree, using another child node of the parent node of the target child node as a starting node, and walking from the starting node on the Huffman tree according to the order and value of the plaintext binary data in the plaintext binary sequence until obtaining a termination node with a preset character, and using the preset character corresponding to the termination node as ciphertext data. The present invention improves the security of key monitoring data, thereby improving the security of the loading and transportation process.

Description

基于智能化的矿山装车运输监测方法及系统Intelligent mining loading and transportation monitoring method and system

技术领域Technical Field

本发明涉及安全监测技术领域。更具体地,本发明涉及基于智能化的矿山装车运输监测方法及系统。The present invention relates to the field of safety monitoring technology, and more specifically, to an intelligent mine loading and transportation monitoring method and system.

背景技术Background Art

煤矿智能化是煤炭工业高质量发展的核心技术支撑,将人工智能、工业物联网、云计算、大数据、机器人、智能装备等与现代煤炭开发利用深度融合,形成全面感知、实时互联、分析决策、自主学习、动态预测、协同控制的智能系统,实现煤矿开拓、采掘、运输、通风、洗选、安全保障、经营管理等过程的智能化运行,对于提升煤矿安全生产水平、保障煤炭稳定供应具有重要意义。Intelligent coal mines are the core technical support for the high-quality development of the coal industry. They deeply integrate artificial intelligence, industrial Internet of Things, cloud computing, big data, robots, intelligent equipment, etc. with modern coal development and utilization to form an intelligent system with comprehensive perception, real-time interconnection, analysis and decision-making, autonomous learning, dynamic prediction, and collaborative control. They can realize the intelligent operation of coal mine development, mining, transportation, ventilation, washing, safety assurance, and operation and management, which is of great significance to improving the safety production level of coal mines and ensuring a stable supply of coal.

其中,在矿山装车运输的过程中,通过载重和装载量数据、装卸时间数据、车辆位置数据、运行状态数据等关键监测数据,可以实现对矿山装车运输过程的全面监测和智能化管理,提高装车运输效率、降低成本,并确保装车运输过程的安全;而关键监测数据在传输过程中存在泄露的风险,影响装车运输过程的安全性。Among them, during the loading and transportation process of mines, through key monitoring data such as load and loading volume data, loading and unloading time data, vehicle location data, and operating status data, comprehensive monitoring and intelligent management of the loading and transportation process of mines can be achieved, thereby improving loading and transportation efficiency, reducing costs, and ensuring the safety of the loading and transportation process; however, there is a risk of leakage of key monitoring data during transmission, which affects the safety of the loading and transportation process.

相关技术中,例如申请公布号为CN115314259B的中国专利申请文件,其公开了矿山运输系统的安全控制方法、客户端、服务端及系统,通过客户端和服务端两侧相对应的两次加密解密,增加了通信数据传输的安全性。In the related technology, for example, the Chinese patent application document with application publication number CN115314259B discloses a safety control method, client, server and system for a mine transportation system, which increases the security of communication data transmission through two corresponding encryption and decryption on both the client and server sides.

但是现有加密方式通常是将固定长度的明文加密为固定长度的密文,具有较强的规律性,导致攻击者基于明文和密文之间的规律性,对现有加密方法采取统计分析攻击。However, existing encryption methods usually encrypt plaintext of a fixed length into ciphertext of a fixed length, which has a strong regularity. This causes attackers to conduct statistical analysis attacks on existing encryption methods based on the regularity between plaintext and ciphertext.

为了保证关键监测数据的安全性,亟需一种能够抵抗统计分析攻击的加密算法,以实现对关键监测数据的加密。In order to ensure the security of key monitoring data, an encryption algorithm that can resist statistical analysis attacks is urgently needed to encrypt key monitoring data.

发明内容Summary of the invention

为解决上述亟需一种能够抵抗统计分析攻击的加密算法,以实现对关键监测数据的加密的技术问题,本发明在如下的多个方面中提供方案。In order to solve the above-mentioned technical problem of urgently needing an encryption algorithm that can resist statistical analysis attacks to achieve encryption of key monitoring data, the present invention provides solutions in the following multiple aspects.

本发明提供了基于智能化的矿山装车运输监测方法,包括:将关键监测数据的编码结果作为明文二值序列;根据密钥和混沌映射函数,生成两个混沌序列,分别为第一混沌序列和第二混沌序列;根据第一混沌序列和预设字符,构建霍夫曼树;根据所述第二混沌序列和霍夫曼树,对所述明文二值序列进行加密,得到由多个密文数据组成的密文序列,所述加密的步骤,包括:获取所有预设字符的多种组合方式,其中,组合方式中包括多个组合,每个组合包含任意两个预设字符,组合中的两个预设字符互为组合字符,且多个组合之间的预设字符不重复;根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式;在目标组合方式中,获得前一个密文数据的组合字符;获得所述组合字符在霍夫曼树上对应的目标子节点;将目标子节点的父节点的另一个子节点作为起始节点;按照明文二值序列中明文二值数据的顺序和数值,在霍夫曼树上从起始节点开始进行游走,直到获得存在预设字符的终止节点;将终止节点对应的预设字符作为密文数据;将游走路径中包含的明文二值数据,从明文二值序列中删除。The present invention provides a mine loading and transportation monitoring method based on intelligence, comprising: using the encoding result of key monitoring data as a plaintext binary sequence; generating two chaotic sequences, namely a first chaotic sequence and a second chaotic sequence, according to a key and a chaotic mapping function; constructing a Huffman tree according to the first chaotic sequence and preset characters; encrypting the plaintext binary sequence according to the second chaotic sequence and the Huffman tree to obtain a ciphertext sequence composed of a plurality of ciphertext data, wherein the encryption step comprises: obtaining a plurality of combination modes of all preset characters, wherein the combination mode comprises a plurality of combinations, each combination comprises any two preset characters, and the two preset characters in the combination are combined characters of each other. character, and the preset characters between multiple combinations are not repeated; according to the size of the second chaotic value in the second chaotic sequence, a target combination method is selected from all the combination methods; in the target combination method, a combination character of the previous ciphertext data is obtained; a target child node corresponding to the combination character on the Huffman tree is obtained; another child node of the parent node of the target child node is used as a starting node; according to the order and value of the plaintext binary data in the plaintext binary sequence, a walk is started from the starting node on the Huffman tree until a termination node with a preset character is obtained; the preset character corresponding to the termination node is used as the ciphertext data; the plaintext binary data contained in the walk path is deleted from the plaintext binary sequence.

本发明在获得每个密文字符时,对应使用到的明文二值数据的数量不固定,相较于现有加密方法中将固定长度的明文加密为固定长度的密文,本发明的加密方法获得的密文序列的规律性较差,使得本发明的加密方法能够抵抗统计分析攻击,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性;When obtaining each ciphertext character, the number of plaintext binary data used is not fixed. Compared with the existing encryption method that encrypts a plaintext of a fixed length into a ciphertext of a fixed length, the encryption method of the present invention obtains a ciphertext sequence with poor regularity, so that the encryption method of the present invention can resist statistical analysis attacks, improve the security of key monitoring data, and further improve the security of the loading and transportation process;

进一步,本发明的加密方法中,获得的起始节点取决于每次加密时获得的目标组合方式和前一次加密时获得的密文数据,因此即使是相同的明文二值数据,也会由于起始节点不同,导致最终获得的密文数据也不同,因此,本发明的加密方法破坏了明文二值数据与密文数据之间的关联,增加了暴力破解的难度,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性;Furthermore, in the encryption method of the present invention, the starting node obtained depends on the target combination mode obtained in each encryption and the ciphertext data obtained in the previous encryption. Therefore, even if the plaintext binary data is the same, the ciphertext data finally obtained will be different due to the different starting nodes. Therefore, the encryption method of the present invention destroys the association between the plaintext binary data and the ciphertext data, increases the difficulty of brute force cracking, improves the security of key monitoring data, and further improves the security of the loading and transportation process;

进一步,本发明根据前一次加密时获得的密文数据,获得每次加密时的起始节点,因此,在对关键监测数据的加密结果即密文序列进行解码时,任何一个密文数据的解密错误产生的细微变化,都会引起密文序列的解密结果的不可区分性的改变,因此,根据本发明的加密方法获得的密文序列具有很强的雪崩效应,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。Furthermore, the present invention obtains the starting node for each encryption based on the ciphertext data obtained in the previous encryption. Therefore, when decoding the encryption result of the key monitoring data, that is, the ciphertext sequence, any slight change caused by a decryption error of the ciphertext data will cause a change in the indistinguishability of the decryption result of the ciphertext sequence. Therefore, the ciphertext sequence obtained according to the encryption method of the present invention has a strong avalanche effect, which improves the security of the key monitoring data and further improves the security of the loading and transportation process.

优选地,所述密钥是根据混沌映射系统的参数和初始条件生成的。Preferably, the key is generated according to parameters and initial conditions of the chaotic mapping system.

基于混沌映射函数的伪随机性、对初始条件的敏感性、非周期性和长期不可预测性的特点,本发明根据混沌映射系统的参数和初始条件生成密钥,使得本发明的加密算法具有更高的安全性。Based on the pseudo-randomness, sensitivity to initial conditions, non-periodicity and long-term unpredictability of the chaotic mapping function, the present invention generates a key according to the parameters and initial conditions of the chaotic mapping system, so that the encryption algorithm of the present invention has higher security.

优选地,所述根据第一混沌序列和预设字符,构建霍夫曼树,包括:将第一混沌序列中前R个第一混沌值的累加和,作为第一数值,R表示预设字符的数量;将第一混沌序列中第i个第一混沌值与第一数值的比值,作为第i个预设字符的预设频率,i取遍[1,R]范围内的所有整数;根据所有预设字符的预设频率,构建霍夫曼树。Preferably, the method of constructing a Huffman tree based on the first chaotic sequence and preset characters includes: taking the cumulative sum of the first R first chaotic values in the first chaotic sequence as the first numerical value, where R represents the number of preset characters; taking the ratio of the i-th first chaotic value in the first chaotic sequence to the first numerical value as the preset frequency of the i-th preset character, where i takes all integers in the range of [1,R]; and constructing a Huffman tree based on the preset frequencies of all preset characters.

优选地,所述根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式,包括:将所有预设字符的组合方式的数量,记为第一数量;将第二混沌序列中的第二混沌值与第一数量的乘积取整,记为第二数值S;将所有组合方式中的第S种组合方式,作为目标组合方式。Preferably, the method of selecting a target combination from all combinations based on the size of the second chaotic value in the second chaotic sequence includes: recording the number of combinations of all preset characters as a first number; rounding the product of the second chaotic value in the second chaotic sequence and the first number as a second numerical value S; and taking the Sth combination among all combinations as the target combination.

根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式,使得在每次加密时获得的起始节点不同,进而破坏明文二值数据与密文数据之间的关联性。According to the size of the second chaotic value in the second chaotic sequence, a target combination mode is selected from all the combination modes, so that the starting node obtained in each encryption is different, thereby destroying the correlation between the plaintext binary data and the ciphertext data.

优选地,所述加密的步骤还包括:重复所述加密的步骤,直至明文二值序列为空或者无法获得存在预设字符的终止节点时,停止迭代。Preferably, the encryption step further comprises: repeating the encryption step until the plaintext binary sequence is empty or a termination node with a preset character cannot be obtained, and then stopping the iteration.

优选地,所述方法还包括:在第一次加密时,将霍夫曼树上的根节点作为起始节点。Preferably, the method further comprises: during the first encryption, taking the root node on the Huffman tree as the starting node.

保证了本发明的加密方法的加密步骤完整性和可实施性。The integrity and feasibility of the encryption steps of the encryption method of the present invention are guaranteed.

优选地,所述方法还包括:当获得的起始节点是存在预设字符的节点时,将起始节点对应的预设字符,作为密文数据。Preferably, the method further comprises: when the obtained starting node is a node having a preset character, using the preset character corresponding to the starting node as ciphertext data.

优选地,所述方法还包括:将密文序列存储在服务器上;将预设字符和密钥存储在离线设备上,所述离线设备只有具有查阅权限的人员能够使用。Preferably, the method further comprises: storing the ciphertext sequence on a server; storing the preset characters and the key on an offline device, which can only be used by persons with access authority.

密钥是用于解密的关键,由于离线设备不易受到网络攻击或远程入侵的影响,将密钥存储在离线设备上可以提高安全性。The key is used for decryption. Storing the key on an offline device can improve security because the offline device is not vulnerable to network attacks or remote intrusions.

第二方面,本发明提供基于智能化的矿山装车运输监测系统,采用如下的技术方案:In the second aspect, the present invention provides an intelligent mine loading and transportation monitoring system, which adopts the following technical solutions:

基于智能化的矿山装车运输监测系统,包括:处理器和存储器,所述存储器存储有计算机程序指令,当所述计算机程序指令被所述处理器执行时实现上述基于智能化的矿山装车运输监测方法。The intelligent mining loading and transportation monitoring system comprises: a processor and a memory, wherein the memory stores computer program instructions, and when the computer program instructions are executed by the processor, the intelligent mining loading and transportation monitoring method is implemented.

通过采用上述技术方案,将上述的基于智能化的矿山装车运输监测方法生成计算机程序,并存储于存储器中,以被处理器加载并执行,从而根据存储器及处理器制作终端设备,方便使用。By adopting the above technical solution, the above intelligent mine loading and transportation monitoring method is generated into a computer program and stored in a memory to be loaded and executed by a processor, so that a terminal device is made according to the memory and the processor for easy use.

本发明的有益效果在于:The beneficial effects of the present invention are:

本发明的加密方法获得的密文序列的规律性较差,使得本发明的加密方法能够抵抗统计分析攻击,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性;The encryption method of the present invention has poor regularity in the ciphertext sequence, which enables the encryption method of the present invention to resist statistical analysis attacks, improve the security of key monitoring data, and further improve the security of the loading and transportation process;

进一步,本发明的加密方法破坏了明文二值数据与密文数据之间的关联,增加了暴力破解的难度,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性;Furthermore, the encryption method of the present invention destroys the association between plaintext binary data and ciphertext data, increases the difficulty of brute force cracking, improves the security of key monitoring data, and further improves the security of the loading and transportation process;

进一步,根据本发明的加密方法获得的密文序列具有很强的雪崩效应,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。Furthermore, the ciphertext sequence obtained by the encryption method according to the present invention has a strong avalanche effect, which improves the security of key monitoring data and further improves the security of the loading and transportation process.

进一步,本发明根据混沌映射系统的参数和初始条件生成密钥,并将密钥存储在离线设备上,使得本发明的加密算法具有更高的安全性。Furthermore, the present invention generates a key according to the parameters and initial conditions of the chaotic mapping system, and stores the key on an offline device, so that the encryption algorithm of the present invention has higher security.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

通过参考附图阅读下文的详细描述,本发明示例性实施方式的上述以及其他目的、特征和优点将变得易于理解。在附图中,以示例性而非限制性的方式示出了本发明的若干实施方式,并且相同或对应的标号表示相同或对应的部分,其中:By reading the following detailed description with reference to the accompanying drawings, the above and other objects, features and advantages of the exemplary embodiments of the present invention will become readily understood. In the accompanying drawings, several embodiments of the present invention are shown in an exemplary and non-limiting manner, and the same or corresponding reference numerals represent the same or corresponding parts, wherein:

图1是示意性示出本发明中基于智能化的矿山装车运输监测方法的流程图;FIG1 is a flow chart schematically showing an intelligent mine loading and transportation monitoring method according to the present invention;

图2是示意性示出本发明中根据第一混沌序列和所有预设字符,构建的霍夫曼树;FIG2 schematically shows a Huffman tree constructed according to the first chaotic sequence and all preset characters in the present invention;

图3是示意性示出第一次加密时的起始节点、二次加密时的起始节点和第三次加密时的起始节点。FIG3 schematically shows a starting node for the first encryption, a starting node for the second encryption, and a starting node for the third encryption.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work are within the scope of protection of the present invention.

下面结合附图来详细描述本发明的具体实施方式。The specific embodiments of the present invention are described in detail below with reference to the accompanying drawings.

本发明实施例公开基于智能化的矿山装车运输监测方法,参照图1,包括步骤S1-步骤S4:The embodiment of the present invention discloses an intelligent mine loading and transportation monitoring method, referring to FIG. 1 , comprising steps S1 to S4:

S1. 将关键监测数据的编码结果作为明文二值序列。S1. The encoding result of the key monitoring data is used as a plaintext binary sequence.

需要说明的是,关键监测数据在传输过程中存在泄露的风险,影响装车运输过程的安全性,因此,需要对关键监测数据进行加密,本发明将关键监测数据的编码结果作为明文二值序列。It should be noted that there is a risk of leakage of key monitoring data during transmission, which affects the safety of the loading and transportation process. Therefore, the key monitoring data needs to be encrypted. The present invention uses the encoding result of the key monitoring data as a plaintext binary sequence.

具体的,在矿山装车运输的过程中,通过车辆位置数据、运行状态数据、载重和装载量数据、装卸时间数据、燃料消耗数据、车辆健康状态数据、装载过程监控数据、环境关键监测数据等关键监测数据 ,可以实现对矿山装车运输过程的全面管理和智能化控制,提高运输效率、降低成本,并确保运输过程的安全。Specifically, during the mine loading and transportation process, through key monitoring data such as vehicle location data, operating status data, load and load data, loading and unloading time data, fuel consumption data, vehicle health status data, loading process monitoring data, and environmental key monitoring data, comprehensive management and intelligent control of the mine loading and transportation process can be achieved, thereby improving transportation efficiency, reducing costs, and ensuring the safety of the transportation process.

其中,车辆位置数据包括车辆的实时位置,运行状态数据包括车辆的实时速度、行驶方向以及是否在规定的路线上行驶,通过监测车辆位置数据和运行状态数据,以确保运输的安全和高效;Among them, the vehicle location data includes the real-time location of the vehicle, and the running status data includes the real-time speed, driving direction and whether the vehicle is driving on the prescribed route. By monitoring the vehicle location data and running status data, the safety and efficiency of transportation can be ensured;

通过监测车辆的载重和装载量数据,确保车辆不超载,并根据实际情况进行合理的装载,以提高运输效率和安全性;By monitoring the vehicle's load and loading data, ensure that the vehicle is not overloaded and load it reasonably according to the actual situation to improve transportation efficiency and safety;

通过监测车辆的装卸时间数据,以便进行运输计划的优化和工作流程的改进,提高装卸效率和运输效率;By monitoring the loading and unloading time data of vehicles, the transportation plan can be optimized and the work process can be improved to improve the loading and unloading efficiency and transportation efficiency;

通过监测车辆的燃料消耗数据,以便进行燃料成本控制和节能减排;By monitoring the vehicle's fuel consumption data, fuel cost control and energy conservation and emission reduction can be achieved;

车辆健康状态数据包括车辆的机械状态、发动机运行情况、润滑油温度、水温等参数,通过监测车辆的车辆健康状态数据,及时发现并处理车辆故障,以确保运输过程的顺利进行;The vehicle health status data includes the vehicle's mechanical status, engine operation, lubricating oil temperature, water temperature and other parameters. By monitoring the vehicle's health status data, vehicle failures can be discovered and handled in a timely manner to ensure the smooth progress of the transportation process;

装载过程监控数据包括装载速度、装载均匀度、装载器具的使用情况等,通过监测装载过程监控数据,以确保装载过程的安全和高效;The loading process monitoring data includes loading speed, loading uniformity, use of loading equipment, etc. The loading process monitoring data is monitored to ensure the safety and efficiency of the loading process;

环境关键监测数据包括运输路线周围的环境情况以及周围地形和道路状况,例如气候、温度、湿度、风力等因素,通过监测环境关键监测数据,以确保运输过程的安全性和适应性。Key environmental monitoring data include the environmental conditions around the transportation route and the surrounding terrain and road conditions, such as climate, temperature, humidity, wind and other factors. By monitoring key environmental monitoring data, the safety and adaptability of the transportation process can be ensured.

进一步,通过常规的编码方式对关键监测数据进行编码,将关键监测数据的编码结果作为明文二值序列;所述明文二值序列由多个明文二值数据组成。Furthermore, the key monitoring data is encoded by a conventional encoding method, and the encoding result of the key monitoring data is used as a plaintext binary sequence; the plaintext binary sequence is composed of a plurality of plaintext binary data.

所述常规的编码方式包括ASCII编码、Unicode编码、UTF-8编码等。The conventional encoding methods include ASCII encoding, Unicode encoding, UTF-8 encoding, etc.

S2. 根据密钥和混沌映射函数,生成两个混沌序列。S2. Generate two chaotic sequences according to the key and the chaotic mapping function.

需要说明的是,混沌映射函数具有伪随机性、对初始条件的敏感性、非周期性和长期不可预测性,常被作为密钥生成器。It should be noted that chaotic mapping functions are pseudo-random, sensitive to initial conditions, non-periodic and long-term unpredictable, and are often used as key generators.

具体的,根据混沌映射系统的参数和初始条件,生成两个密钥;根据其中一个密钥对混沌映射系统的函数进行多次迭代,每次迭代获得一个取值范围为[0,1]的第一混沌值,将所有第一混沌值组成的序列,作为第一混沌序列;根据另一个密钥对混沌映射系统的函数进行多次迭代,每次迭代获得一个取值范围为[0,1]的第二混沌值,将所有第二混沌值组成的序列,作为第二混沌序列。Specifically, two keys are generated according to the parameters and initial conditions of the chaotic mapping system; the function of the chaotic mapping system is iterated multiple times according to one of the keys, and a first chaotic value with a value range of [0,1] is obtained in each iteration, and a sequence composed of all the first chaotic values is used as a first chaotic sequence; the function of the chaotic mapping system is iterated multiple times according to the other key, and a second chaotic value with a value range of [0,1] is obtained in each iteration, and a sequence composed of all the second chaotic values is used as a second chaotic sequence.

所述混沌映射系统包括但不限于Logistic混沌映射系统、Sine混沌映射系统、Singer混沌映射系统、Circle混沌映射系统、Henon混沌映射系统。The chaotic mapping system includes but is not limited to a Logistic chaotic mapping system, a Sine chaotic mapping system, a Singer chaotic mapping system, a Circle chaotic mapping system, and a Henon chaotic mapping system.

S3. 根据第一混沌序列和预设字符,构建霍夫曼树。S3. Construct a Huffman tree according to the first chaotic sequence and the preset characters.

具体的,从所有字符中不重复地选取R个字符,作为预设字符,所述字符包括但不限于汉字、英文字母、数字。Specifically, R characters are selected from all characters without duplication as preset characters, and the characters include but are not limited to Chinese characters, English letters, and numbers.

其中,R表示预设字符的数量,R等于预设值,预设值为[10,200]范围内的双数,在本实施例中,预设值的取值为40。Wherein, R represents the number of preset characters, and R is equal to a preset value, which is an even number in the range of [10,200]. In this embodiment, the preset value is 40.

进一步,将第一混沌序列中前R个第一混沌值的累加和,作为第一数值;将第一混沌序列中第i个第一混沌值与第一数值的比值,作为第i个预设字符的预设频率;则第i个预设字符的预设频率满足表达式:Further, the cumulative sum of the first R first chaotic values in the first chaotic sequence is used as the first value; the ratio of the i-th first chaotic value in the first chaotic sequence to the first value is used as the preset frequency of the i-th preset character; then the preset frequency of the i-th preset character satisfies the expression:

式中,表示第i个预设字符的预设频率,i取遍[1,R]范围内的所有整数,分别表示第一混沌序列中第i个第一混沌值和第j个第一混沌值,R表示预设字符的数量,表示第一数值。In the formula, represents the preset frequency of the i-th preset character, i takes all integers in the range [1, R], , denote the i-th first chaotic value and the j-th first chaotic value in the first chaotic sequence, R denotes the number of preset characters, Indicates the first value.

进一步,根据所有预设字符的预设频率,构建霍夫曼树;在构建的霍夫曼树中,只有部分节点存在预设字符,其他节点不存在预设字符。Furthermore, a Huffman tree is constructed according to the preset frequencies of all preset characters; in the constructed Huffman tree, only some nodes have the preset characters, and other nodes do not have the preset characters.

示例性的,预设字符包括:a、b、c、d、m、n、x、y,预设字符的预设频率分别为:0.118、0.088、0.235、0.029、0.265、0.118、0.029、0.118、则根据所有预设字符的预设频率,构建的霍夫曼树如图2所示。Exemplarily, the preset characters include: a, b, c, d, m, n, x, y, and the preset frequencies of the preset characters are: 0.118, 0.088, 0.235, 0.029, 0.265, 0.118, 0.029, 0.118, respectively. According to the preset frequencies of all preset characters, the Huffman tree constructed is shown in Figure 2.

S4. 根据第二混沌序列和霍夫曼树,对明文二值序列进行加密,得到由多个密文数据组成的密文序列。S4. According to the second chaotic sequence and the Huffman tree, the plaintext binary sequence is encrypted to obtain a ciphertext sequence composed of multiple ciphertext data.

需要说明的是,现有加密方式通常是将固定长度的明文加密为固定长度的密文,具有较强的规律性,导致攻击者能够基于明文和密文之间的规律性,对现有加密方法采取统计分析攻击;为了保证关键监测数据的安全性,本发明提出一种能够抵抗统计分析攻击的加密算法,以实现对关键监测数据的加密。It should be noted that the existing encryption method usually encrypts plaintext of a fixed length into ciphertext of a fixed length, which has a strong regularity, resulting in attackers being able to carry out statistical analysis attacks on the existing encryption method based on the regularity between the plaintext and the ciphertext; in order to ensure the security of key monitoring data, the present invention proposes an encryption algorithm that can resist statistical analysis attacks to achieve encryption of key monitoring data.

具体的,根据所述第二混沌序列和霍夫曼树,对所述明文二值序列进行加密,得到由多个密文数据组成的密文序列,所述加密的步骤,包括:Specifically, according to the second chaotic sequence and the Huffman tree, the plaintext binary sequence is encrypted to obtain a ciphertext sequence composed of a plurality of ciphertext data, and the encryption step includes:

1、获取所有预设字符的多种组合方式,其中,组合方式中包括多个组合,每个组合包含任意两个预设字符,组合中的两个预设字符互为组合字符,且多个组合之间的预设字符不重复。1. Obtain multiple combinations of all preset characters, wherein the combination includes multiple combinations, each combination includes any two preset characters, the two preset characters in the combination are combined characters of each other, and the preset characters between multiple combinations are not repeated.

示例性的,将字符“x”、“y”、“m”、“n”作为预设数据时,共有3种组合方式,分别为{(x,y),(m,n)},{(x,m),(n,y)}和{(x,n),(m,y)};其中,在第1种组合方式{(x,y),(m,n)}中,(x,y)为一个组合,在该组合中,字符“x”和“y”互为组合字符,(m,n)}为一个组合,在该组合中,字符“m”和“n”互为组合字符;在第2种组合方式{(x,m),(n,y)}中,(x,m)为一个组合,在该组合中,字符“x”和“m”互为组合字符,(n,y)}为一个组合,在该组合中,字符“n”和“y”互为组合字符;在第3种组合方式{(x,n),(m,y)}中,(x,n)为一个组合,在该组合中,字符“x”和“n”互为组合字符,(m,y)}为一个组合,在该组合中,字符“m”和“y”互为组合字符。Exemplarily, when the characters "x", "y", "m", and "n" are used as preset data, there are three combinations, namely {(x,y), (m,n)}, {(x,m), (n,y)}, and {(x,n), (m,y)}; wherein, in the first combination {(x,y), (m,n)}, (x,y) is a combination, in which the characters "x" and "y" are combined characters, and {(m,n)} is a combination, in which the characters "m" and "n" are combined characters; In the second combination {(x,m),(n,y)}, (x,m) is a combination in which the characters "x" and "m" are combined characters, and (n,y)} is a combination in which the characters "n" and "y" are combined characters. In the third combination {(x,n),(m,y)}, (x,n) is a combination in which the characters "x" and "n" are combined characters, and (m,y)} is a combination in which the characters "m" and "y" are combined characters.

2、根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式,包括:将所有预设字符的组合方式的数量,记为第一数量;将第二混沌序列中的第二混沌值与第一数量的乘积取整,记为第二数值S;将所有组合方式中的第S种组合方式,作为目标组合方式。2. According to the size of the second chaotic value in the second chaotic sequence, a target combination method is selected from all combinations, including: recording the number of combinations of all preset characters as a first number; rounding the product of the second chaotic value in the second chaotic sequence and the first number as a second numerical value S; and selecting the Sth combination method among all combinations as the target combination method.

3、在目标组合方式中,获得前一个密文数据的组合字符。3. In the target combination mode, obtain the combination character of the previous ciphertext data.

示例性的,当目标组合方式为{(a,n),(b,c),(x,m),(d,y)},前一个密文数据为“b”时,在目标组合方式中,预设字符“b”的组合字符为预设字符“c”,因此,前一个密文数据的组合字符为预设字符“c”。Exemplarily, when the target combination method is {(a,n),(b,c),(x,m),(d,y)} and the previous ciphertext data is "b", in the target combination method, the combination character of the preset character "b" is the preset character "c", and therefore, the combination character of the previous ciphertext data is the preset character "c".

需要说明的是,本发明根据前一次加密时获得的密文数据,获得每次加密时的起始节点,因此,在对关键监测数据的加密结果即密文序列进行解码时,任何一个密文数据的解密错误产生的细微变化,都会引起密文序列的解密结果的不可区分性的改变,因此,根据本发明的加密方法获得的密文序列具有很强的雪崩效应,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。It should be noted that the present invention obtains the starting node for each encryption based on the ciphertext data obtained in the previous encryption. Therefore, when decoding the encryption result of the key monitoring data, that is, the ciphertext sequence, any slight change caused by a decryption error of the ciphertext data will cause a change in the indistinguishability of the decryption result of the ciphertext sequence. Therefore, the ciphertext sequence obtained according to the encryption method of the present invention has a strong avalanche effect, which improves the security of the key monitoring data and further improves the safety of the loading and transportation process.

4、获得所述组合字符在霍夫曼树上对应的目标子节点;将目标子节点的父节点的另一个子节点作为起始节点。4. Obtain the target child node corresponding to the combined character in the Huffman tree; and use another child node of the parent node of the target child node as the starting node.

需要特殊说明的是,在第一次加密时,将霍夫曼树上的根节点作为起始节点。It should be noted that during the first encryption, the root node on the Huffman tree is used as the starting node.

需要说明的是,本发明的加密方法中,获得的起始节点取决于每次加密时获得的目标组合方式和前一次加密时获得的密文数据,因此即使是相同的明文二值数据,也会由于起始节点不同,导致最终获得的密文数据也不同,因此,本发明的加密方法破坏了明文二值数据与密文数据之间的关联,增加了暴力破解的难度,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。It should be noted that in the encryption method of the present invention, the starting node obtained depends on the target combination method obtained each time the encryption is performed and the ciphertext data obtained in the previous encryption. Therefore, even if the plaintext binary data is the same, the ciphertext data finally obtained will be different due to the different starting nodes. Therefore, the encryption method of the present invention destroys the association between the plaintext binary data and the ciphertext data, increases the difficulty of brute force cracking, improves the security of key monitoring data, and thereby improves the security of the loading and transportation process.

5、按照明文二值序列中明文二值数据的顺序和数值,在霍夫曼树上从起始节点开始进行游走,直到获得存在预设字符的终止节点;将终止节点对应的预设字符作为密文数据。5. According to the order and value of the plaintext binary data in the plaintext binary sequence, walk from the starting node on the Huffman tree until a termination node with a preset character is obtained; the preset character corresponding to the termination node is used as the ciphertext data.

需要特殊说明的是,当获得的起始节点是存在预设字符的节点时,由于此时该起始节点下面不存在子树,因此,从该起始节点开始进行游走,获得存在预设字符的终止节点就是起始节点本身,且游走的路径长度为0,此时,将该起始节点对应的预设字符,作为本次加密获得的密文数据;It should be noted that when the starting node is a node with a preset character, since there is no subtree under the starting node at this time, the ending node with the preset character obtained by walking from the starting node is the starting node itself, and the walking path length is 0. At this time, the preset character corresponding to the starting node is used as the ciphertext data obtained by this encryption;

6、将游走路径中包含的明文二值数据,从明文二值序列中删除。6. Delete the plaintext binary data contained in the wandering path from the plaintext binary sequence.

7、重复所述加密的步骤,直至明文二值序列为空或者无法获得存在预设字符的终止节点时,停止迭代。7. Repeat the encryption steps until the plaintext binary sequence is empty or the termination node with the preset character cannot be obtained, and then stop the iteration.

需要说明的是,本发明在获得每个密文字符时,对应使用到的明文二值数据的数量不固定,相较于现有加密方法中将固定长度的明文加密为固定长度的密文,本发明的加密方法获得的密文序列的规律性较差,使得本发明的加密方法能够抵抗统计分析攻击,提高了关键监测数据的安全性,进而提高了装车运输过程的安全性。It should be noted that when obtaining each ciphertext character, the corresponding number of plaintext binary data used in the present invention is not fixed. Compared with the existing encryption method that encrypts a plaintext of a fixed length into a ciphertext of a fixed length, the encryption method of the present invention obtains a ciphertext sequence with poor regularity, which enables the encryption method of the present invention to resist statistical analysis attacks, improves the security of key monitoring data, and further improves the security of the loading and transportation process.

示例性的,当明文二值序列为{1,0,1,1,0,1,0,1,1,1,0,0,0,1,0,…}时,根据第二混沌序列和图2所示的霍夫曼树,对明文二值序列进行加密,具体过程如下:Exemplarily, when the plaintext binary sequence is {1,0,1,1,0,1,0,1,1,1,0,0,0,1,0,…}, the plaintext binary sequence is encrypted according to the second chaotic sequence and the Huffman tree shown in FIG2 , and the specific process is as follows:

(1)在进行第一次加密时,将霍夫曼树上的根节点作为起始节点,具体请参阅图3所示的“第一次加密时的起始节点”;在霍夫曼树上,按照明文二值序列中的明文二值数据,从起始节点开始进行游走,直到获得存在预设字符的终止节点,此时获得的终止节点对应的预设字符为“b”,此时的游走路径为明文二值序列中前4个明文二值数据组成的路径“1011”;将终止节点对应的预设字符“b”作为第1个密文数据;游走路径“1011”包含的明文二值数据从明文二值序列中删除,也即是将明文二值序列中的前4个明文二值数据删除,获得新的明文二值序列为{0,1,0,1,1,1,0,0,0,1,0,…};(1) When performing the first encryption, the root node on the Huffman tree is used as the starting node. For details, please refer to the “Starting Node for the First Encryption” shown in FIG. 3 . On the Huffman tree, according to the plaintext binary data in the plaintext binary sequence, walk from the starting node until a termination node with a preset character is obtained. At this time, the preset character corresponding to the termination node obtained is “b”. At this time, the walking path is the path “1011” composed of the first four plaintext binary data in the plaintext binary sequence. The preset character “b” corresponding to the termination node is used as the first ciphertext data. The plaintext binary data contained in the walking path “1011” is deleted from the plaintext binary sequence, that is, the first four plaintext binary data in the plaintext binary sequence are deleted, and the new plaintext binary sequence obtained is {0,1,0,1,1,1,0,0,0,1,0,…}.

(2)在进行第二次加密时,根据第二混沌序列中的第二混沌值的大小,从所有组合方式中选择的目标组合方式为{(a,n),(b,c),(x,m),(d,y)},前一个密文数据为预设字符“b”,在目标组合方式中,预设字符“b”的组合字符为预设字符“c”,因此,前一个密文数据的组合字符为预设字符“c”;获得组合字符在霍夫曼树上对应的目标子节点,将目标子节点的父节点的另一个子节点作为起始节点,具体请参阅图3所示的“第二次加密时的起始节点”;在霍夫曼树上,按照新的明文二值序列中的明文二值数据,从起始节点开始进行游走,直到获得存在预设字符的终止节点,此时获得的终止节点对应的预设字符为“a”,此时的游走路径为新的明文二值序列中第1个明文二值数据组成的路径“0”;将终止节点对应的预设字符“a”作为第2个密文数据;游走路径“0”包含的明文二值数据从新的明文二值序列中删除,也即是将新的明文二值序列中的第1个明文二值数据删除,获得新的明文二值序列为{1,0,1,1,1,0,0,0,1,0,…};(2) When performing the second encryption, according to the size of the second chaotic value in the second chaotic sequence, the target combination selected from all the combination methods is {(a,n),(b,c),(x,m),(d,y)}, the previous ciphertext data is the preset character "b", and in the target combination method, the combination character of the preset character "b" is the preset character "c", so the combination character of the previous ciphertext data is the preset character "c"; obtain the target child node corresponding to the combination character on the Huffman tree, and use another child node of the parent node of the target child node as the starting node. For details, please refer to the "Starting Node for Second Encryption" shown in Figure 3; in the Huffman tree According to the plaintext binary data in the new plaintext binary sequence, walk from the starting node until the termination node with the preset character is obtained. The preset character corresponding to the termination node is "a". The walking path is the path "0" composed of the first plaintext binary data in the new plaintext binary sequence. The preset character "a" corresponding to the termination node is used as the second ciphertext data. The plaintext binary data contained in the walking path "0" is deleted from the new plaintext binary sequence, that is, the first plaintext binary data in the new plaintext binary sequence is deleted, and the new plaintext binary sequence is {1,0,1,1,1,0,0,0,1,0,…}.

(3)在进行第三次加密时,根据第二混沌序列中的第二混沌值的大小,从所有组合方式中选择的目标组合方式为{(a,m),(d,c),(x,b),(n,y)},前一个密文数据为预设字符“a”,在目标组合方式中,预设字符“a”的组合字符为预设字符“m”,因此,前一个密文数据的组合字符为预设字符“m”;获得组合字符在霍夫曼树上对应的目标子节点,将目标子节点的父节点的另一个子节点作为起始节点,具体请参阅图3所示的“第三次加密时的起始节点”;在霍夫曼树上,按照新的明文二值序列中的明文二值数据,从起始节点开始进行游走,直到获得存在预设字符的终止节点,此时获得的终止节点对应的预设字符为“x”,此时的游走路径为新的明文二值序列中前3个明文二值数据组成的路径“101”;将终止节点对应的预设字符“x”作为第3个密文数据;游走路径“101”包含的明文二值数据从新的明文二值序列中删除,也即是将新的明文二值序列中的前3个明文二值数据删除,获得新的明文二值序列为{1,0,1,1,1,0,0,0,1,0,…};(3) When performing the third encryption, according to the size of the second chaotic value in the second chaotic sequence, the target combination selected from all the combination methods is {(a,m),(d,c),(x,b),(n,y)}, the previous ciphertext data is the preset character "a", and in the target combination method, the combination character of the preset character "a" is the preset character "m", so the combination character of the previous ciphertext data is the preset character "m"; obtain the target child node corresponding to the combination character on the Huffman tree, and use another child node of the parent node of the target child node as the starting node. For details, please refer to the "Starting Node for the Third Encryption" shown in Figure 3; on the Huffman tree, According to the plaintext binary data in the new plaintext binary sequence, walk from the starting node until the termination node with the preset character is obtained. The preset character corresponding to the termination node is "x". The walking path is the path "101" composed of the first three plaintext binary data in the new plaintext binary sequence. The preset character "x" corresponding to the termination node is used as the third ciphertext data. The plaintext binary data contained in the walking path "101" is deleted from the new plaintext binary sequence, that is, the first three plaintext binary data in the new plaintext binary sequence are deleted, and the new plaintext binary sequence is {1,0,1,1,1,0,0,0,1,0,…}.

(4)以此类推,直至明文二值序列为空或者无法获得存在预设字符的终止节点时,停止迭代。(4) The iteration is terminated in this way until the plaintext binary sequence is empty or the termination node with the preset character cannot be obtained.

进一步,密文序列为乘务数据的加密结果,对密文序列进行存储,所述密文序列存储在服务器上;将获取的预设字符和密钥存储在离线设备上,例如U盘、磁盘、固态硬盘等,为了保证乘务数据的安全性,只有具有查阅权限的人员能够使用存储了预设字符和密钥的离线设备,通过将存储了预设字符和密钥的离线设备与存储了密文序列的服务器进行连接,通过预设字符和密钥对密文序列进行解密,获得乘务数据。Furthermore, the ciphertext sequence is the encryption result of the crew data, and the ciphertext sequence is stored, and the ciphertext sequence is stored on the server; the obtained preset characters and keys are stored on an offline device, such as a USB flash drive, a disk, a solid-state drive, etc. In order to ensure the security of the crew data, only personnel with access authority can use the offline device storing the preset characters and keys, and the crew data is obtained by connecting the offline device storing the preset characters and keys with the server storing the ciphertext sequence, and decrypting the ciphertext sequence using the preset characters and keys.

所述解密过程为:根据密钥和混沌映射函数,生成两个混沌序列;根据第一混沌序列和所有预设字符,构建霍夫曼树;在根据第二混沌序列和霍夫曼树,对密文序列中每个密文数据进行解密的过程中,根据第二混沌序列,确定对该密文数据解密时所有预设字符的组合方式;在所述组合方式中,获得前一个密文数据的组合字符;将所述组合字符所在节点的父节点的另一个子节点,作为起始节点;在霍夫曼树上,获取从起始节点开始进行游走,直到游走至该密文数据对应的节点时的路径,将获得的路径对应的二进制数据加入到明文二值序列中;对下一个密文数据进行解密,直到获得所有密文数据的解密结果,此时,通过编码方式对明文二值序列进行解码,获得的解码结果为乘务数据。The decryption process is as follows: two chaotic sequences are generated according to a key and a chaotic mapping function; a Huffman tree is constructed according to the first chaotic sequence and all preset characters; in the process of decrypting each ciphertext data in the ciphertext sequence according to the second chaotic sequence and the Huffman tree, a combination method of all preset characters when decrypting the ciphertext data is determined according to the second chaotic sequence; in the combination method, a combination character of the previous ciphertext data is obtained; another child node of the parent node of the node where the combination character is located is used as the starting node; on the Huffman tree, a path is obtained starting from the starting node until the node corresponding to the ciphertext data is reached, and the binary data corresponding to the obtained path is added to the plaintext binary sequence; the next ciphertext data is decrypted until the decryption results of all ciphertext data are obtained, at which time, the plaintext binary sequence is decoded by encoding, and the decoding result obtained is the passenger data.

需要特殊说明的是,在对第一个密文数据进行解密时,将霍夫曼树上的根节点作为起始节点。It should be noted that when decrypting the first ciphertext data, the root node on the Huffman tree is used as the starting node.

需要说明的是,本发明根据混沌映射系统的参数和初始条件生成密钥,并将密钥存储在离线设备上,使得本发明的加密算法具有更高的安全性。It should be noted that the present invention generates a key according to the parameters and initial conditions of the chaotic mapping system, and stores the key on an offline device, so that the encryption algorithm of the present invention has higher security.

本发明实施例还公开基于智能化的矿山装车运输监测系统,包括处理器和存储器,存储器存储有计算机程序指令,当计算机程序指令被处理器执行时实现根据本发明的基于智能化的矿山装车运输监测方法。The embodiment of the present invention also discloses an intelligent mine loading and transportation monitoring system, including a processor and a memory, wherein the memory stores computer program instructions, and when the computer program instructions are executed by the processor, the intelligent mine loading and transportation monitoring method according to the present invention is implemented.

上述系统还包括通信总线和通信接口等本领域技术人员熟知的其他组件,其设置和功能为本领域中已知,因此在此不再赘述。The above system also includes other components well known to those skilled in the art, such as a communication bus and a communication interface, and their configuration and functions are known in the art, so they will not be described in detail here.

在本说明书的描述中,“多个”、“若干个”的含义是至少两个,例如两个,三个或更多个等,除非另有明确具体的限定。In the description of this specification, "plurality" or "several" means at least two, such as two, three or more, etc., unless otherwise clearly and specifically defined.

虽然本说明书已经示出和描述了本发明的多个实施例,但对于本领域技术人员显而易见的是,这样的实施例只是以示例的方式提供的。本领域技术人员会在不偏离本发明思想和精神的情况下想到许多更改、改变和替代的方式。应当理解的是在实践本发明的过程中,可以采用对本文所描述的本发明实施例的各替代方案。Although this specification has shown and described a number of embodiments of the present invention, it will be apparent to those skilled in the art that such embodiments are provided by way of example only. Those skilled in the art will conceive of many modifications, changes and alternatives without departing from the ideas and spirit of the present invention. It should be understood that in the practice of the present invention, alternatives to the embodiments of the present invention described herein may be employed.

Claims (9)

1.基于智能化的矿山装车运输监测方法,其特征在于,包括:1. A method for monitoring mine loading and transportation based on intelligence, characterized by comprising: 将关键监测数据的编码结果作为明文二值序列;The encoding result of the key monitoring data is used as a plain text binary sequence; 根据密钥和混沌映射函数,生成两个混沌序列,分别为第一混沌序列和第二混沌序列;根据第一混沌序列和预设字符,构建霍夫曼树;According to the key and the chaotic mapping function, two chaotic sequences are generated, namely a first chaotic sequence and a second chaotic sequence; according to the first chaotic sequence and the preset characters, a Huffman tree is constructed; 根据所述第二混沌序列和霍夫曼树,对所述明文二值序列进行加密,得到由多个密文数据组成的密文序列,所述加密的步骤,包括:According to the second chaotic sequence and the Huffman tree, the plaintext binary sequence is encrypted to obtain a ciphertext sequence consisting of a plurality of ciphertext data, wherein the encryption step comprises: 获取所有预设字符的多种组合方式,其中,组合方式中包括多个组合,每个组合包含任意两个预设字符,组合中的两个预设字符互为组合字符,且多个组合之间的预设字符不重复;根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式;在目标组合方式中,获得前一个密文数据的组合字符;获得所述组合字符在霍夫曼树上对应的目标子节点;将目标子节点的父节点的另一个子节点作为起始节点;按照明文二值序列中明文二值数据的顺序和数值,在霍夫曼树上从起始节点开始进行游走,直到获得存在预设字符的终止节点;将终止节点对应的预设字符作为密文数据;将游走路径中包含的明文二值数据,从明文二值序列中删除。A plurality of combinations of all preset characters are obtained, wherein the combination includes a plurality of combinations, each combination includes any two preset characters, the two preset characters in the combination are combined characters of each other, and the preset characters between the plurality of combinations are not repeated; a target combination is selected from all the combinations according to the size of the second chaotic value in the second chaotic sequence; in the target combination, a combined character of the previous ciphertext data is obtained; a target child node corresponding to the combined character on the Huffman tree is obtained; another child node of the parent node of the target child node is used as a starting node; according to the order and value of the plaintext binary data in the plaintext binary sequence, a walk is started from the starting node on the Huffman tree until a termination node with the preset character is obtained; the preset character corresponding to the termination node is used as the ciphertext data; and the plaintext binary data contained in the walk path is deleted from the plaintext binary sequence. 2.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述密钥是根据混沌映射系统的参数和初始条件生成的。2. According to the intelligent mine loading and transportation monitoring method described in claim 1, it is characterized in that the key is generated based on the parameters and initial conditions of the chaotic mapping system. 3.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述根据第一混沌序列和预设字符,构建霍夫曼树,包括:3. The intelligent mine loading and transportation monitoring method according to claim 1 is characterized in that the Huffman tree is constructed according to the first chaotic sequence and the preset characters, comprising: 将第一混沌序列中前R个第一混沌值的累加和,作为第一数值,R表示预设字符的数量;The cumulative sum of the first R first chaotic values in the first chaotic sequence is used as the first value, where R represents the number of preset characters; 将第一混沌序列中第i个第一混沌值与第一数值的比值,作为第i个预设字符的预设频率,i取遍[1,R]范围内的所有整数;The ratio of the i-th first chaotic value to the first value in the first chaotic sequence is used as the preset frequency of the i-th preset character, where i takes all integers in the range of [1, R]; 根据所有预设字符的预设频率,构建霍夫曼树。Construct a Huffman tree based on the preset frequencies of all preset characters. 4.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述根据第二混沌序列中第二混沌值的大小,从所有组合方式中选择目标组合方式,包括:4. The intelligent mine loading and transportation monitoring method according to claim 1 is characterized in that the target combination mode is selected from all combination modes according to the size of the second chaotic value in the second chaotic sequence, including: 将所有预设字符的组合方式的数量,记为第一数量;Record the number of combinations of all preset characters as the first number; 将第二混沌序列中的第二混沌值与第一数量的乘积取整,记为第二数值S;The product of the second chaotic value in the second chaotic sequence and the first number is rounded to an integer, which is recorded as a second value S; 将所有组合方式中的第S种组合方式,作为目标组合方式。The Sth combination among all the combinations is taken as the target combination. 5.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述加密的步骤还包括:5. The intelligent mine loading and transportation monitoring method according to claim 1 is characterized in that the encryption step further comprises: 重复所述加密的步骤,直至明文二值序列为空或者无法获得存在预设字符的终止节点时,停止迭代。The encryption steps are repeated until the plaintext binary sequence is empty or a termination node with a preset character cannot be obtained, and the iteration is stopped. 6.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述方法还包括:6. The intelligent mine loading and transportation monitoring method according to claim 1, characterized in that the method further comprises: 在第一次加密时,将霍夫曼树上的根节点作为起始节点。During the first encryption, the root node on the Huffman tree is used as the starting node. 7.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述方法还包括:7. The intelligent mine loading and transportation monitoring method according to claim 1, characterized in that the method further comprises: 当获得的起始节点是存在预设字符的节点时,将起始节点对应的预设字符,作为密文数据。When the obtained starting node is a node having a preset character, the preset character corresponding to the starting node is used as ciphertext data. 8.根据权利要求1所述的基于智能化的矿山装车运输监测方法,其特征在于,所述方法还包括:8. The intelligent mine loading and transportation monitoring method according to claim 1, characterized in that the method further comprises: 将密文序列存储在服务器上;The ciphertext sequence is stored on the server; 将预设字符和密钥存储在离线设备上,所述离线设备只有具有查阅权限的人员能够使用。The preset characters and the key are stored on an offline device, which can only be used by personnel with access authority. 9.基于智能化的矿山装车运输监测系统,其特征在于,包括:处理器和存储器,所述存储器存储有计算机程序指令,当所述计算机程序指令被所述处理器执行时实现根据权利要求1-8任一项所述的基于智能化的矿山装车运输监测方法。9. An intelligent mine loading and transportation monitoring system, characterized in that it includes: a processor and a memory, wherein the memory stores computer program instructions, and when the computer program instructions are executed by the processor, the intelligent mine loading and transportation monitoring method according to any one of claims 1 to 8 is implemented.
CN202411303396.7A 2024-09-19 2024-09-19 Mine loading transportation monitoring method and system based on intellectualization Active CN118827000B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411303396.7A CN118827000B (en) 2024-09-19 2024-09-19 Mine loading transportation monitoring method and system based on intellectualization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411303396.7A CN118827000B (en) 2024-09-19 2024-09-19 Mine loading transportation monitoring method and system based on intellectualization

Publications (2)

Publication Number Publication Date
CN118827000A true CN118827000A (en) 2024-10-22
CN118827000B CN118827000B (en) 2024-11-15

Family

ID=93070921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411303396.7A Active CN118827000B (en) 2024-09-19 2024-09-19 Mine loading transportation monitoring method and system based on intellectualization

Country Status (1)

Country Link
CN (1) CN118827000B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120568314A (en) * 2025-05-20 2025-08-29 广东九安智能科技股份有限公司 Safety protection method and system for equipment log information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098024A1 (en) * 2005-05-20 2008-04-24 Fujitsu Limited Information retrieval apparatus, information retrieval method and computer product
CN116367150A (en) * 2023-04-18 2023-06-30 吉林省优乐网络科技有限公司 Data encryption transmission method
CN116471007A (en) * 2023-06-20 2023-07-21 北京双鑫汇在线科技有限公司 Network information encryption transmission method based on cloud platform
CN117938386A (en) * 2024-03-21 2024-04-26 西安尚诺西饼有限公司 Self-picking cabinet taking and delivering method
CN118646532A (en) * 2024-08-15 2024-09-13 武汉泰铭恒创信息技术股份有限公司 A visitor management method and system for community access control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098024A1 (en) * 2005-05-20 2008-04-24 Fujitsu Limited Information retrieval apparatus, information retrieval method and computer product
CN116367150A (en) * 2023-04-18 2023-06-30 吉林省优乐网络科技有限公司 Data encryption transmission method
CN116471007A (en) * 2023-06-20 2023-07-21 北京双鑫汇在线科技有限公司 Network information encryption transmission method based on cloud platform
CN117938386A (en) * 2024-03-21 2024-04-26 西安尚诺西饼有限公司 Self-picking cabinet taking and delivering method
CN118646532A (en) * 2024-08-15 2024-09-13 武汉泰铭恒创信息技术股份有限公司 A visitor management method and system for community access control

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HOUCEMEDDINE HERMASSI ET AL.: "Joint compression and encryption using chaotically mutated Huffman trees", COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, vol. 15, no. 10, 31 October 2010 (2010-10-31) *
MUHAMMAD USAMA ET AL.: "An efficient secure data compression technique based on chaos and adaptive Huffman coding", PEER-TO-PEER NETWORKING AND APPLICATIONS, vol. 14, 19 October 2020 (2020-10-19), XP037542513, DOI: 10.1007/s12083-020-00981-8 *
ZHI-LIANG ZHU ET AL.: "A chaos-based joint compression and encryption scheme using mutated adaptive Huffman Tree", 2012 FIFTH INTERNATIONAL WORKSHOP ON CHAOS-FRACTALS THEORIES AND APPLICATIONS, 20 December 2012 (2012-12-20) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120568314A (en) * 2025-05-20 2025-08-29 广东九安智能科技股份有限公司 Safety protection method and system for equipment log information

Also Published As

Publication number Publication date
CN118827000B (en) 2024-11-15

Similar Documents

Publication Publication Date Title
Apon et al. Verifiable oblivious storage
Yu et al. Toward data security in edge intelligent IIoT
EP4147174A1 (en) Distributed architecture for explainable ai models
Zhang et al. Projective ranking: A transferable evasion attack method on graph neural networks
CN115603934B (en) Multi-user searchable encryption method and device based on blockchain
CN103119594A (en) Searchable encryption processing system
CN113922956A (en) IoT data interaction method, system, device and medium based on quantum key
CN112394974A (en) Code change comment generation method and device, electronic equipment and storage medium
US8000472B2 (en) Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium
CN118827000A (en) Intelligent mining loading and transportation monitoring method and system
CN118568741B (en) A data storage security management method and system based on cloud computing
CN118690396A (en) A data storage method and system based on blockchain
CN111680316A (en) Information security sharing method for multiple business entities in the power industry
CN118646532A (en) A visitor management method and system for community access control
Zhou et al. Two-tier data packing in rlwe-based homomorphic encryption for secure federated learning
Bai et al. Using Homomorphic Proxy re‐Encryption to Enhance Security and Privacy of Federated Learning‐Based Intelligent Connected Vehicles
CN117938355B (en) A joint prediction method, medium and device based on blockchain
CN118764165A (en) A method, device, equipment and storage medium for encryption protection of big data transmission
CN112580114A (en) Information processing method, device, equipment and storage medium
Kong et al. A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process
CN116846535A (en) Universal privacy computing method, device, equipment and medium based on homomorphic encryption
CN109412754A (en) A kind of data storage, distribution and access method encoding cloud
CN120387179B (en) Space-time big data distributed privacy computing system and equipment based on homomorphic encryption
CN117932696B (en) A data distributed storage verification method, medium and device based on blockchain
He et al. [Retracted] E‐Commerce Data Access Control and Encrypted Storage Based on Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant