[go: up one dir, main page]

CN119865381B - An information transmission method and system based on engineering supervision platform - Google Patents

An information transmission method and system based on engineering supervision platform Download PDF

Info

Publication number
CN119865381B
CN119865381B CN202510343703.2A CN202510343703A CN119865381B CN 119865381 B CN119865381 B CN 119865381B CN 202510343703 A CN202510343703 A CN 202510343703A CN 119865381 B CN119865381 B CN 119865381B
Authority
CN
China
Prior art keywords
node
data
key
strategy
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510343703.2A
Other languages
Chinese (zh)
Other versions
CN119865381A (en
Inventor
张湘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Nuoshicheng International Engineering Project Management Co ltd
Original Assignee
Beijing Nuoshicheng International Engineering Project Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Nuoshicheng International Engineering Project Management Co ltd filed Critical Beijing Nuoshicheng International Engineering Project Management Co ltd
Priority to CN202510343703.2A priority Critical patent/CN119865381B/en
Publication of CN119865381A publication Critical patent/CN119865381A/en
Application granted granted Critical
Publication of CN119865381B publication Critical patent/CN119865381B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1034Reaction to server failures by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Power Engineering (AREA)
  • Technology Law (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of information transmission of engineering supervision platforms, and discloses an information transmission method and system based on the engineering supervision platforms, wherein the method comprises the steps of obtaining construction data uploaded by site supervision personnel, executing a classified compression preprocessing strategy, and carrying out classified compression and robust coding on the construction data; the method comprises the steps of executing a double-layer encryption strategy according to an execution key and construction data, generating a digital signature, encrypting the construction data, the execution key and the digital signature, sending the encrypted construction data, the execution key and the digital signature to project management staff through a network transmission path, executing a fault monitoring strategy for each node in the network transmission path, judging whether the node is faulty or not, executing a multi-layer redundancy backup strategy if the faulty node is monitored, replacing the faulty node by the backup node, executing a grading treatment strategy for abnormal network behaviors, maintaining the safety of the network transmission path, and improving the efficiency and the safety of data transmission.

Description

一种基于工程监理平台的信息传输方法及系统An information transmission method and system based on engineering supervision platform

技术领域Technical Field

本发明涉及工程监理平台信息传输技术领域,具体为一种基于工程监理平台的信息传输方法及系统。The present invention relates to the technical field of information transmission of an engineering supervision platform, and in particular to an information transmission method and system based on an engineering supervision platform.

背景技术Background Art

在现代工程监理项目中,信息传输已成为必不可少的一部分,尤其是在大型工程项目中,实时传输的大量数据涉及到项目进度、质量控制、成本管理和安全管理等多个方面,因此保证信息传输的安全性至关重要。目前常见的做法是在网络层面使用防火墙和入侵检测系统来防止外部攻击,在传输过程中使用SSL/TLS协议进行加解密通信,以保障信息的机密性和完整性。In modern engineering supervision projects, information transmission has become an indispensable part, especially in large-scale engineering projects. The large amount of data transmitted in real time involves many aspects such as project progress, quality control, cost management and safety management. Therefore, it is very important to ensure the security of information transmission. At present, the common practice is to use firewalls and intrusion detection systems at the network level to prevent external attacks, and use SSL/TLS protocols for encryption and decryption communication during the transmission process to ensure the confidentiality and integrity of information.

传统的SSL/TLS加密机制在网络拥堵情况下可能会导致延迟增加,影响信息传输的效率;此外,面对日益复杂的网络攻击手段,仅依靠这些通用的加密技术难以完全避免信息泄露的风险。Traditional SSL/TLS encryption mechanisms may cause increased delays in network congestion, affecting the efficiency of information transmission; in addition, in the face of increasingly sophisticated network attack methods, it is difficult to completely avoid the risk of information leakage by relying solely on these general encryption technologies.

本方案提出一种基于工程监理平台的信息传输方法及系统,实现数据传输的优化策略,不仅能够提升工程监理工作的质量和效率,还能为整个工程项目的成功实施提供强有力的技术保障。This scheme proposes an information transmission method and system based on the engineering supervision platform to implement an optimization strategy for data transmission, which can not only improve the quality and efficiency of engineering supervision work, but also provide strong technical support for the successful implementation of the entire engineering project.

发明内容Summary of the invention

本发明提供了一种基于工程监理平台的信息传输方法及系统,促进解决了上述背景技术中所提到的问题。The present invention provides an information transmission method and system based on an engineering supervision platform, which promotes solving the problems mentioned in the above background technology.

第一方面,本申请提供一种基于工程监理平台的信息传输方法,采用如下技术方案:一种基于工程监理平台的信息传输方法,包括:现场监理人员通过工程监理平台将施工数据发送给项目管理人员,工程监理平台生成现场监理人员和项目管理人员之间的会话;In a first aspect, the present application provides an information transmission method based on an engineering supervision platform, which adopts the following technical scheme: an information transmission method based on an engineering supervision platform, comprising: a field supervisor sends construction data to a project manager via the engineering supervision platform, and the engineering supervision platform generates a conversation between the field supervisor and the project manager;

通过生成会话,系统能够有效管理数据传输的上下文和身份验证流程,确保数据传输的唯一性和完整性。会话记录可以追溯历史操作,为后续的管理和责任划分提供依据。同时,通过会话管理可以实时检测和处理会话异常,提升数据传输的稳定性和安全性。By generating sessions, the system can effectively manage the context and authentication process of data transmission, ensuring the uniqueness and integrity of data transmission. Session records can trace historical operations and provide a basis for subsequent management and division of responsibilities. At the same time, session management can detect and handle session anomalies in real time, improving the stability and security of data transmission.

在会话的过程中:During the session:

获取工程监理平台传输网络当前的带宽和丢包率Get the current bandwidth of the engineering supervision platform transmission network and packet loss rate ;

根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度;Execute adaptive traffic control strategy according to bandwidth and packet loss rate to adjust the encryption strength of construction data;

获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码;Obtain the construction data uploaded by the on-site supervisor, implement the classification compression preprocessing strategy, and classify, compress and robustly encode the construction data;

设定主密钥和会话密钥;Set the master key and session key;

根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥;According to the master key and the session key, execute the key update strategy to update the master key and the session key;

获取本次会话的会话密钥,记为执行密钥;Get the session key for this session, recorded as the execution key;

根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密;According to the execution key and construction data, a double-layer encryption strategy is implemented to generate a digital signature, and the construction data, execution key and digital signature are encrypted;

获取本次会话的网络传输路径,所述网络传输路径由多个节点组成;Obtaining a network transmission path for this session, where the network transmission path consists of multiple nodes;

将加密后的施工数据、执行密钥和数字签名通过网络传输路径发送给项目管理人员;Send the encrypted construction data, execution key and digital signature to the project manager via the network transmission path;

对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障;Execute the fault monitoring strategy for each node in the network transmission path to determine whether the node is faulty;

若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点;If a faulty node is detected, a multi-level redundant backup strategy is implemented to replace the faulty node with a backup node.

对网络传输路径中的每个节点使用AI智能检测异常网络行为;Use AI to intelligently detect abnormal network behavior at each node in the network transmission path;

对异常网络行为执行分级处置策略,维护网络传输路径的安全;Implement hierarchical disposal strategies for abnormal network behaviors to maintain the security of network transmission paths;

将本次会话使用区块链日志进行记录。This session is recorded using blockchain logs.

优选的,所述根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度,包括:Preferably, the adaptive flow control strategy is executed according to the bandwidth and the packet loss rate to adjust the encryption strength of the construction data, including:

设定带宽权重因子Setting bandwidth weight factor ;

设定丢包率权重因子Set the packet loss rate weight factor ;

获取工程监理平台传输数据的最大带宽Get the maximum bandwidth of the engineering supervision platform to transmit data ;

执行下列公式,计算加密强度Execute the following formula to calculate the encryption strength ;

,其中, ,in, , , .

通过监测网络带宽和丢包率,系统能够动态优化加密强度,从而在保障安全性的同时提升传输效率。低带宽时降低加密强度,可以节约传输资源;而在高带宽条件下提高加密强度,则能增强数据安全性,满足不同环境下的需求。By monitoring network bandwidth and packet loss rate, the system can dynamically optimize encryption strength, thereby improving transmission efficiency while ensuring security. Reducing encryption strength under low bandwidth can save transmission resources; while increasing encryption strength under high bandwidth conditions can enhance data security and meet the needs of different environments.

优选的,所述获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码,包括:Preferably, the step of obtaining the construction data uploaded by the on-site supervisor, executing a classification compression preprocessing strategy, and classifying, compressing and robustly encoding the construction data includes:

所述施工数据被分为项目进度、质量控制、成本管理和安全管理类别;Said construction data is divided into the categories of project schedule, quality control, cost management and safety management;

针对任意类别的施工数据,获取工程监理平台为该类别施工数据匹配的压缩算法,获取该压缩算法的压缩率For any type of construction data, obtain the compression algorithm that the engineering supervision platform matches for this type of construction data, and obtain the compression rate of the compression algorithm ;

获取施工数据的文件Get the file of construction data ;

执行分类压缩预处理策略,将施工数据压缩到Execute the classification compression preprocessing strategy to compress the construction data into ;

鲁棒编码:Robust Coding:

获取标准的校验矩阵H;Obtain a standard check matrix H;

使用高斯消元法将校验矩阵H进行分解,得到第一矩阵P;Use Gaussian elimination method to decompose the check matrix H to obtain the first matrix P;

,其中,为第一矩阵的转置,的单位矩阵; ,in, The first matrix The transpose of for The identity matrix of

计算生成矩阵,其中,的单位矩阵;Calculate the generated matrix ,in, for The identity matrix of

计算鲁棒编码后的码字Calculate the codeword after robust coding .

通过对施工数据分类压缩,可以针对不同类型数据采用最优的压缩算法,提高压缩率和数据传输效率。同时,分类压缩能够降低系统的存储需求和传输带宽负载,提升平台整体性能和资源利用率。By classifying and compressing construction data, the optimal compression algorithm can be used for different types of data to improve the compression rate and data transmission efficiency. At the same time, classification compression can reduce the system's storage requirements and transmission bandwidth load, and improve the overall performance and resource utilization of the platform.

优选的,所述根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥,包括:Preferably, executing a key update strategy according to the master key and the session key to update the master key and the session key includes:

当现场监理人员每次向工程监理平台上传施工数据时,根据当前的主密钥生成本次会话的会话密钥,具体为:Every time the on-site supervisor uploads construction data to the engineering supervision platform, the session key for this session is generated based on the current master key, specifically:

获取现场监理人员本次上传施工数据到工程监理平台时对应的会话Get the corresponding session when the on-site supervisor uploads the construction data to the engineering supervision platform ;

获取当前的主密钥Get the current master key ;

使用算法计算本次会话的会话密钥use The algorithm calculates the session key for this session ;

设定主密钥更新间隔Set the master key update interval ;

获取最后一次更新主密钥的时刻Get the time when the master key was last updated ;

时刻更新主密钥,使用算法得到更新后的主密钥exist Always update the master key, using The algorithm obtains the updated master key .

通过设定主密钥和会话密钥并动态更新,可以防止密钥长期使用导致的安全风险。密钥更新策略确保每次会话都有独立的密钥,减少密钥被破解或泄露的可能性,进一步提升系统的安全性。By setting the master key and session key and updating them dynamically, you can prevent security risks caused by long-term use of keys. The key update strategy ensures that each session has an independent key, reducing the possibility of key cracking or leakage, and further improving the security of the system.

优选的,所述根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密,包括:Preferably, the double-layer encryption strategy is executed according to the execution key and the construction data to generate a digital signature, and the construction data, the execution key and the digital signature are encrypted, including:

获取鲁棒编码后得到的码字;Obtain the codeword obtained after robust coding;

获取现场监理人员的私钥,使用私钥对码字进行非对称加密,得到数字签名;Obtain the private key of the on-site supervisor, use the private key to asymmetrically encrypt the codeword, and obtain a digital signature;

使用执行密钥对码字进行对称加密;Symmetrically encrypt the codeword using the execution key;

获取项目管理人员的公钥,使用公钥对执行密钥进行非对称加密。Obtain the public key of the project manager and use the public key to asymmetrically encrypt the execution key.

通过双层加密和数字签名,能够有效防止数据在传输过程中的篡改与泄露。非对称加密提供身份验证功能,而对称加密保证传输效率,双层加密的结合进一步增强数据保护能力。Through double-layer encryption and digital signature, data can be effectively prevented from being tampered with and leaked during transmission. Asymmetric encryption provides identity authentication, while symmetric encryption ensures transmission efficiency. The combination of double-layer encryption further enhances data protection capabilities.

优选的,所述将加密后的施工数据、执行密钥和数字签名通过网络传输路径发送给项目管理人员,包括:Preferably, the step of sending the encrypted construction data, execution key and digital signature to the project manager via a network transmission path includes:

针对任意一位现场监理人员:For any on-site supervisor:

获取现场监理人员上传的数字签名、加密后的码字和加密后的执行密钥Get the digital signature uploaded by the on-site supervisor , encrypted codeword and the encrypted execution key ;

计算加密哈希值,得到该现场监理人员的唯一标识Calculating cryptographic hash values , get the unique ID of the on-site supervisor ;

获取现场监理人员的人脸识别图像,对人脸识别图像执行高斯模糊算法进行隐私保护,具体为:Obtain the face recognition image of the on-site supervisor and perform the Gaussian blur algorithm on the face recognition image to protect privacy. Specifically:

在人脸识别图像的中心建立二维坐标系,其中,人脸识别图像为正方形,且长=宽=2q;Establish a two-dimensional coordinate system at the center of the face recognition image, where the face recognition image is a square, and length = width = 2q;

计算人脸识别图像上每个像素执行高斯模糊算法后的像素值:,其中,为横纵坐标的像素值,为模糊强度;Calculate the pixel value of each pixel on the face recognition image after performing the Gaussian blur algorithm: ,in, The horizontal and vertical coordinates The pixel value of is the blur intensity;

获取执行了高斯模糊算法的人脸识别图像Get the face recognition image with Gaussian blur algorithm ;

获取现场监理人员的身份信息、上传数据的时间和现场监理人员的位置信息Obtain the identity information of the on-site supervisor , the time of uploading data and location information of on-site supervisors ;

设定现场监理人员的数据块Setting the data block of the on-site supervisor ;

获取所有现场监理人员的数据块,执行分组上传策略,将数据块分组上传到区块链网络,具体为:Get the data blocks of all on-site supervisors, implement the group upload strategy, and upload the data blocks to the blockchain network in groups. Specifically:

设定分组大小Set group size ;

将获取的所有现场监理人员的数据块均分为组,每组包含个数据块;Divide the acquired data blocks of all on-site supervisors into Groups, each containing data blocks;

将每组数据进行打包,计算其整体哈希值Pack each set of data and calculate its overall hash value ,

其中,,将计算的整体哈希值存入区块链网络中;in, , the calculated overall hash value is stored in the blockchain network;

区块链汇总节点通过分布式存储下载所有上传到区块链中的数据;The blockchain aggregation node downloads all data uploaded to the blockchain through distributed storage;

项目管理人员在区块链中输入现场监理人员的身份信息、上传数据的时间、现场监理人员的位置信息等查询所需的数据块。The project manager enters the identity information of the on-site supervisor, the time of uploading data, the location information of the on-site supervisor, and other data blocks required for the query in the blockchain.

通过对施工数据和密钥分别加密,系统可以在项目管理人员端解密还原,确保数据的完整性和保密性。采用非对称与对称加密相结合的方式,能够兼顾安全性与效率。By encrypting the construction data and keys separately, the system can decrypt and restore them on the project management side to ensure the integrity and confidentiality of the data. The combination of asymmetric and symmetric encryption can balance security and efficiency.

优选的,所述对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障,包括:Preferably, executing a fault monitoring strategy on each node in the network transmission path to determine whether the node is faulty includes:

针对网络传输路径中的每个节点,设定节点的健康状态For each node in the network transmission path, set the node health status ;

获取节点的资源利用率Get the resource utilization of the node ;

获取节点的响应时间Get the response time of a node ;

获取节点的负载水平Get the load level of a node ;

执行下列公式,计算Execute the following formula to calculate ;

,其中,分别为资源利用率权重、响应时间权重和负载水平的权重,且 ,in, , and are the resource utilization weight, response time weight and load level weight respectively, and ;

设定健康阈值Setting health thresholds ;

将节点的健康状态和健康阈值进行比较;Compare the node's health status to the health threshold;

,则节点健康;like , then the node is healthy;

,则节点故障。like , the node fails.

通过监测节点健康状态,系统能够实时识别网络中的潜在故障,及时采取措施,减少传输中断的风险。此举提升了网络的可靠性和可用性,同时降低了故障对整体传输效率的影响。By monitoring the health status of nodes, the system can identify potential faults in the network in real time and take timely measures to reduce the risk of transmission interruption. This improves the reliability and availability of the network while reducing the impact of faults on overall transmission efficiency.

优选的,所述若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点,包括:Preferably, if a failed node is detected, a multi-level redundant backup strategy is executed to replace the failed node with a backup node, including:

设定备份半径;Set the backup radius;

获取监测故障的节点,以故障节点的位置为圆心,以备份半径为半径做出的圆记为备份区域;Get the node to monitor the fault, and make a circle with the location of the faulty node as the center and the backup radius as the radius as the backup area;

获取备份区域中闲置的所有节点,计算距离故障的节点的距离,并按照距离进行排序,选取前3个闲置的节点,分别记为第一节点、第二节点和第三节点;Get all idle nodes in the backup area, calculate the distance from the failed node, sort them by distance, select the first three idle nodes, and record them as the first node, the second node, and the third node respectively;

激活第一节点用于替换故障的节点;activating the first node to replace the failed node;

通知第二节点启动高可用HA集群;Notify the second node to start the high-availability HA cluster;

设置第三节点进入热备份状态。Set the third node to hot standby status.

通过多层次冗余备份策略,系统可以快速替换故障节点,保障传输的连续性与稳定性。启用HA集群和热备份机制能够进一步提高系统的容灾能力,增强平台的高可用性。Through multi-level redundant backup strategies, the system can quickly replace faulty nodes to ensure the continuity and stability of transmission. Enabling HA cluster and hot backup mechanisms can further improve the system's disaster recovery capabilities and enhance the high availability of the platform.

优选的,所述对网络传输路径中的每个节点使用AI智能检测异常网络行为,并对异常网络行为执行分级处置策略,维护网络传输路径的安全,包括:Preferably, the method uses AI to intelligently detect abnormal network behavior for each node in the network transmission path, and implements a hierarchical disposal strategy for the abnormal network behavior to maintain the security of the network transmission path, including:

基于Transformer和Autoencoder的联合模型检测异常网络行为:Detect abnormal network behavior based on the joint model of Transformer and Autoencoder:

Transformer编码模块:Transformer encoding module:

提取节点传输流量的特征,使用嵌入层映射特征到高纬空间,多头注意力机制提取关键时序特征:Extract the characteristics of node transmission traffic , use the embedding layer to map features to high-dimensional space, and the multi-head attention mechanism to extract key temporal features:

,其中,分别为查询、键、值向量三维度、时间步和值; ,in, , , , , They are query, key, and value vector three dimensions, time step, and value respectively;

捕获全局时序依赖的高纬特征;Capture high-dimensional features of global temporal dependencies;

Autoencoder解码解码模块:Autoencoder decoding module:

获取高纬特征;Get high-dimensional features;

使用全连接层还原高纬特征到原始空间;Use fully connected layers to restore high-dimensional features to the original space;

最小化重构误差:,其中,是特征的个数,是重构的特征;Minimize the reconstruction error: ,in, is the number of features, It is a feature of reconstruction;

异常检测模块:Anomaly Detection Module:

计算提取的节点传输流量的特征的均值和标准差Calculate the mean of the extracted node transmission traffic characteristics and standard deviation ;

计算,记为异常分值;calculate , recorded as the abnormal score;

设定异常阈值;Set anomaly thresholds;

若异常分值≧异常阈值,则网络行为异常;If the anomaly score ≧ the anomaly threshold, the network behavior is abnormal;

若异常分值≦异常阈值,则网络行为正常;If the anomaly score ≦ anomaly threshold, the network behavior is normal;

当检测到异常网络行为,生成报警信息,将报警信息上传到工程监理平台的安全管理中心;When abnormal network behavior is detected, an alarm message is generated and uploaded to the security management center of the engineering supervision platform;

将检测到异常网络行为的时刻记为第一时刻;The moment when the abnormal network behavior is detected is recorded as the first moment;

设定异常告警时段;Set abnormal alarm period;

将第一时刻后间隔告警时段的时刻记为第二时刻;Record the time after the first moment and the interval of the alarm period as the second moment;

在第二时刻检测异常网络行为是否结束,若异常网络行为未结束,则自动终止异常网络行为。At the second moment, it is detected whether the abnormal network behavior has ended. If the abnormal network behavior has not ended, the abnormal network behavior is automatically terminated.

通过分级处置策略,系统能够根据异常行为的严重程度采取适当的响应措施,避免网络被攻击或滥用。此过程能够及时消除威胁,维护网络安全,同时降低误报对系统的干扰。Through the hierarchical disposal strategy, the system can take appropriate response measures according to the severity of abnormal behavior to prevent the network from being attacked or abused. This process can eliminate threats in a timely manner, maintain network security, and reduce the interference of false alarms on the system.

第二方面,本申请提供一种基于工程监理平台的信息传输方法的系统,采用如下技术方案:一种基于工程监理平台的信息传输方法的系统,包括:In a second aspect, the present application provides a system for an information transmission method based on an engineering supervision platform, which adopts the following technical solution: A system for an information transmission method based on an engineering supervision platform, comprising:

会话管理模块,生成并维护现场监理人员与项目管理人员之间的会话;The session management module generates and maintains the sessions between the on-site supervisors and the project managers;

网络监测与流量控制模块,监测带宽与丢包率,动态调整加密强度;Network monitoring and traffic control module, monitoring bandwidth and packet loss rate, dynamically adjusting encryption strength;

数据分类与压缩模块,对施工数据按类别分类,执行对应的压缩算法;The data classification and compression module classifies the construction data by category and executes the corresponding compression algorithm;

密钥管理模块,生成、更新主密钥与会话密钥,分发执行密钥;Key management module, generates and updates master keys and session keys, and distributes execution keys;

数据加密与签名模块,实现双层加密和数字签名,保障数据安全;Data encryption and signature module, realizing double-layer encryption and digital signature to ensure data security;

数据传输与故障处理模块,管理数据加密传输,监测节点健康,执行故障冗余备份;Data transmission and fault handling module, which manages data encryption transmission, monitors node health, and performs fault redundancy backup;

异常行为检测与处理模块,识别异常访问与未知IP,执行分级处置策略;Abnormal behavior detection and processing module, identifying abnormal access and unknown IP, and implementing hierarchical disposal strategies;

区块链日志记录模块,记录会话日志,确保数据不可篡改;The blockchain logging module records session logs to ensure that data cannot be tampered with;

用户权限管理模块,管控用户权限,保障数据访问安全;User rights management module, which controls user rights and ensures data access security;

安全管理中心,处理网络异常与故障报警,提供系统级安全保障。The security management center handles network anomalies and fault alarms and provides system-level security protection.

本发明具备以下有益效果:The present invention has the following beneficial effects:

1、该基于工程监理平台的信息传输方法,通过实时获取网络带宽和丢包率,系统能够智能调整加密强度,从而实现安全性与效率的平衡。当网络带宽有限时,降低加密强度可以减少数据处理和传输时间,避免网络拥塞;而在高带宽条件下,通过提升加密强度,能够增强数据的防护能力,保障信息的机密性。这种动态调节策略不仅能够适应复杂多变的网络环境,还有效优化了资源利用率,提升了施工数据传输的效率和安全性。1. This information transmission method based on the engineering supervision platform can intelligently adjust the encryption strength by obtaining network bandwidth and packet loss rate in real time, thereby achieving a balance between security and efficiency. When the network bandwidth is limited, reducing the encryption strength can reduce data processing and transmission time and avoid network congestion; while under high bandwidth conditions, by increasing the encryption strength, the data protection capability can be enhanced and the confidentiality of information can be guaranteed. This dynamic adjustment strategy can not only adapt to complex and changing network environments, but also effectively optimize resource utilization and improve the efficiency and security of construction data transmission.

2、该基于工程监理平台的信息传输方法,通过对施工数据进行分类压缩,系统能够根据数据的类型选择最佳的压缩算法,显著提高压缩效率。例如,项目进度数据可能需要高精度的压缩算法,而图像类数据则更适合无损或有损压缩。这种预处理方式能够减少传输数据的体积,降低网络带宽的占用,同时减轻服务器的存储压力。此外,分类处理还能够针对性地优化特定类型数据的处理效果,进一步提高数据传输的稳定性和准确性。2. This information transmission method based on the engineering supervision platform can classify and compress construction data. The system can select the best compression algorithm according to the type of data, significantly improving the compression efficiency. For example, project progress data may require a high-precision compression algorithm, while image data is more suitable for lossless or lossy compression. This preprocessing method can reduce the volume of transmitted data, reduce the occupancy of network bandwidth, and reduce the storage pressure of the server. In addition, classification processing can also optimize the processing effect of specific types of data in a targeted manner, further improving the stability and accuracy of data transmission.

3、该基于工程监理平台的信息传输方法,通过设定主密钥与会话密钥并进行动态更新,系统能够显著降低密钥泄露或被破解的风险。每次会话生成独立的会话密钥,确保数据加密具备唯一性,有效阻止重放攻击或其他恶意行为。主密钥的定期更新则能够减少长期使用带来的安全隐患,保持加密机制的前沿性和可靠性。这种动态密钥管理策略既保障了数据的传输安全,又提升了系统在复杂场景中的防护能力。3. This information transmission method based on the engineering supervision platform can significantly reduce the risk of key leakage or cracking by setting the master key and session key and dynamically updating them. An independent session key is generated for each session to ensure the uniqueness of data encryption and effectively prevent replay attacks or other malicious behaviors. Regular updates of the master key can reduce the security risks caused by long-term use and maintain the cutting-edge and reliability of the encryption mechanism. This dynamic key management strategy not only ensures the security of data transmission, but also improves the system's protection capabilities in complex scenarios.

4、该基于工程监理平台的信息传输方法,通过执行双层加密策略,结合非对称加密的身份认证功能与对称加密的高效传输性能,系统能够同时满足安全性与效率需求。此外,生成的数字签名能够验证数据的完整性与来源,防止数据在传输过程中被篡改。这一组合策略不仅能够抵御多种安全威胁,还在数据传输的每一环节中提供了可靠的加密保护,充分保障施工数据的隐私性与可信度。4. This information transmission method based on the engineering supervision platform implements a double-layer encryption strategy, combining the identity authentication function of asymmetric encryption with the efficient transmission performance of symmetric encryption. The system can meet the security and efficiency requirements at the same time. In addition, the generated digital signature can verify the integrity and source of the data and prevent the data from being tampered with during the transmission process. This combined strategy can not only resist a variety of security threats, but also provide reliable encryption protection in every link of data transmission, fully ensuring the privacy and credibility of construction data.

5、该基于工程监理平台的信息传输方法,通过实时监测传输路径中各节点的健康状态,系统能够快速识别潜在故障并采取应急措施。针对故障节点,多层次冗余备份策略允许系统从附近的闲置节点中选择替代节点,同时启动高可用集群和热备份机制。这种机制能够最大程度减少网络中断的影响,确保施工数据的持续传输与处理能力。故障管理和备份策略的结合显著提升了网络的可靠性和平台的高可用性。5. This information transmission method based on the engineering supervision platform can quickly identify potential faults and take emergency measures by monitoring the health status of each node in the transmission path in real time. For faulty nodes, the multi-level redundant backup strategy allows the system to select replacement nodes from nearby idle nodes and start high-availability clusters and hot backup mechanisms at the same time. This mechanism can minimize the impact of network interruptions and ensure the continuous transmission and processing capabilities of construction data. The combination of fault management and backup strategies significantly improves the reliability of the network and the high availability of the platform.

6、该基于工程监理平台的信息传输方法,通过对异常网络行为的分级处置,系统能够根据事件的严重程度采取针对性的安全措施。例如,轻微的异常访问可以通过警告或临时限制处理,而严重威胁则会触发自动阻断机制。这种分级策略确保了安全事件能够被高效响应,同时减少了误报对正常操作的干扰。结合异常行为的自动检测和警报上传,系统能够持续维护传输路径的安全性,避免外部威胁对数据传输的影响。6. This information transmission method based on the engineering supervision platform can take targeted security measures according to the severity of the incident through the hierarchical treatment of abnormal network behaviors. For example, minor abnormal access can be handled by warnings or temporary restrictions, while serious threats will trigger automatic blocking mechanisms. This hierarchical strategy ensures that security incidents can be responded to efficiently while reducing the interference of false alarms on normal operations. Combined with automatic detection of abnormal behaviors and alarm upload, the system can continuously maintain the security of the transmission path and avoid the impact of external threats on data transmission.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为本发明方法流程示意图。FIG1 is a schematic flow chart of the method of the present invention.

图2为本发明系统分模块示意图。FIG. 2 is a schematic diagram of the module division of the system of the present invention.

图3为本发明系统分模块示意图。FIG. 3 is a schematic diagram of the module division of the system of the present invention.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

实施例一,参照图1.一种基于工程监理平台的信息传输方法,包括:Embodiment 1, referring to FIG. 1 . An information transmission method based on an engineering supervision platform includes:

现场监理人员通过工程监理平台将施工数据发送给项目管理人员,工程监理平台生成现场监理人员和项目管理人员之间的会话;The on-site supervisor sends the construction data to the project manager through the engineering supervision platform, and the engineering supervision platform generates a conversation between the on-site supervisor and the project manager;

通过为现场监理人员与项目管理人员之间创建会话,系统实现了数据传输的全程追踪与记录,确保数据交互具有明确的上下文。这一机制能够有效避免数据在多方交互中出现混淆或遗漏的问题,同时赋予每次传输唯一的标识。基于会话的管理还允许实时监控数据的流向和状态,一旦发生异常情况,如数据丢失或重复传输,系统可以快速响应并定位问题。这种会话管理机制不仅为数据传输提供了强有力的支持,也为后续的流程管理和审计提供了可靠的基础。By creating sessions between on-site supervisors and project managers, the system can track and record the entire data transmission process, ensuring that data interactions have a clear context. This mechanism can effectively avoid confusion or omissions in multi-party interactions, while giving each transmission a unique identifier. Session-based management also allows real-time monitoring of the flow and status of data. Once an abnormal situation occurs, such as data loss or repeated transmission, the system can respond quickly and locate the problem. This session management mechanism not only provides strong support for data transmission, but also provides a reliable foundation for subsequent process management and auditing.

在会话的过程中:During the session:

获取工程监理平台传输网络当前的带宽和丢包率Get the current bandwidth of the engineering supervision platform transmission network and packet loss rate ;

根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度;Execute adaptive traffic control strategy according to bandwidth and packet loss rate to adjust the encryption strength of construction data;

获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码;Obtain the construction data uploaded by the on-site supervisor, implement the classification compression preprocessing strategy, and classify, compress and robustly encode the construction data;

设定主密钥和会话密钥;Set the master key and session key;

根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥;According to the master key and the session key, execute the key update strategy to update the master key and the session key;

获取本次会话的会话密钥,记为执行密钥;Get the session key for this session, recorded as the execution key;

根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密;According to the execution key and construction data, a double-layer encryption strategy is implemented to generate a digital signature, and the construction data, execution key and digital signature are encrypted;

获取本次会话的网络传输路径,网络传输路径由多个节点组成;Get the network transmission path of this session. The network transmission path consists of multiple nodes.

将加密后的施工数据、执行密钥和数字签名通过网络传输路径发送给项目管理人员;Send the encrypted construction data, execution key and digital signature to the project manager via the network transmission path;

对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障;Execute the fault monitoring strategy for each node in the network transmission path to determine whether the node is faulty;

若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点;If a faulty node is detected, a multi-level redundant backup strategy is implemented to replace the faulty node with a backup node.

对网络传输路径中的每个节点使用AI智能检测异常网络行为;Use AI to intelligently detect abnormal network behavior at each node in the network transmission path;

对异常网络行为执行分级处置策略,维护网络传输路径的安全;Implement hierarchical disposal strategies for abnormal network behaviors to maintain the security of network transmission paths;

将本次会话使用区块链日志进行记录。This session is recorded using blockchain logs.

通过将每次会话的关键信息记录在区块链上,系统实现了数据的不可篡改性和永久追溯性。这一功能不仅增强了数据存储的可信性,还为平台的操作透明度提供了技术支持。在数据审计、法律纠纷和合规检查场景下,区块链日志能够作为权威证据,确保数据的完整性和真实性。通过这种去中心化记录机制,平台的整体信任度和可靠性得到了进一步提升,为工程监理的数字化发展奠定了坚实基础。By recording the key information of each session on the blockchain, the system achieves data immutability and permanent traceability. This feature not only enhances the credibility of data storage, but also provides technical support for the platform's operational transparency. In data audits, legal disputes, and compliance inspections, blockchain logs can serve as authoritative evidence to ensure the integrity and authenticity of data. Through this decentralized recording mechanism, the overall trust and reliability of the platform have been further improved, laying a solid foundation for the digital development of engineering supervision.

根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度,包括:Based on bandwidth and packet loss rate, adaptive traffic control strategies are implemented to adjust the encryption strength of construction data, including:

设定带宽权重因子Setting bandwidth weight factor ;

设定丢包率权重因子Set the packet loss rate weight factor ;

获取工程监理平台传输数据的最大带宽Get the maximum bandwidth of the engineering supervision platform to transmit data ;

执行下列公式,计算加密强度Execute the following formula to calculate the encryption strength ;

,其中, ,in, , , .

通过实时检测传输网络的带宽和丢包率,系统动态调整数据的加密强度,实现了安全性与效率的平衡。当网络负载较大时,降低加密强度可以减少数据处理时间,从而保证重要数据及时送达;而在网络条件较好时,提高加密强度则能提供更高的安全保护。该策略不仅显著优化了网络资源的利用率,还能适应不同的网络环境和应用场景。通过这种动态调整机制,系统能够在安全性和性能之间实现最佳平衡,提升了整个工程监理平台的传输效率和稳定性。By real-time detection of the bandwidth and packet loss rate of the transmission network, the system dynamically adjusts the encryption strength of the data to achieve a balance between security and efficiency. When the network load is large, reducing the encryption strength can reduce data processing time, thereby ensuring that important data is delivered in a timely manner; when the network conditions are good, increasing the encryption strength can provide higher security protection. This strategy not only significantly optimizes the utilization of network resources, but also adapts to different network environments and application scenarios. Through this dynamic adjustment mechanism, the system can achieve the best balance between security and performance, and improve the transmission efficiency and stability of the entire engineering supervision platform.

获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码,包括:Obtain the construction data uploaded by the on-site supervisor, implement the classification compression preprocessing strategy, and classify, compress and robustly encode the construction data, including:

施工数据被分为项目进度、质量控制、成本管理和安全管理类别;Construction data was divided into the categories of project schedule, quality control, cost management, and safety management;

针对任意类别的施工数据,获取工程监理平台为该类别施工数据匹配的压缩算法,获取该压缩算法的压缩率For any type of construction data, obtain the compression algorithm that the engineering supervision platform matches for this type of construction data, and obtain the compression rate of the compression algorithm ;

获取施工数据的文件Get the file of construction data ;

执行分类压缩预处理策略,将施工数据压缩到Execute the classification compression preprocessing strategy to compress the construction data into ;

鲁棒编码:Robust Coding:

获取标准的校验矩阵H;Obtain a standard check matrix H;

使用高斯消元法将校验矩阵H进行分解,得到第一矩阵P;Use Gaussian elimination method to decompose the check matrix H to obtain the first matrix P;

,其中,为第一矩阵的转置,的单位矩阵; ,in, The first matrix The transpose of for The identity matrix of

计算生成矩阵,其中,的单位矩阵;Calculate the generated matrix ,in, for The identity matrix of

计算鲁棒编码后的码字Calculate the codeword after robust coding .

通过对施工数据进行分类处理并采用针对性压缩算法,系统能够大幅降低数据体积,减轻网络带宽压力。例如,对于项目进度数据,使用高效的压缩算法保证内容精度,而对于多媒体数据,则选择兼顾质量和体积的有损压缩方式。这种分类压缩策略不仅提高了数据传输的效率,还减少了存储空间占用,为工程监理平台的长时间稳定运行提供了支持。此外,数据分类压缩还能进一步提升不同类型数据的可用性,确保关键信息在必要时能够快速还原和利用。By classifying construction data and using targeted compression algorithms, the system can significantly reduce data volume and alleviate network bandwidth pressure. For example, for project progress data, an efficient compression algorithm is used to ensure content accuracy, while for multimedia data, a lossy compression method that takes into account both quality and volume is selected. This classification compression strategy not only improves the efficiency of data transmission, but also reduces storage space usage, providing support for the long-term stable operation of the engineering supervision platform. In addition, data classification compression can further improve the availability of different types of data, ensuring that key information can be quickly restored and used when necessary.

根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥,包括:According to the master key and session key, execute the key update policy to update the master key and session key, including:

当现场监理人员每次向工程监理平台上传施工数据时,根据当前的主密钥生成本次会话的会话密钥,具体为:Every time the on-site supervisor uploads construction data to the engineering supervision platform, the session key for this session is generated based on the current master key, specifically:

获取现场监理人员本次上传施工数据到工程监理平台时对应的会话Get the corresponding session when the on-site supervisor uploads the construction data to the engineering supervision platform ;

获取当前的主密钥Get the current master key ;

使用算法计算本次会话的会话密钥use The algorithm calculates the session key for this session ;

设定主密钥更新间隔Set the master key update interval ;

获取最后一次更新主密钥的时刻Get the time when the master key was last updated ;

时刻更新主密钥,使用算法得到更新后的主密钥exist Always update the master key, using The algorithm obtains the updated master key .

本实施例中,动态密钥更新机制每12小时自动更换一次主密钥,每次更换主密钥都将触发系统自动通知所有参与方更新本地密钥库;In this embodiment, the dynamic key update mechanism automatically changes the master key every 12 hours. Each change of the master key will trigger the system to automatically notify all participants to update the local key library;

区块链日志管理系统则会详细记录每一次加密、解密操作的时间戳、发起方ID以及操作结果,形成不可篡改的日志链,为事后审计提供依据。The blockchain log management system will record the timestamp, initiator ID and operation results of each encryption and decryption operation in detail, forming an unalterable log chain and providing a basis for subsequent audits.

通过主密钥和会话密钥的动态管理,系统有效降低了密钥泄露的风险。每次会话生成独立的会话密钥,使得即使某次会话的密钥被窃取,也不会影响其他会话的数据安全。同时,主密钥的定期更新能够减少因长时间使用而带来的安全隐患,保持加密策略的前沿性和高强度。通过密钥更新策略,系统在保障数据机密性的同时提升了抵御外部攻击的能力,为施工数据传输提供了更强的安全保障。Through the dynamic management of master keys and session keys, the system effectively reduces the risk of key leakage. Each session generates an independent session key, so that even if the key of a session is stolen, it will not affect the data security of other sessions. At the same time, the regular update of the master key can reduce the security risks caused by long-term use and maintain the cutting-edge and high-intensity of the encryption strategy. Through the key update strategy, the system improves the ability to resist external attacks while ensuring data confidentiality, providing stronger security for construction data transmission.

根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密,包括:According to the execution key and construction data, a double-layer encryption strategy is implemented to generate a digital signature, and the construction data, execution key and digital signature are encrypted, including:

获取鲁棒编码后得到的码字;Obtain the codeword obtained after robust coding;

获取现场监理人员的私钥,使用私钥对码字进行非对称加密,得到数字签名;Obtain the private key of the on-site supervisor, use the private key to asymmetrically encrypt the codeword, and obtain a digital signature;

使用执行密钥对码字进行对称加密;Symmetrically encrypt the codeword using the execution key;

获取项目管理人员的公钥,使用公钥对执行密钥进行非对称加密。Obtain the public key of the project manager and use the public key to asymmetrically encrypt the execution key.

本实施例中,施工现场的视频监控信息传输,工程监理平台首先会对视频流进行H.265编码压缩,之后使用AES-256算法进行加密处理,同时生成对应的RSA数字签名,保证即使在网络条件较差的情况下也能保持较高的传输速率,且项目管理人员可通过验证数字签名确保数据未被篡改。In this embodiment, when transmitting video surveillance information at the construction site, the engineering supervision platform will first perform H.265 encoding compression on the video stream, and then use the AES-256 algorithm to encrypt it, and at the same time generate a corresponding RSA digital signature to ensure that a high transmission rate can be maintained even in poor network conditions, and project managers can ensure that the data has not been tampered with by verifying the digital signature.

通过结合对称加密和非对称加密,系统在安全性和效率之间达成了良好的平衡。首先,数字签名的生成验证了数据来源的真实性,防止恶意篡改和冒名操作;其次,对称加密的快速加密特性保证了大批量数据的高效传输,而非对称加密则用于保护会话密钥的机密性。这种双层加密机制能够有效防御重放攻击、中间人攻击等多种安全威胁,从而全面保障施工数据在传输过程中的保密性和可靠性。By combining symmetric encryption and asymmetric encryption, the system achieves a good balance between security and efficiency. First, the generation of digital signatures verifies the authenticity of the data source and prevents malicious tampering and impersonation. Second, the fast encryption characteristics of symmetric encryption ensure the efficient transmission of large quantities of data, while asymmetric encryption is used to protect the confidentiality of session keys. This double-layer encryption mechanism can effectively defend against multiple security threats such as replay attacks and man-in-the-middle attacks, thereby fully ensuring the confidentiality and reliability of construction data during transmission.

将加密后的施工数据、执行密钥和数字签名通过网络传输路径发送给项目管理人员,包括:Send the encrypted construction data, execution key and digital signature to the project manager via the network transmission path, including:

针对任意一位现场监理人员:For any on-site supervisor:

获取现场监理人员上传的数字签名、加密后的码字和加密后的执行密钥Get the digital signature uploaded by the on-site supervisor , encrypted codeword and the encrypted execution key ;

计算加密哈希值,得到该现场监理人员的唯一标识Calculating cryptographic hash values , get the unique ID of the on-site supervisor ;

获取现场监理人员的人脸识别图像,对人脸识别图像执行高斯模糊算法进行隐私保护,具体为:Obtain the face recognition image of the on-site supervisor and perform the Gaussian blur algorithm on the face recognition image to protect privacy. Specifically:

在人脸识别图像的中心建立二维坐标系,其中,人脸识别图像为正方形,且长=宽=2q;Establish a two-dimensional coordinate system at the center of the face recognition image, where the face recognition image is a square, and length = width = 2q;

计算人脸识别图像上每个像素执行高斯模糊算法后的像素值:,其中,为横纵坐标的像素值,为模糊强度;Calculate the pixel value of each pixel on the face recognition image after performing the Gaussian blur algorithm: ,in, The horizontal and vertical coordinates The pixel value of is the blur intensity;

获取执行了高斯模糊算法的人脸识别图像Get the face recognition image with Gaussian blur algorithm ;

获取现场监理人员的身份信息、上传数据的时间和现场监理人员的位置信息Obtain the identity information of the on-site supervisor , the time of uploading data and location information of on-site supervisors ;

设定现场监理人员的数据块Setting the data block of the on-site supervisor ;

获取所有现场监理人员的数据块,执行分组上传策略,将数据块分组上传到区块链网络,具体为:Get the data blocks of all on-site supervisors, implement the group upload strategy, and upload the data blocks to the blockchain network in groups. Specifically:

设定分组大小Set group size ;

将获取的所有现场监理人员的数据块均分为组,每组包含个数据块;Divide the acquired data blocks of all on-site supervisors into Groups, each containing data blocks;

将每组数据进行打包,计算其整体哈希值Pack each set of data and calculate its overall hash value ,

其中,,将计算的整体哈希值存入区块链网络中;in, , the calculated overall hash value is stored in the blockchain network;

区块链汇总节点通过分布式存储下载所有上传到区块链中的数据;The blockchain aggregation node downloads all data uploaded to the blockchain through distributed storage;

项目管理人员在区块链中输入现场监理人员的身份信息、上传数据的时间、现场监理人员的位置信息等查询所需的数据块。The project manager enters the identity information of the on-site supervisor, the time of uploading data, the location information of the on-site supervisor, and other data blocks required for the query in the blockchain.

对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障,包括:Execute the fault monitoring strategy for each node in the network transmission path to determine whether the node is faulty, including:

针对网络传输路径中的每个节点,设定节点的健康状态For each node in the network transmission path, set the node health status ;

获取节点的资源利用率Get the resource utilization of the node ;

获取节点的响应时间Get the response time of a node ;

获取节点的负载水平Get the load level of a node ;

执行下列公式,计算Execute the following formula to calculate ;

,其中,分别为资源利用率权重、响应时间权重和负载水平的权重,且 ,in, , and are the resource utilization weight, response time weight and load level weight respectively, and ;

设定健康阈值Setting health thresholds ;

将节点的健康状态和健康阈值进行比较;Compare the node's health status to the health threshold;

,则节点健康;like , then the node is healthy;

,则节点故障。like , the node fails.

若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点,包括:If a faulty node is detected, a multi-level redundant backup strategy is implemented to replace the faulty node with a backup node, including:

设定备份半径;Set the backup radius;

获取监测故障的节点,以故障节点的位置为圆心,以备份半径为半径做出的圆记为备份区域;Get the node to monitor the fault, and make a circle with the location of the faulty node as the center and the backup radius as the radius as the backup area;

获取备份区域中闲置的所有节点,计算距离故障的节点的距离,并按照距离由近到远进行排序,选取前3个闲置的节点,分别记为第一节点、第二节点和第三节点;Get all idle nodes in the backup area, calculate the distance to the failed node, and sort them from near to far according to the distance. Select the first three idle nodes and record them as the first node, the second node, and the third node respectively.

激活第一节点用于替换故障的节点;activating the first node to replace the failed node;

通知第二节点启动高可用HA集群;Notify the second node to start the high-availability HA cluster;

设置第三节点进入热备份状态。Set the third node to hot standby status.

通过实时监控网络节点的健康状态,系统能够快速发现潜在故障并及时采取补救措施。对于故障节点,系统通过多层次冗余备份策略激活备用节点,确保网络的持续稳定运行。同时,备份节点的层级设计包括主用、次用和热备份状态,进一步提高了系统的容错能力。通过这种故障管理和备份机制,网络中断和数据丢失的风险大幅降低,传输效率和数据可用性显著提升。By monitoring the health status of network nodes in real time, the system can quickly detect potential faults and take timely remedial measures. For faulty nodes, the system activates backup nodes through a multi-level redundant backup strategy to ensure the continuous and stable operation of the network. At the same time, the hierarchical design of backup nodes includes primary, secondary and hot backup states, which further improves the fault tolerance of the system. Through this fault management and backup mechanism, the risk of network interruption and data loss is greatly reduced, and transmission efficiency and data availability are significantly improved.

对网络传输路径中的每个节点使用AI智能检测异常网络行为,并对异常网络行为执行分级处置策略,维护网络传输路径的安全,包括:AI is used to intelligently detect abnormal network behavior at each node in the network transmission path, and a hierarchical disposal strategy is implemented for abnormal network behavior to maintain the security of the network transmission path, including:

基于Transformer和Autoencoder的联合模型检测异常网络行为:Detect abnormal network behavior based on the joint model of Transformer and Autoencoder:

Transformer编码模块:Transformer encoding module:

提取节点传输流量的特征,使用嵌入层映射特征到高纬空间,多头注意力机制提取关键时序特征:Extract the characteristics of node transmission traffic , use the embedding layer to map features to high-dimensional space, and the multi-head attention mechanism to extract key temporal features:

,其中,分别为查询、键、值向量三维度、时间步和值; ,in, , , , , They are query, key, and value vector three dimensions, time step, and value respectively;

捕获全局时序依赖的高纬特征;Capture high-dimensional features of global temporal dependencies;

Autoencoder解码解码模块:Autoencoder decoding module:

获取高纬特征;Get high-dimensional features;

使用全连接层还原高纬特征到原始空间;Use fully connected layers to restore high-dimensional features to the original space;

最小化重构误差:,其中,是特征的个数,是重构的特征;Minimize the reconstruction error: ,in, is the number of features, It is a feature of reconstruction;

异常检测模块:Anomaly Detection Module:

计算提取的节点传输流量的特征的均值和标准差Calculate the mean of the extracted node transmission traffic characteristics and standard deviation ;

计算,记为异常分值;calculate , recorded as the abnormal score;

设定异常阈值;Set anomaly thresholds;

若异常分值≧异常阈值,则网络行为异常;If the anomaly score ≧ the anomaly threshold, the network behavior is abnormal;

若异常分值≦异常阈值,则网络行为正常;If the anomaly score ≦ anomaly threshold, the network behavior is normal;

当检测到异常网络行为,生成报警信息,将报警信息上传到工程监理平台的安全管理中心;When abnormal network behavior is detected, an alarm message is generated and uploaded to the security management center of the engineering supervision platform;

将检测到异常网络行为的时刻记为第一时刻;The moment when the abnormal network behavior is detected is recorded as the first moment;

设定异常告警时段;Set abnormal alarm period;

将第一时刻后间隔告警时段的时刻记为第二时刻;Record the time after the first moment and the interval of the alarm period as the second moment;

在第二时刻检测异常网络行为是否结束,若异常网络行为未结束,则自动终止异常网络行为。At the second moment, it is detected whether the abnormal network behavior has ended. If the abnormal network behavior has not ended, the abnormal network behavior is automatically terminated.

通过智能化监测与分级响应,系统能够精准识别异常网络行为,如频繁访问和未知IP接入。针对不同级别的威胁,系统采取针对性处置措施,轻微异常通过警报提醒管理员,而重大威胁则触发自动阻断机制,防止恶意行为影响系统运行。通过这种分级处置策略,平台能够实现安全事件的高效管理,同时最大程度降低对正常业务操作的干扰,为传输路径提供持久的安全保障。Through intelligent monitoring and hierarchical response, the system can accurately identify abnormal network behaviors, such as frequent access and unknown IP access. The system takes targeted disposal measures for different levels of threats. Minor anomalies alert administrators through alarms, while major threats trigger automatic blocking mechanisms to prevent malicious behaviors from affecting system operations. Through this hierarchical disposal strategy, the platform can achieve efficient management of security incidents while minimizing interference with normal business operations and providing lasting security protection for transmission paths.

实施例二,一种基于工程监理平台的信息传输方法的系统,包括:Embodiment 2, a system for information transmission method based on an engineering supervision platform, comprising:

本实施例中,参照图2。In this embodiment, refer to FIG. 2 .

会话管理模块,生成并维护现场监理人员与项目管理人员之间的会话;The session management module generates and maintains the sessions between the on-site supervisors and the project managers;

网络监测与流量控制模块,监测带宽与丢包率,动态调整加密强度;Network monitoring and traffic control module, monitoring bandwidth and packet loss rate, dynamically adjusting encryption strength;

数据分类与压缩模块,对施工数据按类别分类,执行对应的压缩算法;The data classification and compression module classifies the construction data by category and executes the corresponding compression algorithm;

密钥管理模块,生成、更新主密钥与会话密钥,分发执行密钥;Key management module, generates and updates master keys and session keys, and distributes execution keys;

数据加密与签名模块,实现双层加密和数字签名,保障数据安全;Data encryption and signature module, realizing double-layer encryption and digital signature to ensure data security;

数据传输与故障处理模块,管理数据加密传输,监测节点健康,执行故障冗余备份;Data transmission and fault handling module, which manages data encryption transmission, monitors node health, and performs fault redundancy backup;

本实施例中,参照图3;In this embodiment, refer to Figure 3;

异常行为检测与处理模块,识别异常访问与未知IP,执行分级处置策略;Abnormal behavior detection and processing module, identifying abnormal access and unknown IP, and implementing hierarchical disposal strategies;

区块链日志记录模块,记录会话日志,确保数据不可篡改;The blockchain logging module records session logs to ensure that data cannot be tampered with;

用户权限管理模块,管控用户权限,保障数据访问安全;User rights management module, which controls user rights and ensures data access security;

安全管理中心,处理网络异常与故障报警,提供系统级安全保障。The security management center handles network anomalies and fault alarms and provides system-level security protection.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。It should be noted that, in this article, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any such actual relationship or order between these entities or operations. Moreover, the terms "include", "comprise" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, article or device.

以上仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明技术原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above are only preferred embodiments of the present invention. It should be pointed out that, for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the technical principles of the present invention. These improvements and modifications should also be regarded as within the scope of protection of the present invention.

Claims (9)

1.一种基于工程监理平台的信息传输方法,其特征在于,包括:1. An information transmission method based on an engineering supervision platform, characterized by comprising: 现场监理人员通过工程监理平台将施工数据发送给项目管理人员,工程监理平台生成现场监理人员和项目管理人员之间的会话;The on-site supervisor sends the construction data to the project manager through the engineering supervision platform, and the engineering supervision platform generates a conversation between the on-site supervisor and the project manager; 在会话的过程中:During the session: 获取工程监理平台传输网络当前的带宽B和丢包率L;Obtain the current bandwidth B and packet loss rate L of the transmission network of the engineering supervision platform; 根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度;Execute adaptive traffic control strategy according to bandwidth and packet loss rate to adjust the encryption strength of construction data; 获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码;Obtain the construction data uploaded by the on-site supervisor, implement the classification compression preprocessing strategy, and classify, compress and robustly encode the construction data; 设定主密钥和会话密钥;Set the master key and session key; 根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥;According to the master key and the session key, execute the key update strategy to update the master key and the session key; 获取本次会话的会话密钥,记为执行密钥;Get the session key for this session, recorded as the execution key; 根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密;According to the execution key and construction data, a double-layer encryption strategy is implemented to generate a digital signature, and the construction data, execution key and digital signature are encrypted; 获取本次会话的网络传输路径,所述网络传输路径由多个节点组成;Obtaining a network transmission path for this session, where the network transmission path consists of multiple nodes; 将加密后的施工数据、执行密钥和数字签名通过网络传输路径发送给项目管理人员,包括:The encrypted construction data, execution key and digital signature are sent to the project manager via the network transmission path, including: 针对任意一位现场监理人员:For any on-site supervisor: 获取现场监理人员上传的数字签名C1、加密后的码字C2和加密后的执行密钥C3Obtain the digital signature C 1 , encrypted codeword C 2 and encrypted execution key C 3 uploaded by the on-site supervisor; 计算加密哈希值H(C1||C2||C3),得到该现场监理人员的唯一标识F0Calculate the encrypted hash value H(C 1 || C 2 || C 3 ) to obtain the unique identifier F 0 of the on-site supervisor; 获取现场监理人员的人脸识别图像,对人脸识别图像执行高斯模糊算法进行隐私保护,具体为:Obtain the face recognition image of the on-site supervisor and perform the Gaussian blur algorithm on the face recognition image to protect privacy. Specifically: 在人脸识别图像的中心建立二维坐标系,其中,人脸识别图像为正方形,且长=宽=2q;A two-dimensional coordinate system is established at the center of the face recognition image, where the face recognition image is a square, and length = width = 2q; 计算人脸识别图像上每个像素执行高斯模糊算法后的像素值:其中,f(x,y)为横纵坐标x,y的像素值,σ为模糊强度;Calculate the pixel value of each pixel on the face recognition image after performing the Gaussian blur algorithm: Among them, f(x, y) is the pixel value of the horizontal and vertical coordinates x and y, and σ is the blur intensity; 获取执行了高斯模糊算法的人脸识别图像F1Obtaining a face recognition image F 1 on which a Gaussian blur algorithm is executed; 获取现场监理人员的身份证号码F2、上传数据的时间F3和现场监理人员的位置信息F4Obtain the ID number F 2 of the on-site supervisor, the time of uploading data F 3 and the location information F 4 of the on-site supervisor; 设定现场监理人员的数据块S={F0,F1,F2,F3,F4};Set the data block S of the on-site supervisor to be {F 0 , F 1 , F 2 , F 3 , F 4 }; 获取所有现场监理人员的数据块,执行分组上传策略,将数据块分组上传到区块链网络,具体为:Get the data blocks of all on-site supervisors, implement the group upload strategy, and upload the data blocks to the blockchain network in groups. Specifically: 设定分组大小b1Set the group size b1 ; 将获取的所有现场监理人员的数据块均分为b1组,每组包含b2个数据块;Divide the acquired data blocks of all on-site supervisors into b1 groups, each group contains b2 data blocks; 将每组数据进行打包,计算其整体哈希值 Pack each set of data and calculate its overall hash value 其中,Si,j为一组数据块,i=1,2,3…b2,j=1,2,3…b1,将计算的整体哈希值存入区块链汇总节点中;Where S i,j is a set of data blocks, i=1, 2, 3…b 2 , j=1, 2, 3…b 1 , and the calculated overall hash value is stored in the blockchain summary node; 区块链汇总节点通过分布式存储下载所有上传到区块链中的数据;The blockchain aggregation node downloads all data uploaded to the blockchain through distributed storage; 项目管理人员在区块链中输入现场监理人员的身份信息、上传数据的时间、现场监理人员的位置信息查询所需的数据块;The project manager enters the identity information of the on-site supervisor, the time of uploading data, and the location information of the on-site supervisor into the blockchain to query the data blocks required; 对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障;Execute the fault monitoring strategy for each node in the network transmission path to determine whether the node is faulty; 若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点;If a faulty node is detected, a multi-level redundant backup strategy is implemented to replace the faulty node with a backup node. 对网络传输路径中的每个节点使用AI智能检测异常网络行为,并对异常网络行为执行分级处置策略,维护网络传输路径的安全;Use AI to intelligently detect abnormal network behavior at each node in the network transmission path, and implement hierarchical disposal strategies for abnormal network behavior to maintain the security of the network transmission path; 将本次会话使用区块链日志进行记录。This session is recorded using blockchain logs. 2.根据权利要求1所述的基于工程监理平台的信息传输方法,其特征在于,所述根据带宽和丢包率,执行自适应流量控制策略,调整对施工数据的加密强度,包括:2. The information transmission method based on the engineering supervision platform according to claim 1 is characterized in that the adaptive flow control strategy is executed according to the bandwidth and the packet loss rate to adjust the encryption strength of the construction data, including: 设定带宽权重因子βBSet the bandwidth weight factor β B ; 设定丢包率权重因子βLSet the packet loss rate weight factor β L ; 获取工程监理平台传输数据的最大带宽BmaxObtain the maximum bandwidth B max for data transmission of the engineering supervision platform; 执行下列公式,计算加密强度α(B,L);Execute the following formula to calculate the encryption strength α(B, L); 其中,βBL=1,βB≥0,βL≥0。 Among them, β B + β L =1, β B ≥ 0, and β L ≥ 0. 3.根据权利要求1所述的基于工程监理平台的信息传输方法,其特征在于,所述获取现场监理人员上传的施工数据,执行分类压缩预处理策略,对施工数据进行分类压缩和鲁棒编码,包括:3. The information transmission method based on the engineering supervision platform according to claim 1 is characterized in that the acquisition of construction data uploaded by the on-site supervisor, the implementation of the classification compression preprocessing strategy, and the classification compression and robust encoding of the construction data include: 所述施工数据被分为项目进度、质量控制、成本管理和安全管理类别;Said construction data is divided into the categories of project schedule, quality control, cost management and safety management; 针对任意类别的施工数据,获取工程监理平台为该类别施工数据匹配的压缩算法,获取该压缩算法的压缩率η;For any type of construction data, obtain the compression algorithm matched by the engineering supervision platform for the type of construction data, and obtain the compression rate η of the compression algorithm; 获取施工数据的文件D0Get the file D 0 of the construction data; 执行分类压缩预处理策略,将施工数据压缩到D1=D0×η;Execute the classification compression preprocessing strategy to compress the construction data to D 1 =D 0 ×η; 鲁棒编码:Robust Coding: 获取标准的校验矩阵H;Obtain a standard check matrix H; 使用高斯消元法将校验矩阵H进行分解,得到第一矩阵P;Use Gaussian elimination method to decompose the check matrix H to obtain the first matrix P; 其中,PT为第一矩阵P的转置,Ir为r×r的单位矩阵; Where P T is the transpose of the first matrix P, and I r is the r×r identity matrix; 计算生成矩阵G=[Ik|P],其中,Ik为k×k的单位矩阵;Calculate the generated matrix G = [I k | P], where I k is a k×k identity matrix; 计算鲁棒编码后的码字G×D1Calculate the codeword G×D 1 after robust coding. 4.根据权利要求1所述的基于工程监理平台的信息传输方法,其特征在于,所述根据主密钥和会话密钥,执行密钥更新策略,更新主密钥和会话密钥,包括:4. The information transmission method based on the engineering supervision platform according to claim 1 is characterized in that the key update strategy is executed according to the master key and the session key to update the master key and the session key, including: 当现场监理人员每次向工程监理平台上传施工数据时,根据当前的主密钥生成本次会话的会话密钥,具体为:Every time the on-site supervisor uploads construction data to the engineering supervision platform, the session key for this session is generated based on the current master key, specifically: 获取本次会话的会话ID;Get the session ID of this session; 获取当前的主密钥k0Get the current master key k 0 ; 使用HMAC算法计算本次会话的会话密钥k1=HMAC(k0,ID);Use the HMAC algorithm to calculate the session key k 1 =HMAC(k 0 , ID) of this session; 设定主密钥更新间隔Δt;Set the master key update interval Δt; 获取最后一次更新主密钥的时刻t0Get the time t 0 when the master key was last updated; 在t0+Δt时刻更新主密钥,使用PRNG算法得到更新后的主密钥k′0=PRNG(k0,t0+Δt)。The master key is updated at time t 0 +Δt, and the updated master key k′ 0 =PRNG(k 0 ,t 0 +Δt) is obtained using the PRNG algorithm. 5.根据权利要求3所述的基于工程监理平台的信息传输方法,其特征在于,所述根据执行密钥和施工数据,执行双层加密策略,生成数字签名,并对施工数据、执行密钥和数字签名进行加密,包括:5. According to claim 3, the information transmission method based on the engineering supervision platform is characterized in that the double-layer encryption strategy is executed according to the execution key and the construction data, a digital signature is generated, and the construction data, the execution key and the digital signature are encrypted, including: 获取鲁棒编码后得到的码字;Obtain the codeword obtained after robust coding; 获取现场监理人员的私钥,使用私钥对码字进行非对称加密,得到数字签名;Obtain the private key of the on-site supervisor, use the private key to asymmetrically encrypt the codeword, and obtain a digital signature; 使用执行密钥对码字进行对称加密;Symmetrically encrypt the codeword using the execution key; 获取项目管理人员的公钥,使用公钥对执行密钥进行非对称加密。Obtain the public key of the project manager and use the public key to asymmetrically encrypt the execution key. 6.根据权利要求1所述的基于工程监理平台的信息传输方法,其特征在于,所述对网络传输路径中的每个节点执行故障监测策略,判断节点是否故障,包括:6. The information transmission method based on the engineering supervision platform according to claim 1 is characterized in that the step of executing a fault monitoring strategy on each node in the network transmission path to determine whether the node is faulty comprises: 针对网络传输路径中的每个节点,设定节点的健康状态L;For each node in the network transmission path, set the node health status L; 获取节点的资源利用率U;Get the resource utilization U of the node; 获取节点的响应时间R;Get the node's response time R; 获取节点的负载水平V;Get the load level V of the node; 执行下列公式,计算L;Calculate L by executing the following formula: L=w1×U+w2×R+w3×V,其中,w1,w2和w3分别为资源利用率权重、响应时间权重和负载水平的权重,且w1+w2+w3=1;L = w 1 ×U+w 2 ×R+w 3 ×V, where w 1 , w 2 and w 3 are the resource utilization weight, response time weight and load level weight respectively, and w 1 +w 2 +w 3 =1; 设定健康阈值θ;Set the health threshold θ; 将节点的健康状态和健康阈值进行比较;Compare the node's health status to the health threshold; 若L≥θ,则节点健康;If L ≥ θ, the node is healthy; 若L<θ,则节点故障。If L<θ, the node is faulty. 7.根据权利要求6所述的基于工程监理平台的信息传输方法,其特征在于,所述若监测到故障的节点,执行多层次冗余备份策略,使用备份的节点替换故障的节点,包括:7. The information transmission method based on the engineering supervision platform according to claim 6 is characterized in that if a faulty node is detected, a multi-level redundant backup strategy is executed to replace the faulty node with a backup node, including: 设定备份半径;Set the backup radius; 获取监测故障的节点,以故障节点的位置为圆心,以备份半径为半径做出的圆记为备份区域;Get the node to monitor the fault, and make a circle with the location of the faulty node as the center and the backup radius as the radius as the backup area; 获取备份区域中闲置的所有节点,计算距离故障的节点的距离,并按照距离进行排序,选取前3个闲置的节点,分别记为第一节点、第二节点和第三节点;Get all idle nodes in the backup area, calculate the distance from the failed node, sort them by distance, select the first three idle nodes, and record them as the first node, the second node, and the third node respectively; 激活第一节点用于替换故障的节点;activating the first node to replace the failed node; 通知第二节点启动高可用HA集群;Notify the second node to start the high-availability HA cluster; 设置第三节点进入热备份状态。Set the third node to hot standby status. 8.根据权利要求1所述的基于工程监理平台的信息传输方法,其特征在于,所述对网络传输路径中的每个节点使用Al智能检测异常网络行为,并对异常网络行为执行分级处置策略,维护网络传输路径的安全,包括:8. The information transmission method based on the engineering supervision platform according to claim 1 is characterized in that the method uses AI intelligent detection of abnormal network behavior for each node in the network transmission path, and implements a hierarchical disposal strategy for the abnormal network behavior to maintain the security of the network transmission path, including: 基于Transformer和Autoencoder的联合模型检测异常网络行为:Detect abnormal network behavior based on the joint model of Transformer and Autoencoder: Transformer编码模块:Transformer encoding module: 提取节点传输流量的特征Xfeature,使用嵌入层映射特征到高纬空间,多头注意力机制提取关键时序特征:Extract the feature X feature of the node transmission traffic, use the embedding layer to map the feature to the high-dimensional space, and use the multi-head attention mechanism to extract the key timing features: 其中,Qsoftmax,Ksoftmax,dsoftmax,Tsoftmax,Vsoftmax分别为查询、键、值向量维度、时间步和值; Among them, Q softmax , K softmax , d softmax , T softmax , V softmax are query, key, value vector dimensions, time steps and values respectively; 捕获全局时序依赖的高纬特征;Capture high-dimensional features of global temporal dependencies; Autoencoder解码模块:Autoencoder decoding module: 获取高纬特征;Get high-dimensional features; 使用全连接层还原高纬特征到原始空间;Use fully connected layers to restore high-dimensional features to the original space; 最小化重构误差:其中,Nfeature是特征的个数,X′feature[i]是重构的特征;Minimize the reconstruction error: Among them, N feature is the number of features, X′ feature [i] is the reconstructed feature; 异常检测模块:Anomaly Detection Module: 计算提取的节点传输流量的特征的均值μfeature和标准差σfeatureCalculate the mean μ feature and standard deviation σ feature of the extracted node transmission traffic features; 计算记为异常分值;calculate Recorded as abnormal score; 设定异常阈值,若异常分值≧异常阈值,则网络行为异常;Set an abnormal threshold. If the abnormal score ≧ the abnormal threshold, the network behavior is abnormal. 当检测到异常网络行为,生成报警信息,将报警信息上传到工程监理平台的安全管理中心;When abnormal network behavior is detected, an alarm message is generated and uploaded to the security management center of the engineering supervision platform; 将检测到异常网络行为的时刻记为第一时刻;The moment when the abnormal network behavior is detected is recorded as the first moment; 设定异常告警时段;Set abnormal alarm period; 将第一时刻后间隔告警时段的时刻记为第二时刻;Record the time after the first moment and the interval of the alarm period as the second moment; 在第二时刻检测异常网络行为是否结束,若异常网络行为未结束,则自动终止异常网络行为。At the second moment, it is detected whether the abnormal network behavior has ended. If the abnormal network behavior has not ended, the abnormal network behavior is automatically terminated. 9.用于实现权利要求1至8任一项所述的基于工程监理平台的信息传输方法的系统,其特征在于,包括:9. A system for implementing the information transmission method based on the engineering supervision platform according to any one of claims 1 to 8, characterized in that it comprises: 会话管理模块,生成并维护现场监理人员与项目管理人员之间的会话;The session management module generates and maintains the sessions between the on-site supervisors and the project managers; 网络监测与流量控制模块,监测带宽与丢包率,动态调整加密强度;Network monitoring and traffic control module, monitoring bandwidth and packet loss rate, dynamically adjusting encryption strength; 数据分类与压缩模块,对施工数据按类别分类,执行对应的压缩算法;The data classification and compression module classifies the construction data by category and executes the corresponding compression algorithm; 密钥管理模块,生成、更新主密钥与会话密钥,分发执行密钥;Key management module, generates and updates master keys and session keys, and distributes execution keys; 数据加密与签名模块,实现双层加密和数字签名,保障数据安全;Data encryption and signature module, realizing double-layer encryption and digital signature to ensure data security; 数据传输与故障处理模块,管理数据加密传输,监测节点健康,执行故障冗余备份;Data transmission and fault handling module, which manages data encryption transmission, monitors node health, and performs fault redundancy backup; 异常行为检测与处理模块,识别异常访问与未知IP,执行分级处置策略;Abnormal behavior detection and processing module, identifying abnormal access and unknown IP, and implementing hierarchical disposal strategies; 区块链日志记录模块,记录会话日志,确保数据不可篡改;The blockchain logging module records session logs to ensure that data cannot be tampered with; 用户权限管理模块,管控用户权限,保障数据访问安全;User rights management module, which controls user rights and ensures data access security; 安全管理中心,处理网络异常与故障报警,提供系统级安全保障。The security management center handles network anomalies and fault alarms and provides system-level security protection.
CN202510343703.2A 2025-03-22 2025-03-22 An information transmission method and system based on engineering supervision platform Active CN119865381B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510343703.2A CN119865381B (en) 2025-03-22 2025-03-22 An information transmission method and system based on engineering supervision platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510343703.2A CN119865381B (en) 2025-03-22 2025-03-22 An information transmission method and system based on engineering supervision platform

Publications (2)

Publication Number Publication Date
CN119865381A CN119865381A (en) 2025-04-22
CN119865381B true CN119865381B (en) 2025-07-04

Family

ID=95389309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510343703.2A Active CN119865381B (en) 2025-03-22 2025-03-22 An information transmission method and system based on engineering supervision platform

Country Status (1)

Country Link
CN (1) CN119865381B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118965452A (en) * 2024-07-24 2024-11-15 惠州市金惠投数智科技有限公司 A construction data storage and sharing method and system based on BIM+GIS
CN119449479A (en) * 2024-12-25 2025-02-14 珠海格力电器股份有限公司 Data encryption method, device, computer program product and data encryption system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9183380B2 (en) * 2011-10-11 2015-11-10 Citrix Systems, Inc. Secure execution of enterprise applications on mobile devices
CN109829693A (en) * 2019-01-21 2019-05-31 浙江浙东建设有限公司 One kind being used for Construction Schedule management system and management method
CN114782022B (en) * 2022-05-11 2022-12-06 保利长大工程有限公司 Construction digital monitoring method and equipment based on identity authentication and storage medium
CN119676700A (en) * 2025-02-21 2025-03-21 山东省邮电工程有限公司 End-to-end encrypted communication method and electronic equipment in wireless communication construction

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118965452A (en) * 2024-07-24 2024-11-15 惠州市金惠投数智科技有限公司 A construction data storage and sharing method and system based on BIM+GIS
CN119449479A (en) * 2024-12-25 2025-02-14 珠海格力电器股份有限公司 Data encryption method, device, computer program product and data encryption system

Also Published As

Publication number Publication date
CN119865381A (en) 2025-04-22

Similar Documents

Publication Publication Date Title
Hei et al. A trusted feature aggregator federated learning for distributed malicious attack detection
CN113115315B (en) IOT equipment behavior credible supervision method based on block chain
KR102153673B1 (en) Method, system and recordable medium for storing and transmission processing of intelligent CCTV video data using the edge blockchain
CN117040896A (en) Internet of things management method and Internet of things management platform
CN112653664A (en) High-safety and reliable data exchange system and method between networks
CN104579781A (en) Smart power grid aggregation method and system for differential privacy security and fault tolerance
CN119089482B (en) A data security system based on dynamic data splitting
CN118748619B (en) A secure communication verification method and system for the Internet of Things
CN119966720A (en) A communication method for power asset management master station system and mobile terminal
CN113094743A (en) Power grid data storage method based on improved Byzantine consensus algorithm
CN119598484A (en) A data security management system and method in a smart grid
CN115208779B (en) Data stream monitoring method based on block chain and big data and cloud computing service platform
CN107919970A (en) A kind of log management realization method and system of safe O&M service cloud platform
CN120342744A (en) Energy storage terminal remote security upgrade method and system based on end-to-end encryption
CN116151826A (en) Efficient and reliable block chain-based power transaction terminal trust management method
Chen et al. [Retracted] A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques
CN119276635A (en) An Internet of Things secret modification integrated information security protection system
CN119865381B (en) An information transmission method and system based on engineering supervision platform
CN117998096A (en) Video transmission method and device based on video communication, electronic equipment and medium
CN115643030A (en) Power distribution network security multi-level blocking emergency response system and method
CN119449471B (en) Internet data encryption method and system
CN120434052B (en) WebRTC-based vehicle-mounted video stream safe transmission management method
CN120217409A (en) A government data security management system for an electronic government platform
CN119276530A (en) A method and system for constructing a safety protection system for a hydropower station monitoring system
CN120454989A (en) Method, device and electronic equipment for encrypting Internet of Things devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant