Invention content
The object of the present invention is to provide a kind of production traceability system and its method of work, to record production process and lifeThe environmental data in workshop is produced, and the video data of production process and environmental data are stored in monitor terminal.
In order to solve the above technical problem, the present invention provides a kind of production traceability system, including:Monitor terminal, clothesBusiness device and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, with the processingVideo acquisition module that device module is connected, context detection module;The processor module is also connected with a communication module, will acquireTo video data and environmental data be sent to server;And the server is suitable for the video data and environment that will receiveData are sent to monitor terminal, to be preserved.
Further, it is described production traceability system further include information back-up subsystem, the information back-up subsystem be suitable for pairVideo data in monitor terminal is backed up.
Further, described information backup subsystem includes:Bound device, Cloud Server, third party authentication server and instituteState monitor terminal;Wherein described monitor terminal is suitable for establishing binding relationship with bound device;The monitor terminal be suitable for obtain byThe first key pair that first public key and the first private key are formed, and using the first public key to video data and environmental data to be backed upOne-time pad encryption is carried out, obtains the first encryption information;The monitor terminal is suitable for obtaining by the second public key and second from Cloud ServerThe second key pair that private key is formed;The monitor terminal is suitable for obtaining key modifier from third party authentication server, reusesThe key modifier modifies to the second key pair, obtains the third key pair being made of third public key and third private key;WithAnd the monitor terminal carries out secondary encryption, and will be in the second obtained encryption information using third public key to the first encryption informationCloud Server is reached to be backed up.
Further, the monitor terminal is suitable for generation first key pair;And after one-time pad encryption is completed, by first keyIt is preserved to being sent to bound device, and deletes the first key pair in monitor terminal.
Further, the bound device is suitable for generation first key pair and the monitor terminal from the bound deviceFirst key is obtained to carrying out one-time pad encryption, and after the completion of one-time pad encryption, delete the first key pair in caching.
Further, it after the monitor terminal completes secondary encryption, is carried out suitable for third key pair is sent to bound deviceIt preserves, and deletes the third key pair in monitor terminal.
Further, when needing to obtain video data and environmental data, the monitor terminal is downloaded from Cloud Server and is backed upThe second encryption information and the monitor terminal obtain first key pair and third key pair from bound device, then again successivelyThe second encryption information and the first encryption information are decrypted respectively using third private key and the first private key, to obtain video countsAccording to.
Further, it after monitor terminal obtains the second key pair from Cloud Server, is disconnected with Cloud Server;Work as needsWhen uploading backup information, Cloud Server is logged in again.
Further, the key modifier is suitable for being previously provided with several set key modification strategies.
Another aspect, the present invention also provides a kind of method of work for producing traceability system, including:Monitor terminal, clothesBusiness device and several monitoring devices for being distributed in workshop;Wherein described monitoring device includes processor module, with the processingVideo acquisition module that device module is connected, context detection module;The processor module is also connected with a communication module, will acquireTo video data and environmental data be sent to server;And the server is suitable for the video data and environment that will receiveData are sent to monitor terminal, to be preserved.
The invention has the advantages that the production traceability system and its method of work of the present invention are able to record production processAnd the environmental data of workshop, and the video data of production process and environmental data are stored in monitor terminal, it recyclesInformation back-up subsystem backs up video data and environmental data, it is ensured that the safety of video data and environmental data,It avoids losing video data and environmental data, and the situation of production process can not be traced and rival is avoided to steal productionThe video data of process, and cause heavy losses.
Embodiment 1
Fig. 1 is the functional block diagram of present invention production traceability system.
As shown in Figure 1, the present embodiment 1 provides a kind of production traceability system, including:Monitor terminal, server and pointCloth is in several monitoring devices of workshop;Wherein described monitoring device includes processor module, with the processor module phaseVideo acquisition module even, context detection module;The processor module is also connected with a communication module, by collected videoData and environmental data are sent to server;And the server is suitable for sending the video data and environmental data that receiveTo monitor terminal, to be preserved.
Specifically, the video acquisition module is such as, but not limited to camera, and can according to the size of workshop andThe layout of production equipment carries out distribution setting,;The processor module is such as, but not limited to using MSP430 microcontrollers;It is described logicalModule is interrogated such as, but not limited to using Ethernet;The context detection module is such as, but not limited to temperature and humidity acquisition module, withAcquire the data of the Temperature and Humidity module of workshop;The temperature and humidity acquisition module is such as, but not limited to using SHT10 Temperature Humidity Sensors.
Due to the development of cloud, the production process information that most enterprises have been accustomed to monitor backs up to cloud serviceDevice, although this easily, fast, but if relevant information directly is backed up to Cloud Server, once by hacker attack, is causedThe leakage of information, it will serious loss is caused to enterprise.
Therefore, the production traceability system further includes information back-up subsystem, which is suitable for prisonVideo data and environmental data in control terminal are backed up.
Fig. 2 is the structure diagram of the information back-up subsystem of present invention production traceability system.
As shown in Fig. 2, described information backup subsystem includes:Bound device, Cloud Server, third party authentication server andThe monitor terminal;Wherein described monitor terminal is suitable for establishing binding relationship with bound device;The monitor terminal is suitable for obtainingThe first key pair being made of the first public key and the first private key, and using the first public key to video data to be backed up and environment numberAccording to one-time pad encryption is carried out, the first encryption information is obtained;The monitor terminal is suitable for obtaining by the second public key and the from Cloud ServerThe second key pair that two private keys are formed;The monitor terminal is suitable for obtaining key modifier from third party authentication server, then makeIt is modified with the key modifier to the second key pair, obtains the third key pair being made of third public key and third private key;And the monitor terminal carries out the first encryption information secondary encryption, and the second encryption information that will be obtained using third public keyCloud Server is uploaded to be backed up.
Specifically, the monitor terminal is such as, but not limited to mobile phone, computer, PAD etc.;The bound device is for example but notMobile phone, computer, PAD or wearable device etc. are limited to, the bound device may be the same or different with monitor terminal;Monitor terminal and bound device establish binding relationship in advance.
Specifically, monitor terminal logs in third party authentication server, key is obtained from the third party authentication serverModifier;Key modifier is positioned in third party authentication server by user in advance, and the key modification strategy of permission is addedIt is downloaded in key modifier, so that user can timely obtain key modifier as needed.
Specifically, can have more set key modification strategies in key modifier, different information uses different modificationsStrategy, optionally, key modification strategy can be when needed adjusted by user.
The monitor terminal is suitable for generation first key pair;And after one-time pad encryption is completed, by first key to sendingIt is preserved to bound device, and deletes the first key pair in monitor terminal.
Specifically, first key thereby guarantees that first key can to only having one people of user to can be generated by monitor terminalKnow, after the completion of encryption, monitor terminal preserves first key to being sent to bound device, and monitor terminal is then close by firstKey, wherein no longer preserving first key to information, even if user monitoring terminal is lost as a result, can also ensure information to deletingIt is not leaked, and then ensure that the safety of information.
The bound device is suitable for generation first key pair and the monitor terminal and obtains first from the bound deviceKey pair carries out one-time pad encryption, and after the completion of one-time pad encryption, deletes the first key pair in caching.
Specifically, first key, to can also be generated by bound device, monitor terminal is obtained by the interaction with bound deviceTake first key pair, be used to implement the encryption to information, after the completion of encryption, monitor terminal by first key to delete, thus, it is possible toLeakage of the first key to information is enough prevented, so as to improve the safety of information.
After the monitor terminal completes secondary encryption, preserved suitable for third key pair is sent to bound device, andDelete the third key pair in monitor terminal.
Specifically, monitor terminal preserves third key pair into bound device after secondary encryption is carried out, and delete slowThird key pair in depositing;The information of first key pair and third key pair is maintained in bound device, even if the prison of enterpriseControl terminal is lost or damage, enterprise can still interact with Cloud Server according to the cipher key pair information in bound device, obtainTake video data and environmental data.
When needing to obtain video data and environmental data, the monitor terminal is downloaded second backed up from Cloud Server and is addedConfidential information and the monitor terminal obtain first key pair and third key pair from bound device, then use third successively againPrivate key and the first private key are respectively decrypted the second encryption information and the first encryption information, to obtain video data and environment numberAccording to.
Specifically, when needing to obtain video data and during environmental data, monitor terminal downloads the of backup from Cloud ServerTwo encryption information;Monitor terminal is decrypted successively using third private key and the first private key, obtains video data and environmental data.Wherein, it when first key pair and third key pair are stored in bound device, after the download for completing information, disconnects and being taken with cloudThe connection of business device;Then corresponding key pair is obtained from bound device again, information is decrypted, obtain video data and environmentData so that Cloud Server is in encryption process in the environment being relatively isolated, further improve the safety of information.
After monitor terminal obtains the second key pair from Cloud Server, disconnected with Cloud Server;It is standby when needing to uploadDuring part information, Cloud Server is logged in again.
Specifically, the obtaining step of key modifier can be after the second key pair be obtained, i.e., from cloud from Cloud ServerAfter server obtains the second key pair, the connection with Cloud Server is disconnected, then performs the obtaining step of key modifier again,It is possible thereby to so that for server side, the operation to the second key pair can not be known, further improve the safety of keyProperty.
The second encryption information is decrypted specifically, the second key pair can also be realized, and is obtained and backup information classThe identical fake information of type.
It can be seen that in above process, secondary add is carried out using the third key pair being converted to through the second key pairClose, which thereby enhance hacker breaks close difficulty, and can also be decrypted due to the use of the second key pair, even if thus cloud serviceDevice information leakage, what other people obtained is also fake information, can not obtain true information, however steal information side is not due to knowingThe true and false of information, then when it carries out illegal activity using fake information, it is easier to be found, it can be seen that, the present invention is not onlyThe safety of information is improved, while assists in and finds using illegal activities caused by the information of leakage, it is effective to ensureUser equity.
Specifically, bound device communicates with monitor terminal channel safe to use, and escape way is based on the second netNetwork realizes, optionally, the second network can be short distance communication network, such as bluetooth, NFC;Monitor terminal and Cloud Server baseIt communicates in the first network different from the second network;Different network environments causes at the acquisition of key and the transmission of dataUnder different network environments, mutually isolated network environment improves the safety of data.
The information back-up subsystem of the present embodiment is encrypted information by first key pair and third key pair, andAnd first key pair and third key pair are unknown for Cloud Server, only monitor terminal can obtain, so that i.e.Make the information leakage of Cloud Server, other people can not also obtain original information, ensure that the safety of backup information;Moreover,The present invention is based on multiple networks to communicate, and cipher key acquisition process is in from data transmission procedure in different networks, furtherImprove the safety of network.
The production traceability system of the present invention is able to record the environmental data of production process and workshop, and will productionThe video data and environmental data of process are stored in monitor terminal, recycle information back-up subsystem to video data and environment numberAccording to being backed up, it is ensured that the safety of video data and environmental data avoids losing video data and environmental data, and can notIt traces the situation of production process and rival is avoided to steal the video data of production process, and cause heavy losses.