CN108183553B - Data testing and collecting monitoring device, smart power grid and user side thereof - Google Patents

Data testing and collecting monitoring device, smart power grid and user side thereof Download PDF

Info

Publication number
CN108183553B
CN108183553B CN201810006240.0A CN201810006240A CN108183553B CN 108183553 B CN108183553 B CN 108183553B CN 201810006240 A CN201810006240 A CN 201810006240A CN 108183553 B CN108183553 B CN 108183553B
Authority
CN
China
Prior art keywords
control center
acquisition terminal
wireless data
data acquisition
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810006240.0A
Other languages
Chinese (zh)
Other versions
CN108183553A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningxia LGG Instrument Co Ltd
Original Assignee
Ningxia LGG Instrument Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningxia LGG Instrument Co Ltd filed Critical Ningxia LGG Instrument Co Ltd
Priority to CN201810006240.0A priority Critical patent/CN108183553B/en
Publication of CN108183553A publication Critical patent/CN108183553A/en
Application granted granted Critical
Publication of CN108183553B publication Critical patent/CN108183553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B70/00Technologies for an efficient end-user side electric power management and consumption
    • Y02B70/30Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S20/00Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
    • Y04S20/20End-user application control systems
    • Y04S20/242Home appliances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/126Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission

Abstract

The invention discloses a data testing and collecting monitoring device, an intelligent power grid and a user side thereof, wherein the system comprises a data monitoring and processing module, a data acquisition module and a data processing and processing module, wherein the data monitoring and processing module is used for processing and monitoring data sent by a wireless data acquisition terminal; the control center is used for controlling the operation of the whole system; the client monitoring module is used for monitoring the wireless sensor network nodes; and the display terminal is used for realizing the man-machine interaction between the monitoring system and the administrator. The system can realize wireless detection and transmission of the power utilization information of the smart grid users, can ensure the detection continuity and accuracy of the power utilization data of the users, and can greatly ensure the confidentiality and the safety of the power utilization information transmission.

Description

Data testing and collecting monitoring device, smart power grid and user side thereof
The application has the following application numbers: 201510586655.6, filing date: the invention is filed on 15.09.2015, entitled "monitoring device for wireless test and data transmission system".
Technical Field
The invention relates to the field of data testing, data acquisition and monitoring, in particular to a monitoring device of a wireless testing and data transmission system of a smart grid user side.
Background
Smart grids, also known as knowledge-based grids or modern grids, are new grids formed by highly integrating modern advanced sensing and measurement technologies, information communication technologies, control technologies and original power transmission and distribution infrastructure. The openness of the intelligent power distribution network enables a large number of intelligent acquisition terminals and mobile terminals to be widely applied and accessed, and therefore a new challenge is provided for the problems of integrity, confidentiality, attack resistance, privacy protection and the like of data transmission in the intelligent power distribution network. The intelligent electric energy meter is an intelligent terminal of an intelligent power grid, is not an electric energy meter in the traditional sense, has intelligent functions such as bidirectional multi-rate metering function, user side control function, bidirectional data communication function of multiple data transmission modes, electricity larceny prevention function and the like in order to adapt to the use of the intelligent power grid and new energy besides the metering function of basic electricity consumption of the traditional electric energy meter, and represents the development direction of an intelligent terminal of a future energy-saving intelligent power grid end user.
In recent years, Wireless Sensor Networks (WSNs) have been developed with the development and integration of technologies such as sensors, computers, wireless communication, and micro-electro-mechanical systems. The wireless sensor network monitors, senses and acquires information of various environments or monitored objects in real time in a cooperative manner through various integrated micro sensors, and is widely applied to various fields such as environment monitoring, medical treatment and health, military defense, anti-terrorism and disaster relief and the like. The wireless sensor network is considered as one of the most important technologies in the 21 st century, is a hotspot for the research in the embedded field at present, and has very wide market space and research value. The wireless sensor network is also gradually becoming the most important user end data acquisition system in the intelligent power distribution network.
At present, the problems of integrity, confidentiality, attack resistance and the like of wireless sensor network data transmission are studied to some extent at home and abroad, and various broadcast authentication protocols are proposed. One is the μ TESLA broadcast authentication protocol, which is performed in a unicast manner by using a shared key between the base station and the node when allocating initialization parameters for broadcast authentication. The integrity of the transmitted data packet is determined by delaying the transmission of the authentication key and determining the time delay. The scheme has better security, but the message authentication has delay, and the delay can cause DOS attack. Later researchers made a series of improvements to μ TESLA, proposing a multi-level μ TESLA scheme, a multi-base station μ TESLA scheme, a μ TESLA optimization scheme for authentication drift, and a message-driven μ TESLA-based authentication scheme, among others. These optimization schemes are all improvements made on the basis of basic μ TESLA, the basic idea is not changed, so that the time delay is a persistent problem, and the optimization schemes still cannot resist DOS attacks. Other researchers have proposed a one-time signature authentication scheme in the smart grid, but the scheme consumes a large amount of signature and authentication overhead to achieve good security. Later researchers put forward a broadcast authentication protocol based on a Merkle tree, the protocol adopts a direct authentication method, delay is avoided, the DOS attack problem is effectively solved, and the functions of authentication and mutual authentication of a plurality of nodes are realized. However, when the number of nodes is too large, the problem that the storage overhead and the communication overhead of the nodes are too large is caused. Therefore, researchers put forward a broadcast strategy of a hierarchical Merkle tree on the basis of the basic Merkle tree, and the method is designed aiming at a large number of nodes, so that the storage and communication expenses of the nodes are greatly reduced. In recent years, researchers have proposed that a Merkle tree authentication protocol is applied to a smart grid, and the protocol is applied to secure communication between a user and a community portal to improve the security of communication. But effective privacy protection is not carried out on user data, and useful data can be read out by an attacker intercepting information sent by a user. The leakage of the electricity utilization information, the electricity utilization rule and other privacy of the user can cause burglary and other events which harm the life safety of people.
Disclosure of Invention
The invention provides a monitoring device of a wireless test and data transmission system, which can realize wireless detection and transmission of power consumption information of a smart grid user, can ensure the detection continuity and accuracy of the power consumption data of the user, and can greatly ensure the confidentiality and safety of power consumption information transmission.
In order to achieve the above object, the present invention provides a monitoring device of a wireless test and data transmission system, wherein the system has a wireless sensor network node, a monitoring device and a wireless data transmission module, wherein a wireless data acquisition terminal of the wireless sensor network node is wirelessly connected with the monitoring device through the wireless data transmission module;
the monitoring device includes:
the data monitoring and processing module is used for processing and monitoring the data sent by the wireless data acquisition terminal;
the control center is used for controlling the operation of the whole system;
the client monitoring module is used for monitoring the wireless sensor network nodes;
and the display terminal is used for realizing the man-machine interaction between the monitoring system and the administrator.
Preferably, the control center is a low-power consumption single chip microcomputer, preferably adopts an MSP430F149 single chip microcomputer, and of course, other single chip microcomputers, such as an ARM single chip microcomputer or an AVR single chip microcomputer, can also be adopted.
Preferably, the data monitoring and processing module and the wireless data transmission module can jointly construct a safe communication channel, the wireless data acquisition terminal and the control center are connected in a bidirectional mode, and the control center processes and controls the data entering the monitoring device.
Preferably, the control center completes the safety verification of the wireless data acquisition terminal through the safety communication channel, if the acquisition terminal is unsafe, the acquisition terminal is prevented from entering the monitoring device for data storage and exchange, and if the acquisition terminal is safe, the wireless data acquisition terminal is allowed to perform data storage and exchange.
Preferably, the control center can encrypt all data storage and exchange processes in the system.
Preferably, the client control module can send the control instruction of the control center to the wireless data acquisition terminal in a wireless transmission mode so as to control data acquisition of the wireless data acquisition terminal.
The invention has the following advantages and beneficial effects: (1) the wireless sensor network node can realize real-time acquisition of information such as environmental temperature, humidity, voltage, current, active power, reactive power and the like of a smart grid user; (2) networking is performed in a wireless mode, so that the resource amount occupied in the data transmission process is greatly reduced, the implementation cost is reduced, the installation and the maintenance are convenient, the power utilization information of a plurality of intelligent power grid users is uniformly monitored in a control room, the monitoring efficiency is improved, and the labor cost is saved; (3) the improved data acquisition terminal and the data processing module can ensure the monitoring continuity and accuracy of climate data and accurately guide agricultural production; (4) by establishing a secure communication channel, data storage and exchange processes in the system are encrypted, so that the security and reliability of system communication can be ensured, and the leakage of power utilization information of users can be avoided.
Drawings
Fig. 1 shows a block diagram of a wireless test and data transmission system with a monitoring device according to the invention.
Fig. 2 shows a method for monitoring a wireless test and data transmission system according to the present invention.
Detailed Description
Fig. 1 shows a wireless test and data transmission system with a monitoring device according to the invention. The system comprises: the wireless sensor network node 1 is used for detecting and collecting user side information of the smart grid; the monitoring device 3 is used for controlling the operation and data processing of the whole system; the wireless data transmission module 2 is used for wirelessly transmitting the user data acquired by the wireless sensor network node to the monitoring device; the wireless sensor network node 1 comprises a plurality of sensor nodes 11 and a wireless data acquisition terminal 12; wherein, the wireless data acquisition terminal 12 and the monitoring device of the wireless sensor network node 1 are connected with the monitoring device through the wireless data acquisition terminal 3
The line data transmission module 2 is connected wirelessly.
The monitoring device 3 includes: a data monitoring and processing module 31, a control center 32, a client monitoring module 33 and a display terminal 34. Preferably, the control center 32 is a low-power consumption single-chip microcomputer, preferably an MSP430F149 single-chip microcomputer, and of course, other single-chip microcomputers, such as an ARM single-chip microcomputer or an AVR single-chip microcomputer, may also be used.
The data monitoring and processing module 31 and the wireless data transmission module 2 can together construct a secure communication channel, and are connected with the wireless data acquisition terminal 12 and the control center 32 in a bidirectional manner, and the control center 32 processes and controls the data entering the monitoring device 3.
The control center 32 completes the security verification of the wireless data acquisition terminal through the secure communication channel, if the acquisition terminal is not secure, the acquisition terminal 12 is prevented from entering the monitoring device 3 for data storage and exchange, and if the acquisition terminal 12 is secure, the wireless data acquisition terminal 12 is allowed to perform data storage and exchange.
The control center 32 can encrypt all data stored and exchanged in the system.
The client control module 34 may send the control instruction of the control center 32 to the wireless data acquisition terminal 12 in a wireless transmission manner, so as to control data acquisition of the wireless data acquisition terminal 12.
The control center 32 is equipped with monitoring software having a monitoring function and capable of storing data in a software format and is configured with a background real-time database. The central control module is provided with monitoring software which is customized and developed, and continuous acquisition, viewing and storage of monitoring data are realized. The software has multiple monitoring functions, such as real-time monitoring, real-time curve display, historical curve display, alarming and the like. The software is configured with a background real-time database, and can store the acquired data according to actual requirements, such as timing storage, change storage and the like; meanwhile, the software supports the data to be stored into common software formats such as Excel and the like, so that the data can be conveniently used subsequently.
The wireless data acquisition terminal 12 is provided with a firewall module, an encryption module is respectively arranged in the wireless data acquisition terminal 12 and the wireless data transmission module 2, an identity verification module is further arranged in the wireless data transmission module, and a double-channel connecting module which is mutually independent is arranged between the data transmission module and the firewall module.
The wireless data acquisition terminal 12 includes: the device comprises an MCU, an analog input unit, a switching value input unit, a relay output unit, a digital output unit, an SRAM unit, an RTC unit, a watchdog unit, an RS232/RS485/RS422 unit, a wireless unit and a power supply unit; the device comprises an analog quantity input unit, a switching quantity input unit, a relay output unit, a digital quantity output module unit, an SRAM unit, an RTC unit, a watchdog unit, an RS232/RS485/RS422 unit, a wireless unit and an LED indicator light unit, wherein the analog quantity input unit and the switching quantity input unit are connected with the MCU; the RS232/RS485/RS422 unit is connected with the user interface circuit, and the wireless unit is connected with the ZigBee transmission antenna and the adapter circuit.
The wireless data transmission module 2 comprises a ZigBee receiving antenna, an adapter circuit and a data bus, and is used for receiving wireless signals of the data acquisition terminal and transmitting the wireless signals to the data processing module through the data bus.
The sensor node 11 may include: the air humidity sensor comprises one or the combination of two or more of an air temperature sensor, an air humidity sensor, a voltage sensor, a current sensor, an active sensor and a reactive sensor.
The wireless data acquisition terminal 12 adopts a high-performance industrial wireless module and a high-performance industrial 32-bit communication processor, supports multi-stage sleep and wake-up modes, reduces power consumption to the maximum extent, is internally provided with a real-time clock (RTC), and supports timing on/off. Preferably, a metal shell is adopted, the protection grade is IP30, and the metal shell is safely isolated from the system and is particularly suitable for application in industrial control sites. The wireless data acquisition terminal adopts a WDT watchdog design to ensure the stability of the system, adopts a complete wire-dropping prevention mechanism to ensure that the data terminal is always online, and has a built-in 15KVESD protection of an S232/RS485 interface and an antenna interface for lightning protection.
Fig. 2 shows a method for monitoring a wireless test and data transmission system according to the present invention. The method specifically comprises the following steps:
s1, constructing a communication system comprising a control center, a wireless data acquisition terminal and a wireless data transmission module, wherein the wireless data acquisition terminal can send and receive data to the wireless data transmission module;
s2, establishing a safe communication channel, connecting the wireless data acquisition terminal and a control center in a two-way manner, and processing and controlling the data of the wireless data acquisition terminal entering the system by the control center;
and S3, the control center completes the safety verification of the wireless data acquisition terminal through the safety communication channel, if the acquisition terminal is unsafe, the wireless data acquisition terminal is prevented from entering the system to perform data encryption storage and exchange, and if the acquisition terminal is safe, the acquisition terminal is allowed to perform data encryption storage and exchange.
The establishment of the secure communication channel is completed in S2 by the following steps:
s21, when the wireless data acquisition terminal sends a connection application to the control center, the wireless data acquisition terminal firstly inquires whether session connection information with the control center is cached or not, if so, the session key is subjected to abstract calculation by using an abstract algorithm cached in the session connection information, and a session number and an abstract result are written into session ID and session key abstract fields of a connection application packet; inquiring whether the certificate of the control center is cached or not, if so, writing the certificate serial number of the control center into the certificate serial number field of the control center connected with the application packet, and writing the serial number of the wireless data acquisition terminal certificate into the certificate serial number field of the wireless data acquisition terminal; filling in an asymmetric encryption and digital signature algorithm combination list, and sending a connection application to a control center;
s22, after receiving a connection application data packet sent by the wireless data acquisition terminal, the control center inquires whether corresponding session connection information is cached according to the session number, if so, the session key is subjected to abstract calculation by using an abstract algorithm cached in the session connection information, and a calculation result is compared with abstract data of the session key sent by the wireless data acquisition terminal; if the comparison result is consistent, the session key and the symmetric algorithm are used as the key and the algorithm for data protection in the secure communication channel, and the next step is carried out;
and S23, the control center sends a negotiation ending command to the terminal, and the terminal finishes establishing the safety channel after receiving the negotiation ending command sent by the control center.
In S22, if the comparison result is not consistent, the following steps are executed:
s221, the control center reads a serial number of a control center certificate sent by the wireless data acquisition terminal, if the serial number of the control center certificate is consistent with a certificate serial number used by the local terminal, the control center does not send the certificate of the control center to the wireless data acquisition terminal, and the next process is executed;
s222, the control center reads a serial number of a wireless data acquisition terminal certificate sent by the wireless data acquisition terminal, and inquires whether the wireless data acquisition terminal certificate is cached or not according to the serial number; if so, the wireless data acquisition terminal is not required to send the certificate of the wireless data acquisition terminal to the control center, and the following working procedures are executed:
s2221, the control center reads an algorithm combination list sent by the wireless data acquisition terminal, selects a group of algorithm combinations with the highest encryption strength as encryption algorithm combinations used in the following process, sends the algorithm combinations to the wireless data acquisition terminal, and executes the next process;
s2222, the control center generates a group of temporary asymmetric key pairs, digital signature is carried out on the temporary public keys by using the private key of the control center and the asymmetric algorithms in the algorithm combination selected in the step S2221, a signature result and the temporary public keys are packaged, and a key interaction data packet is sent to the terminal;
s2223, sending a connection application end data packet to the wireless data acquisition terminal; s2224, the wireless data acquisition terminal receives a connection application response data packet sent by the control center, and caches the key negotiation algorithm combination and the session number; if the wireless data acquisition terminal receives a control center certificate data packet sent by a control center, the legitimacy of the control center certificate is verified, and if the verification is successful, the serial number in the certificate is used as an identifier to cache the digital certificate of the control center; if the verification fails, the process is exited, and the connection is disconnected; if the wireless data acquisition terminal receives an application data packet which is sent by the control center and applies for a certificate of the wireless data acquisition terminal, the certificate packet of the terminal is formed into a certificate data packet and sent to the control center; the wireless data acquisition terminal receives a key negotiation data packet sent by the control center, verifies the temporary public key signature information of the control center by using a public key in a cached control center certificate and an asymmetric algorithm in a cached key negotiation algorithm combination, and exits the process and breaks the link if the temporary public key signature information is unsuccessful; if successful, executing the next step;
s2225, the wireless data acquisition terminal randomly generates a session key as a key for data protection in the secure channel, and a symmetric algorithm in the algorithm combination is used as a protection algorithm; using the conversation number as an identifier, caching a conversation key, a symmetric algorithm and a digest algorithm; encrypting the session key by using an asymmetric algorithm, and digitally signing the encrypted session key by using the asymmetric algorithm; packaging the encrypted session key and the encrypted digital signature, and sending a key negotiation data packet to a control center;
s2226, sending a negotiation ending command to the control center;
s2227, if the control center receives the wireless data acquisition terminal certificate data packet, the legitimacy of the wireless data acquisition terminal certificate is verified, and if the verification is successful, the serial number in the certificate is used as an identifier, and the digital certificate of the control center is cached; if the verification fails, the process is exited, and the connection is disconnected;
s2228, after receiving the key negotiation data packet sent by the wireless data acquisition terminal, the control center uses the public key in the wireless data acquisition terminal certificate and the asymmetric algorithm in the algorithm combination selected in the step S22 to perform signature verification on the signature data, and if the signature verification is unsuccessful, the control center exits the process and breaks the link; if the session key is successful, decrypting the session key by using the local private key and the asymmetric algorithm, and caching the session key, the symmetric algorithm and the digest algorithm by using the session number generated in the step S22 as an identifier; and the session key and the symmetric algorithm are named as a key and an algorithm for data protection in the secure communication channel; step S23 is executed.
Preferably, in step S221, if the wireless data collection terminal certificate is not cached, the following procedure is added between step S2221 and step S2222: the control center sends a control center certificate to the wireless data acquisition terminal; and the control center sends a request for acquiring the certificate of the wireless data acquisition terminal to the wireless data acquisition terminal.
Preferably, in step S3, the specific process of the control center for encrypting, storing and exchanging data of the wireless data acquisition terminal that passes the security authentication and enters the system is completed by steps of S31 importing source data, S32 intercepting data, S33 system conversion, S34 character transcoding, S35 data reassembly, S36 character string replacement, S37 data missing storage, and the like, and the sequence of other processes except for step S31 and step S32 can be changed.
Preferably, in step S32, in the function of intercepting characters, three elements are required, that is, the character to be intercepted, the number of digits of interception and the starting position of interception, the source data is the character to be intercepted, the length of interception is specified, the value of the starting position of interception is obtained by splitting the password, machine code or data returned by the server end, which is input by the user, into several pieces, and then adding 1 to the several pieces, where the number of splits needs to be the same as the number of groups of source data planned to be imported.
Taking the MID (text, start _ num, num _ char) function as an example of password interception by the bank card, where text represents characters to be intercepted, i.e. source data, num _ char represents the number of intercepted bits, start _ num represents the initial position of interception, num _ char can be specified, when upgrading is needed, only the number of bits of source data needs to be changed, and num _ char value is specified again, for example, num _ char value is specified from 10 bits to 20 bits, the intercepted characters are changed from 10 bits to 20 bits, i.e. an extended algorithm, and start _ num value can divide 6 numbers of characters of the bank card input password, add 1 to the divided value, and intercept the characters as the start _ num value, the division method is more, examples of MID (password,1,1), MID (password,2,1), MID (password,3,1), MID (password,4,1), MID (password), MID (password,1, MID (password), MID (password, MID) is changed into 6 bits, namely, MID (6 bits), for example, the first group of 6 groups of source data is designated as text1, by using MID (text1, MID (password,1,1) +1, 20), text1 can be truncated starting from the position where the first digit of the password is added to 1, and 20 bits are truncated, the purpose of the truncated character is to hash simple data into complex data, for example, in the design process of bank card passwords, by which a password is hashed into the source data, after 6 groups of source data are introduced, the text value is the source data, and the start _ num value is MID (password, a, 1) +1 value, and a is the position of the password character, so that 6 groups of new data can be obtained, which are data of length num _ char value starting from one digit from 1 to 10, for example, 6 bits are truncated, which represent that from 7 bits, and 20 bits are truncated, in a simple password 000000 and a complex password 658973, the meanings of the two respectively indicate that the former is intercepted from the 1 st bit of 6 source data, and the latter indicates that the latter is intercepted from the 7 th bit, the 6 th bit, the 9 th bit, the 10 th bit, the 8 th bit and the 4 th bit of the 6 source data, which is irrelevant to the complexity of the password, as long as a password input person does not provide hardware for others and simultaneously lets others see the password input action, when the password is cracked from the stored password alone, the cracking difficulty of the two is not different, in the process of the step, each source data has 10 sub-data, namely, the number of the password combinations is increased by one million times.
Preferably, in step S33, if necessary, any data can be converted into another data, and in the process of converting the low data into the high data, since the high data needs more basic elements to represent, where the basic elements are 10 numbers like 0 to 9 in 10, the simpler data can be changed into complex data, and the data length is reduced, for example, pure digital data is changed into data with mixed numbers and letters, and sometimes, the complex data needs to be changed into simple data or non-digital data is changed into digital data.
For example, machine code is generally mixed data of numbers and letters, while Chinese characters are non-number data, in the GB2312 standard, the zone bit code of Chinese characters can be directly referred to, and converted into number data, or the text of the GB2312 standard is understood as 7445-system numbers (7445 includes non-chinese character symbols), so that the Chinese document is encrypted or applied to a digital certificate, and the Chinese text is understood as 7445-system numbers, converted into 10-system numbers, which is astonishingly large, for example, 5-bit numbers are converted into 10-system numbers, the number of bits reaches 20 bits, the highest value is 2.2873E +19, and then converted into 62-system data, that is, converted into mixed data of numbers and letters, the encryption does not use negative data, and therefore, carry bits are the same as 10-system data, and also are first power, second power, third power, etc. of the number of bits are sequentially increased, and when the number of data bits after conversion does not reach the number of bits required by program design, the high digits are complemented by 0, for example, the 10-ary data after conversion is 123, the required digits are 5, the high digits are complemented by 0 and 00123 to 5, most people contact English letters and numbers in comparison, examples are 62-ary and 10-ary conversions, the arabic numerals 0 to 9 represent 0 to 9, the lower case a to Z of letters represent 10 to 35, and the upper case a to Z of letters represent 36 to 61, other specified schemes are possible, the number or the letter local code described in the following part, and the transcoding algorithm follows the same rule, for example, the 62-ary data A6bJ9 is converted into the 10-ary data 36 + 624+6 + 623+11 + 622+45 + 62+9, which is 9 digits.
Preferably, the character transcoding in step S34 is implemented by using a character transcoding algorithm, and the method of obtaining another character or a group of characters by using a character or a group of characters through a transcoding algorithm is character transcoding, and transcoding is one-to-one transcoding whether a single character or a group of characters, only the latter converts several characters simultaneously, and the meaning of transcoding of a single character is not significant, so that a character group is transcoded, and character group transcoding requires a transcoding algorithm instruction set and a transcoding table to be implemented together.
An example is to design four numbers and letters transcoding algorithms, named ABCD algorithm, which follow the following law:
1: the result is not the same after the algorithm conversion that different source codes are the same;
2: the conversion results of several algorithms of the same source code cannot be the same;
3: the result of transcoding cannot be the same as the source code;
4: several transcoding algorithms are set for transcoding, so as to strengthen the combination complexity of the passwords,
examples are converted on the basis of the digit codes of numbers and letters, the digit codes of numbers 0 to 9 being the numbers 0 to 9, respectively, and the digit codes of lower case letters a to z being the numbers 10 to 35, respectively; the capital letters a to Z are numbers 36 to 61, respectively.
In the ABCD algorithms, among them, the 1 st algorithm, the 2 nd algorithm, and the 3 rd algorithm are mathematical operations based on the local code, but the 4 th algorithm is adjusted manually, and there is no algorithm rule,
algorithm 1: the 2 nd odd number of the number or the letter added with the home code is the transcoding algorithm of the number or the letter, if the result is more than or equal to 62, 62 is subtracted, and the number or the letter corresponding to the home code is recorded;
algorithm 2: after the home code of the number or the letter is added with the home code, the 13 th odd number is the B transcoding algorithm of the number or the letter, if the result is more than or equal to 62, 62 is subtracted, and the number or the letter corresponding to the home code is recorded;
algorithm 3: adding 30 to the local code of the number or the letter is the transcoding algorithm of the number or the letter, subtracting 62 if the result is more than or equal to 62, and recording the number or the letter corresponding to the local code;
algorithm 4: the 4 th algorithm partially follows the 3 rd even number of the digit or letter plus the home code to be the transcoding algorithm of the digit or letter, if the result is larger than or equal to 62, 62 is reduced, in order to prevent data identity conflict, partial position adjustment is carried out, the digit or letter corresponding to the home code is recorded, the design principle of the algorithm can know that each digit and letter before and after transcoding are not the same, the design principle is the most basic design point, when the algorithm is called, the 1 st algorithm, the 2 nd algorithm and the 3 rd algorithm can be directly called by using a data table or can be converted by using mathematical operation, however, the 4 th algorithm is manually adjusted and needs to be called by using the data table, other transcoding algorithms can also be designed, and the exemplary transcoding algorithm utilizes the similar fields to carry out ABCD sequencing of the algorithm.
Transcoding algorithm instruction set: each character to be transcoded is used as a source code, a transcoding direction needs to be instructed to obtain a correct result, data of an instruction set and data to be transcoded have a corresponding relation, namely one instruction character corresponds to one character to be transcoded and is converted into another character through an instruction rule, for example, the instruction set data is BACC, the data to be transcoded is 1234, namely, four data of 1234 are respectively executed with B algorithm, A algorithm, C algorithm and C algorithm.
Preferably, the replacing character string in step S36 is an encryption technology that replaces part of the characters in the characters with other characters, the replacement may be a single replacement or a character string replacement, and a preferred design scheme is character string replacement, the replacement is completed by using a character replacement table, data of the character replacement table is divided into a record number and a replacement character string, and the character appearing in the record number is the character to be replaced.
For example, when 5, a, b, 6 appears in the record number, that is, all the 5, a, b, 6 characters in the data to be replaced are extracted, grouping is performed, the number of digits of the grouped characters needs to be consistent with the number of digits of the record number, when the last group does not have corresponding digits, substitution or assignment of increased digits can be abandoned, for example, the first character is assigned to be superposed on the corresponding digits, the corresponding record number in the character substitution representation is searched, a substitution character string is determined, because the original positions of several extracted characters are different, the insertion position needs to be determined, the more common method is to convert several extracted characters into 10-system data, the remainder function is used for determining, for example, the remainder is increased by 1, the extracted characters are inserted in the original positions of the several characters, the spaces of other characters are removed, new data is obtained, the design of the record number of the character substitution representation needs to pay attention, the record number needs to list all possible combinations, otherwise, operation errors may occur, when 3-bit substitution is performed, 27 groups, namely 3-third power is needed, when 4-bit substitution is performed, 256 groups are needed for the record number, namely 4-fourth power is needed, if 5 bits are 5-fourth power, the number is up to 3125 groups, therefore, the number of substituted characters needs to be moderate, the data in the data table is too large and too small, the substituted data is not too long, otherwise, characters are possibly found by long data to be replaced by the characters, when 4 bits are substituted, the substituted data only needs 256 groups, when the characters are represented by English capital letters and numbers, one bit and two bits are enough, so short data substitution cannot be realized, the characters which do not exist in an encryption process or encryption data cannot be found by reversely searching the substituted character string, and the characters which do not exist in the encryption process or the encryption data are also prevented from being found by the substituted character string to be replaced by the characters, the reason is simple, if a certain character only appears in a certain data table, the character can be found at a glance, as long as the character existing in the encryption process or the encrypted data can be used as a substitute character, even if the original data character to be replaced can also appear, for example, four characters of 5, A, b and 6 are replaced, 5, A, b and 6 are still allowed to appear in the substitute data, the digit of the final password is uncertain due to different digits of the substituted character, the substitute character can be encrypted for multiple times by adopting a superposition encryption method, multiple character substitution representatives are designed, multiple times of encryption are completed by connecting data through multiple variables, for example, variable data 2356, 6987, 3087, 3075, 9837, 8863 and 5534, 6 groups of data are respectively divided by the total number of the character substitution representatives, and are connected to the corresponding data table to complete the substitution in sequence, namely, the substitution is firstly connected to the corresponding data table through 2356, the replaced data is used as source data, the data table connected with the corresponding data table by the data group 2 is used for completing replacement, and the like, the character replacement represents that the data table is slightly different from the same type of data table, namely different table record numbers can be different, which means that the number of bits of the record numbers can also be different, for example, the table 1 is used for replacing 5, A, b and 6, the table 2 is used for replacing c, 8, H and k, or the table 1 is used for completing 3-bit character replacement, and the table 2 is used for completing 4-bit character replacement, because the program designs that the number of bits and characters of the record numbers are searched to determine the number of the replaced characters and the number of the grouped bits, in the program design, the characters are preferably transcoded, subjected to binary conversion and intercepted to obtain the data with fixed length, and the data length is uncertain after the character replacement is completed, which brings difficulty to the compiling work of the character length dividing table in the encryption, although the values of the uncertain length values of the character length segmentation table are random, negative values cannot occur, namely the total number of other uncertain length values cannot be larger than the number of bits of data, therefore, the step of character replacement needs to be performed after other steps and before data is lost and stored, otherwise, the design is difficult.
Preferably, in the missing algorithm in step S37, when the source data is introduced by the join variables, there are often several groups of join variables, the join variables are divided into several groups, there are also several groups of corresponding introduced source data, the number of the groups of the join variables is too small, the password is easy to crack, if the join variables are not completely recorded, then values consistent with the encryption result can be obtained by sequentially encrypting the value ranges of the data, that is, the values of the data that may appear, and the number of times that may be required for calculation is related to the number of missing values, and the more missing values, the more calculation times that may be required.
For example, a group of missing data ABCD, where the ABCD ranges from 0 to 9, a matching value can be found from 0000 to 9999, if the source data is 6639, a result can be obtained from 0000 to 6639, in this process, 10000 times of operations are required at most, and for an encrypted result, if the data records are not complete, but the data position of the incomplete data can be obtained from the operation, when the sequential encryption is compared, the actually encrypted result is divided into several segments by the incomplete characters, the operation result needs to be matched with all the data, if the number of data bits after encryption is long, the probability of the same password is very small, because the data records are incomplete, there is almost no possibility of cracking from the recorded password, the missing value of the missing algorithm cannot be too complex, otherwise, the missing value cannot be delayed, and the missing algorithm has the same disadvantage as the asymmetric algorithm, it is not necessary and may not be used.
As described above, although the embodiments and the drawings defined by the embodiments have been described, it is apparent to those skilled in the art that various modifications and variations can be made from the above description. For example, the present invention may be carried out in a different order from the method described in the technology described, or may be combined or combined in a different manner from the method described for the constituent elements such as the system, the structure, the device, the circuit, and the like described, or may be replaced or substituted with other constituent elements or equivalents. For those skilled in the art to which the invention pertains, several equivalent substitutions or obvious modifications, which are equivalent in performance or use, should be considered to fall within the scope of the present invention without departing from the spirit of the invention.

Claims (8)

1. A data testing and collecting monitoring system is characterized in that the system is provided with a wireless sensor network node, a monitoring device and a wireless data transmission module, wherein a wireless data collecting terminal of the wireless sensor network node is wirelessly connected with the monitoring device through the wireless data transmission module, the monitoring device comprises a data monitoring and processing module and a control center, the data monitoring and processing module and the wireless data transmission module jointly construct a safe communication channel, the wireless data collecting terminal and the control center are connected in a bidirectional mode, and the control center processes and controls data entering the monitoring device;
the monitoring device also comprises a client monitoring module which is used for monitoring the wireless sensor network node; the display terminal is used for realizing the man-machine interaction between the monitoring system and the administrator;
the control center completes safety verification on the wireless data acquisition terminal through the safety communication channel, if the acquisition terminal is unsafe, the acquisition terminal is prevented from entering the monitoring device for data storage and exchange, and if the acquisition terminal is safe, the wireless data acquisition terminal is allowed to perform data storage and exchange;
the following method is adopted to establish a secure communication channel:
s1, constructing a communication system comprising a control center, a wireless data acquisition terminal and a wireless data transmission module, wherein the wireless data acquisition terminal can send and receive data to the wireless data transmission module;
s2, establishing a safe communication channel, connecting the wireless data acquisition terminal and a control center in a two-way manner, and processing and controlling data of the wireless data acquisition terminal entering the system by the control center;
s3, the control center completes safety verification of the wireless data acquisition terminal through a safety communication channel, if the acquisition terminal is unsafe, the wireless data acquisition terminal is prevented from entering a system to perform data encryption storage and exchange, and if the acquisition terminal is safe, the acquisition terminal is allowed to perform data encryption storage and exchange;
the establishment of the secure communication channel is completed in S2 by the following steps:
s21, when the wireless data acquisition terminal sends a connection application to the control center, the wireless data acquisition terminal firstly inquires whether session connection information with the control center is cached or not, if so, the session key is subjected to abstract calculation by using an abstract algorithm cached in the session connection information, and a session number and an abstract result are written into session ID and session key abstract fields of a connection application packet; inquiring whether the certificate of the control center is cached or not, if so, writing the certificate serial number of the control center into the certificate serial number field of the control center connected with the application packet, and writing the serial number of the wireless data acquisition terminal certificate into the certificate serial number field of the wireless data acquisition terminal; filling in an asymmetric encryption and digital signature algorithm combination list, and sending a connection application to a control center;
s22, after receiving a connection application data packet sent by the wireless data acquisition terminal, the control center inquires whether corresponding session connection information is cached according to the session number, if so, the session key is subjected to abstract calculation by using an abstract algorithm cached in the session connection information, and a calculation result is compared with abstract data of the session key sent by the wireless data acquisition terminal; if the comparison result is consistent, the session key and the symmetric algorithm are used as the key and the algorithm for data protection in the secure communication channel, and the next step is carried out;
s23, the control center sends a negotiation ending command to the terminal, and after the terminal receives the negotiation ending command sent by the control center, the establishment of the safety channel is ended;
in S22, if the comparison result is not consistent, the following steps are executed:
s221, the control center reads a serial number of a control center certificate sent by the wireless data acquisition terminal, if the serial number of the control center certificate is consistent with a certificate serial number used by the local terminal, the control center does not send the certificate of the control center to the wireless data acquisition terminal, and the next process is executed;
s222, the control center reads a serial number of a wireless data acquisition terminal certificate sent by the wireless data acquisition terminal, and inquires whether the wireless data acquisition terminal certificate is cached or not according to the serial number; if so, the wireless data acquisition terminal is not required to send the certificate of the wireless data acquisition terminal to the control center, and the following working procedures are executed:
s2221, the control center reads an algorithm combination list sent by the wireless data acquisition terminal, selects a group of algorithm combinations with the highest encryption strength as encryption algorithm combinations used in the following process, sends the algorithm combinations to the wireless data acquisition terminal, and executes the next process;
s2222, the control center generates a group of temporary asymmetric key pairs, digital signature is carried out on the temporary public keys by using the private key of the control center and the asymmetric algorithms in the algorithm combination selected in the step S2221, a signature result and the temporary public keys are packaged, and a key interaction data packet is sent to the terminal;
s2223, sending a connection application end data packet to the wireless data acquisition terminal; s2224, the wireless data acquisition terminal receives a connection application response data packet sent by the control center, and caches the key negotiation algorithm combination and the session number; if the wireless data acquisition terminal receives a control center certificate data packet sent by a control center, the legitimacy of the control center certificate is verified, and if the verification is successful, the serial number in the certificate is used as an identifier to cache the digital certificate of the control center; if the verification fails, the process is exited, and the connection is disconnected; if the wireless data acquisition terminal receives an application data packet which is sent by the control center and applies for a certificate of the wireless data acquisition terminal, the certificate packet of the terminal is formed into a certificate data packet and sent to the control center; the wireless data acquisition terminal receives a key negotiation data packet sent by the control center, verifies the temporary public key signature information of the control center by using a public key in a cached control center certificate and an asymmetric algorithm in a cached key negotiation algorithm combination, and exits the process and breaks the link if the temporary public key signature information is unsuccessful; if successful, executing the next step;
s2225, the wireless data acquisition terminal randomly generates a session key as a key for data protection in the secure channel, and a symmetric algorithm in the algorithm combination is used as a protection algorithm; using the conversation number as an identifier, caching a conversation key, a symmetric algorithm and a digest algorithm; encrypting the session key by using an asymmetric algorithm, and digitally signing the encrypted session key by using the asymmetric algorithm; packaging the encrypted session key and the encrypted digital signature, and sending a key negotiation data packet to a control center;
s2226, sending a negotiation ending command to the control center;
s2227, if the control center receives the wireless data acquisition terminal certificate data packet, the legitimacy of the wireless data acquisition terminal certificate is verified, and if the verification is successful, the serial number in the certificate is used as an identifier, and the digital certificate of the control center is cached; if the verification fails, the process is exited, and the connection is disconnected;
s2228, after receiving the key negotiation data packet sent by the wireless data acquisition terminal, the control center uses the public key in the wireless data acquisition terminal certificate and the asymmetric algorithm in the algorithm combination selected in the step S22 to perform signature verification on the signature data, and if the signature verification is unsuccessful, the control center exits the process and breaks the link; if the session key is successful, decrypting the session key by using the local private key and the asymmetric algorithm, and caching the session key, the symmetric algorithm and the digest algorithm by using the session number generated in the step S22 as an identifier; and the session key and the symmetric algorithm are named as a key and an algorithm for data protection in the secure communication channel; step S23 is executed;
in step S221, if the wireless data acquisition terminal certificate is not cached, the following procedure is added between step S2221 and step S2222: the control center sends a control center certificate to the wireless data acquisition terminal; and the control center sends a request for acquiring the certificate of the wireless data acquisition terminal to the wireless data acquisition terminal.
2. The monitoring system of claim 1, wherein the control center is a low power consumption single chip microcomputer, such as an MSP430F149 single chip microcomputer, an ARM single chip microcomputer or an AVR single chip microcomputer.
3. The monitoring system of claim 1, wherein the control center encrypts all data storage and exchange processes in the system.
4. The monitoring system according to claim 1, wherein the client control module sends a control command of the control center to the wireless data acquisition terminal in a wireless transmission manner to control data acquisition of the wireless data acquisition terminal.
5. The monitoring system of claim 1, wherein the wireless sensor network nodes comprise a plurality of sensor nodes and wireless data acquisition terminals; the wireless data acquisition terminal of the wireless sensor network node is in wireless connection with the monitoring device through the wireless data transmission module.
6. The monitoring system of claim 5, wherein the sensor node comprises: one or the combination of two or more of an air temperature sensor, an air humidity sensor, a voltage sensor, a current sensor, an active sensor and a reactive sensor.
7. A smart grid user, characterized in that the smart grid user comprises the monitoring system of any one of claims 1 to 6.
8. A smart grid, characterized in that the smart grid comprises a monitoring system as claimed in any one of claims 1 to 6.
CN201810006240.0A 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof Active CN108183553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810006240.0A CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810006240.0A CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof
CN201510586655.6A CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510586655.6A Division CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system

Publications (2)

Publication Number Publication Date
CN108183553A CN108183553A (en) 2018-06-19
CN108183553B true CN108183553B (en) 2021-04-06

Family

ID=55149966

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510586655.6A Expired - Fee Related CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system
CN201810006240.0A Active CN108183553B (en) 2015-09-15 2015-09-15 Data testing and collecting monitoring device, smart power grid and user side thereof

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510586655.6A Expired - Fee Related CN105281432B (en) 2015-09-15 2015-09-15 A kind of supervising device of wireless test and data transmission system

Country Status (1)

Country Link
CN (2) CN105281432B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106094642A (en) * 2016-07-18 2016-11-09 合肥赑歌数据科技有限公司 A kind of monitoring system of big data platform
CN106205090A (en) * 2016-07-22 2016-12-07 汤亮 A kind of electric power network real-time monitoring system and control method thereof
CN109412901B (en) * 2018-12-07 2022-09-27 成都博宇利华科技有限公司 Method and system for detecting continuity of acquired data based on time domain processing
CN110514927B (en) * 2019-08-16 2022-04-22 惠州Tcl移动通信有限公司 Device abnormality detection method for mobile terminal, and computer-readable medium
CN113051589B (en) * 2021-03-17 2022-09-02 重庆扬成大数据科技有限公司 Big data government affair analysis and processing safety application platform

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007068991A1 (en) * 2005-12-15 2007-06-21 Nokia Corporation Method, device, and system for network-based remote control over contactless secure storages
CN101467131A (en) * 2005-07-20 2009-06-24 美国唯美安视国际有限公司 Network user authentication system and method
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
CN102742250A (en) * 2012-03-13 2012-10-17 华为终端有限公司 Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103218876A (en) * 2013-04-11 2013-07-24 成都秦川科技发展有限公司 Information security management module of remote control intelligent electric energy meter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8121618B2 (en) * 2009-10-28 2012-02-21 Digimarc Corporation Intuitive computing methods and systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101467131A (en) * 2005-07-20 2009-06-24 美国唯美安视国际有限公司 Network user authentication system and method
WO2007068991A1 (en) * 2005-12-15 2007-06-21 Nokia Corporation Method, device, and system for network-based remote control over contactless secure storages
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
CN102742250A (en) * 2012-03-13 2012-10-17 华为终端有限公司 Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103218876A (en) * 2013-04-11 2013-07-24 成都秦川科技发展有限公司 Information security management module of remote control intelligent electric energy meter

Also Published As

Publication number Publication date
CN105281432B (en) 2018-01-16
CN105281432A (en) 2016-01-27
CN108183553A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
CN108183553B (en) Data testing and collecting monitoring device, smart power grid and user side thereof
CN105305615B (en) A kind of monitoring method of wireless test and data transmission system
CN105072636B (en) A kind of wireless test and data transmission system
CN101753312B (en) Security certification method and security certification device for power grid equipment and negative control terminal
CN109728898A (en) Internet-of-things terminal safety communicating method based on block chain technology
US20130173905A1 (en) Transmitting terminal, receiving terminal, id numbering device, and key transmission method
CN106205090A (en) A kind of electric power network real-time monitoring system and control method thereof
CN104579694A (en) Identity authentication method and system
CN105530263A (en) Ultra-lightweight RFID bidirectional authentication method based on label ID
CN106340104A (en) Coded lock and control system and method of coded lock
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN106960166A (en) A kind of smart jack management system and its method based on distributed general ledger technology
CN109104476B (en) Electric power information safety system based on block chain
CN113965930A (en) Quantum key-based industrial internet active identification analysis method and system
CN105915347A (en) Control method for power electric wireless transmission device
CN110190952A (en) It is a kind of based on quantum random number to the encrypted transmission method of Internet of Things safety
CN106790138A (en) A kind of method of government affairs cloud application User logs in double factor checking
CN110691358B (en) Access control system based on attribute cryptosystem in wireless sensor network
Yang et al. Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs
CN112311553B (en) Equipment authentication method based on challenge response
CN107231628B (en) Safety data fusion method suitable for multiple application scenes
CN111740965B (en) Internet of things equipment authentication method based on physical unclonable equation
CN110430207B (en) Multi-point remote cross-network interaction collaborative authentication method for smart power grid
CN105959258A (en) Wireless transmitting device of power grid
CN115277040B (en) Medical health data storage and sharing method and system based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210317

Address after: 25 Guangming Road, Yinchuan (National) economic and Technological Development Zone, Yinchuan City, Ningxia Hui Autonomous Region

Applicant after: NINGXIA LONGJI NINGGUANG INSTRUMENT Co.,Ltd.

Address before: 518000 duty-free business building 6, Fuhua Road, Futian District, Shenzhen, Guangdong 1403

Applicant before: Liu Chao

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant