CN114640510A - Method for communication by adopting separated encryption servers - Google Patents

Method for communication by adopting separated encryption servers Download PDF

Info

Publication number
CN114640510A
CN114640510A CN202210206333.4A CN202210206333A CN114640510A CN 114640510 A CN114640510 A CN 114640510A CN 202210206333 A CN202210206333 A CN 202210206333A CN 114640510 A CN114640510 A CN 114640510A
Authority
CN
China
Prior art keywords
encryption server
upper computer
card machine
encryption
communicating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210206333.4A
Other languages
Chinese (zh)
Other versions
CN114640510B (en
Inventor
王艳姣
莫哲民
雷航
白文聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Sanxing Medical and Electric Co Ltd
Original Assignee
Ningbo Sanxing Medical and Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Sanxing Medical and Electric Co Ltd filed Critical Ningbo Sanxing Medical and Electric Co Ltd
Priority to CN202210206333.4A priority Critical patent/CN114640510B/en
Publication of CN114640510A publication Critical patent/CN114640510A/en
Application granted granted Critical
Publication of CN114640510B publication Critical patent/CN114640510B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention relates to a method for communication by adopting a separated encryption server, which comprises the steps of S1, respectively connecting and starting an upper computer and the encryption server, and connecting and starting the encryption server and a card machine, wherein the encryption server and the upper computer are separately designed; s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter, the information fed back by the meter is received, and the information fed back is decrypted through the encryption server and the card machine to realize communication between the upper computer and the meter. The method improves communication speed and safety.

Description

Method for communication by adopting separated encryption servers
Technical Field
The invention relates to the technical field of electric meters, in particular to a method for communication by adopting a separated encryption server.
Background
At present, protocol encryption communication of the electric energy meter 698 is popularized and applied in national networks, the market has higher and higher requirements on the communication success rate of the electric energy meter, and the functional requirements on the electric energy meter are more and more complex. In recent years, the release and update progress of new standard protocols of intelligent electric energy meters is fast, and in order to meet the requirements of communication safety, newly added functions of a power supply bureau or research and development of new products and repair of defects of manufacturers, the trend of testing ESAMs by each manufacturer to realize local encryption communication is inevitable. The standard telecommunication flow requires 698 background support 698 protocol local card secret machine or remote encryption machine.
However, the existing communication has some problems, the existing dynamic library calling work is completed in the upper computer, and the occupied memory capacity of the upper computer is limited, so that when the upper computer directly calls the card machine dynamic library, the memory leakage exists, the communication is easy to crash, and when the card machine returns data, the speed is very slow, and the overtime judgment of the program is influenced.
Disclosure of Invention
In view of the above problems, an object of the present invention is to provide a method for performing communication using a separate encryption server with high operation speed, large memory, reasonable design, and low cost.
In order to achieve the purpose, the technical scheme of the invention is as follows: a method of communicating using separate encryption servers, characterized by:
s1, respectively connecting and starting an upper computer and an encryption server, and connecting the encryption server and a card machine, wherein the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter to receive the information fed back by the meter, and the encryption server and the card machine decrypt the fed-back information to realize the communication between the upper computer and the meter.
Further, the connection starting of the upper computer and the encryption server specifically comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
Further, the encryption server is connected with the card machine for starting, specifically comprising,
s121, the encryption server sends a card machine dynamic library connecting instruction to the card machine;
and S122, the card machine receives the instruction for connecting the card machine dynamic library and carries out parameter verification, the verification is successful, the connection with the encryption server is established, and otherwise, the connection is not established.
Further, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, specifically comprising,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
s214, the encryption server judges the returned execution result, and when the judgment result is correct, the encryption server feeds back the encrypted data to the upper computer.
Further, after receiving the encrypted data fed back by the encryption server, the upper computer also performs the following operations,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
Furthermore, after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter, the method also comprises the following operations,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls the corresponding card machine dynamic library interface function so that the card machine can decrypt.
Further, the method also comprises the step of after the card machine executes decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
Further, the method also comprises the step of analyzing the error code and feeding the error code back to the upper computer when the encryption server judges that the execution result is incorrect.
Furthermore, the upper computer and the encryption server are located on the same local machine.
Furthermore, the upper computer and the encryption server are located on different local machines.
Compared with the prior art, the invention has the advantages that:
the encryption server is separated on the upper computer, and is independent, so that the problems of insufficient memory, memory leakage and system breakdown when the upper computer calls the dynamic library interface function in the prior art are solved, meanwhile, the encryption server is independent of the upper computer, the characteristic of large memory of the local computer can be fully utilized, the safety of data transmission and the reliability of successful communication are ensured, the encryption communication of a plurality of upper computers simultaneously connected with one server can be supported, and the application range and the possibility are expanded.
Drawings
Fig. 1 is a flowchart of encryption start-up in the present application.
Fig. 2 is a flowchart of encryption and decryption according to the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As shown in fig. 1-2, a preferred embodiment of a method for communicating using a separate encryption server, the method includes the steps of,
s1, the upper computer and the encryption server, and the encryption server and the card machine are respectively connected and started, and the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter, the information fed back by the meter is received, and the information fed back is decrypted through the encryption server and the card machine to realize communication between the upper computer and the meter.
Wherein, the host computer and the separation of encryption server, can both be on same local machine, also can both be on different local machines respectively, so, be convenient for realize many host computers and connect same encryption server simultaneously and carry out encryption communication, local card machine inserts on remote computer promptly, the backstage also can pass through IP remote access, satisfy the multi-user multilist self-adaptation and open the service communication requirement, insert the card machine on A computer, run encryption server on A computer, go to the local encryption service of visiting A computer through the IP on a plurality of computers such as B, C, D … …, satisfy the application demand that remote technology supported the communication scene.
Meanwhile, by the communication design, the dynamic library can be popularized to remote encryption dynamic library updating, for example, the application requirements of one-to-many local area network communication and remote technical support scenes are met.
Wherein, the upper computer is connected with the encryption server for starting, which comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
The upper computer parameters comprise a local computer IP, an encryption server port number and communication delay time.
And the connection start of the encryption server and the card machine correspondingly comprises,
s121, the encryption server sends a dynamic library instruction of the card machine to the card machine;
and S122, the card machine receives the instruction for connecting the card machine dynamic library and carries out parameter verification, the verification is successful, the connection with the encryption server is established, and otherwise, the connection is not established.
Wherein, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, which specifically comprises,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
and S214, the encryption server judges the returned execution result, and feeds back the encrypted data to the upper computer when the judgment result is correct.
Wherein, the specific way of checking the parameters is,
1. the encryption server is internally provided with 3 parameters of the ammeter key state, the ammeter number and the session negotiation counter;
2. the encryption server calls a dynamic library link instruction and sends 3 built-in parameters;
3. the dynamic library executes a link function and checks 3 parameters;
4. if the verification is successful, the function returns 0, otherwise, an error code is returned.
Meanwhile, after receiving the encrypted data fed back by the encryption server, the upper computer also performs the following operations,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
The method also comprises the following operations after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls a corresponding card machine dynamic library interface function so that the card machine can execute decryption.
The card machine also corresponds to the following operation after executing decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
It should be noted that, no matter whether encryption or decryption is performed, after the card machine executes the encryption/decryption function and returns the execution result, the encryption server analyzes the error code and then feeds the error code back to the upper computer when judging that the execution result is incorrect, and the upper computer uniformly considers that the result is incorrect after receiving the feedback information.
Therefore, the dynamic flexible space of the computer storage can be fully utilized on the basis of not changing the existing card machine dynamic library, the capacity of the computer storage space is usually Gb level, the residual space is sufficient, the local card machine dynamic library is independently packaged into a local service, and the service calling can be started when needed; and the system is separated from the upper computer, and the normal application of the upper computer cannot be influenced by the abnormal local service.
Moreover, a man-machine interaction monitoring log mechanism is added when the card machine dynamic library is moved to the computer end, so that the safety of data transmission and the reliability of successful communication are ensured; the man-machine interaction monitoring interface can store key information of encrypted communication, so that a message analysis optimization electric energy meter communication mechanism is supported, application requirements of an electric energy meter encrypted communication scene and a card machine manufacturer on real-time updating of a dynamic library are met, hardware cost is low, configuration is simple, even if the card machine manufacturer updates the card machine encrypted dynamic library, only an encryption server needs to be replaced, a background communication protocol is optimized, normal use can be achieved, the card machine service operation speed is called, and reliability is improved.
While embodiments of the invention have been shown and described, it will be understood by those skilled in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. A method of communicating using separate encryption servers, characterized by:
s1, the upper computer and the encryption server, and the encryption server and the card machine are respectively connected and started, and the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter to receive the information fed back by the meter, and the encryption server and the card machine decrypt the fed-back information to realize the communication between the upper computer and the meter.
2. The method of communicating using a separate encryption server of claim 1, wherein: the upper computer is connected with the encryption server for starting, and specifically comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
3. The method of communicating using a separate encryption server of claim 1, wherein: the encryption server is connected with the card machine for starting, specifically comprising,
s121, the encryption server sends a card machine dynamic library connecting instruction to the card machine;
and S122, the card machine receives the instruction of connecting the dynamic library of the card machine and carries out parameter verification, the verification is successful, the connection is established with the encryption server, and otherwise, the connection is not connected.
4. The method of communicating using a separate encryption server of claim 1, wherein: the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, and specifically comprises,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
s214, the encryption server judges the returned execution result, and when the judgment result is correct, the encryption server feeds back the encrypted data to the upper computer.
5. The method of communicating with a separate encryption server of claim 4, wherein: the upper computer also performs the following operations after receiving the encrypted data fed back by the encryption server,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
6. The method of communicating with a separate encryption server of claim 5, wherein: the method also comprises the following operations after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls the corresponding card machine dynamic library interface function so that the card machine can decrypt.
7. The method of communicating with a separate encryption server of claim 6, wherein: the method also includes after the card machine performs the decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
8. The method of communicating using a separate encryption server of claim 7, wherein: the method further comprises the step of analyzing the error code and feeding the error code back to the upper computer when the encryption server judges that the execution result is incorrect.
9. The method of communicating using a separate encryption server of claim 1, wherein:
the upper computer and the encryption server are located on the same local machine.
10. The method of communicating using a separate encryption server of claim 1, wherein:
the upper computer and the encryption server are located on different local machines.
CN202210206333.4A 2022-03-02 2022-03-02 Method for communication by adopting separated encryption server Active CN114640510B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210206333.4A CN114640510B (en) 2022-03-02 2022-03-02 Method for communication by adopting separated encryption server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210206333.4A CN114640510B (en) 2022-03-02 2022-03-02 Method for communication by adopting separated encryption server

Publications (2)

Publication Number Publication Date
CN114640510A true CN114640510A (en) 2022-06-17
CN114640510B CN114640510B (en) 2023-07-04

Family

ID=81948132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210206333.4A Active CN114640510B (en) 2022-03-02 2022-03-02 Method for communication by adopting separated encryption server

Country Status (1)

Country Link
CN (1) CN114640510B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244529A1 (en) * 2014-02-26 2015-08-27 Unisys Corporation Enhanced security for media encryption
CN105243746A (en) * 2015-10-21 2016-01-13 宁波三星医疗电气股份有限公司 Switching method for charge control modes of single-phase intelligent electric energy meter
WO2016126151A1 (en) * 2015-02-05 2016-08-11 Mtouche Technology Berhad System for establishing secure communication between multiple electronic communication devices
US9515997B1 (en) * 2013-07-19 2016-12-06 Amazon Technologies, Inc. Inline data encryption
CN205787091U (en) * 2016-06-29 2016-12-07 中国南方电网有限责任公司电网技术研究中心 For taking the simulation electric energy meter of control interactive terminal expense control Function detection
CN108197501A (en) * 2017-12-28 2018-06-22 天地融科技股份有限公司 Information input equipment inputs encryption method, device and the information input equipment of information
CN108809906A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, system and device
CN109450857A (en) * 2018-10-12 2019-03-08 五八有限公司 Encryption data configuration method, device, server, encryption equipment and storage medium
US20190081776A1 (en) * 2016-03-11 2019-03-14 Nec Corporation Encryption communication system, encryption communication method, security chip, communication apparatus, and control method and control program of communication apparatus
CN110324143A (en) * 2019-05-24 2019-10-11 平安科技(深圳)有限公司 Data transmission method, electronic equipment and storage medium
CN110944010A (en) * 2019-12-13 2020-03-31 辽宁省计量科学研究院 Anti-theft flow device control system and method
CN113420309A (en) * 2021-07-01 2021-09-21 广东工业大学 Lightweight data protection system based on state cryptographic algorithm
CN113507435A (en) * 2021-06-01 2021-10-15 武汉天喻信息产业股份有限公司 Data transmission method and system
CN113612769A (en) * 2021-08-02 2021-11-05 北京力天世技系统集成有限公司 Data safety type connector
CN114070614A (en) * 2021-11-15 2022-02-18 中国工商银行股份有限公司 Identity authentication method, device, equipment, storage medium and computer program product

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9515997B1 (en) * 2013-07-19 2016-12-06 Amazon Technologies, Inc. Inline data encryption
US20150244529A1 (en) * 2014-02-26 2015-08-27 Unisys Corporation Enhanced security for media encryption
WO2016126151A1 (en) * 2015-02-05 2016-08-11 Mtouche Technology Berhad System for establishing secure communication between multiple electronic communication devices
CN105243746A (en) * 2015-10-21 2016-01-13 宁波三星医疗电气股份有限公司 Switching method for charge control modes of single-phase intelligent electric energy meter
US20190081776A1 (en) * 2016-03-11 2019-03-14 Nec Corporation Encryption communication system, encryption communication method, security chip, communication apparatus, and control method and control program of communication apparatus
CN205787091U (en) * 2016-06-29 2016-12-07 中国南方电网有限责任公司电网技术研究中心 For taking the simulation electric energy meter of control interactive terminal expense control Function detection
CN108809906A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, system and device
CN108197501A (en) * 2017-12-28 2018-06-22 天地融科技股份有限公司 Information input equipment inputs encryption method, device and the information input equipment of information
CN109450857A (en) * 2018-10-12 2019-03-08 五八有限公司 Encryption data configuration method, device, server, encryption equipment and storage medium
CN110324143A (en) * 2019-05-24 2019-10-11 平安科技(深圳)有限公司 Data transmission method, electronic equipment and storage medium
CN110944010A (en) * 2019-12-13 2020-03-31 辽宁省计量科学研究院 Anti-theft flow device control system and method
CN113507435A (en) * 2021-06-01 2021-10-15 武汉天喻信息产业股份有限公司 Data transmission method and system
CN113420309A (en) * 2021-07-01 2021-09-21 广东工业大学 Lightweight data protection system based on state cryptographic algorithm
CN113612769A (en) * 2021-08-02 2021-11-05 北京力天世技系统集成有限公司 Data safety type connector
CN114070614A (en) * 2021-11-15 2022-02-18 中国工商银行股份有限公司 Identity authentication method, device, equipment, storage medium and computer program product

Also Published As

Publication number Publication date
CN114640510B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN106302415A (en) A kind of method verifying equipment validity and distribution automatic to legitimate device
EP2056195B1 (en) Implementation method for updating the terminals in batches
CN101730987B (en) Managing network components using USB keys
CN109890029B (en) Automatic network distribution method of intelligent wireless equipment
CN102271133A (en) Authentication method, device and system
CN107041171A (en) Low-power consumption bluetooth BLE equipment, data update system and method
CN113162973B (en) IP access method and device of SSL VPN
CN102075927A (en) Security configuration method and system for wireless network equipment
CN102158483A (en) Method and system for authenticating access of intelligent television, intelligent television and authentication server
WO2018113113A1 (en) Double-system terminal wifi sharing method and device
CN114640510A (en) Method for communication by adopting separated encryption servers
CN103841537A (en) Control system and method using family gateway to deploy WLAN metropolitan area network
CN101388796B (en) Information sending processing method, communication equipment and communication system
CN111356132B (en) Bluetooth access control method, system, electronic equipment and storage medium
CN106453282A (en) Method and system for controlling ATM equipment
CN107040928B (en) Illegal WIFI detection method, terminal, aaa server and system
CN113709142B (en) Hot spot distribution network method and device, intelligent terminal and storage medium
CN109451497A (en) Wireless network connecting method and device, electronic equipment, storage medium
CN107451435B (en) Management and control method, management and control machine and management and control system of hardware encryption machine
CN105263177B (en) A kind of nothing is physically entered Android device WiFi networking method and device
CN102694681B (en) Adaptive management entity, base station self-configuration method and system
CN113573339B (en) Equipment wireless connection method and system
CN106888447A (en) The processing method and system of secondary USIM application messages
CN113014592B (en) Automatic registration system and method for Internet of things equipment
CN106878462A (en) The means of communication and device of equipment room

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant