CN107566473A - A kind of electric power secondary system equipment check method - Google Patents

A kind of electric power secondary system equipment check method Download PDF

Info

Publication number
CN107566473A
CN107566473A CN201710747409.3A CN201710747409A CN107566473A CN 107566473 A CN107566473 A CN 107566473A CN 201710747409 A CN201710747409 A CN 201710747409A CN 107566473 A CN107566473 A CN 107566473A
Authority
CN
China
Prior art keywords
terminal agent
service end
electric power
secondary system
version
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710747409.3A
Other languages
Chinese (zh)
Inventor
张阳
汤震宇
胡绍谦
曹翔
林青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NR Electric Co Ltd
NR Engineering Co Ltd
Original Assignee
NR Electric Co Ltd
NR Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NR Electric Co Ltd, NR Engineering Co Ltd filed Critical NR Electric Co Ltd
Priority to CN201710747409.3A priority Critical patent/CN107566473A/en
Publication of CN107566473A publication Critical patent/CN107566473A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of electric power secondary system equipment check method, step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected, and step 2 is entered after successful connection;Step 2, terminal agent interact public key and symmetric key with service end;Step 3, terminal agent use the username and password login service end specified, if correctly, into step 4;Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, if edition compatibility, into step 6;Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections, return to step 1 after covering current version;Step 6, terminal agent obtain from service end verifies configuration file;Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.

Description

A kind of electric power secondary system equipment check method
Technical field
The present invention relates to a kind of electric power secondary system equipment check method.
Background technology
The equipment of electric power secondary system is critical asset, and the quality of its equipment running status, which is directly related to power system, is No energy normal operation, and as the development of cyber-attack techniques, various forms of network attacks have special from wide area network to electric power The trend of sprawling is netted, so electric power secondary system is badly in need of a kind of means that all devices are managed collectively and monitored.
Existing electric power secondary system equipment check method mainly has two kinds:The first is the method manually verified, i.e. hand The information of all devices in dynamic typing electric power secondary system, forms the list of an equipment, regular artificial nucleus to field device and The uniformity of list, this check method consumption human resources are big, time-consuming, error rate is high and real-time is low;It is based on for second Specific network protocols, such as snmp, syslog, this method depend on support of each equipment to the agreement, and agreement Implementation, its very flexible, compatibility are low, the data of acquisition are limited, and snmp v1, snmp v2, syslog are not propped up Encrypted transmission is held, also ensures the integrality of data without means.
The content of the invention
In view of the above-mentioned problems, the present invention provides a kind of electric power secondary system equipment check method, solves artificial pattern verification The problem of human resources are big, time-consuming, error rate is high, real-time is low is consumed, and solves to be based on specific network protocols verification side The problem of formula very flexible, compatibility are low, the data of acquisition are limited, anti-eavesdrop, limited tamper-resistance.
To realize above-mentioned technical purpose and the technique effect, the present invention is achieved through the following technical solutions:
A kind of electric power secondary system equipment check method, comprises the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected, Enter step 2 after successful connection;
Step 2, terminal agent interact public key and symmetric key with service end;
Step 3, terminal agent are using the username and password login service end specified, if username and password mistake, is returned Step 1, if username and password is correct, into step 4;
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, and if edition compatibility, Into step 6;
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections after covering current version, and Return to step 1;
Step 6, terminal agent obtain from service end verifies configuration file;
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
It is preferred that quantity >=1 of terminal agent, quantity >=1 of service end.
It is preferred that electric power secondary system uses more net redundancy structures, multiple networks establish TCP connections simultaneously, and select any One network for being successfully established TCP connections interacts.
It is preferred that the network that selection is successfully established TCP connections at first interacts.
It is preferred that in step 3 to step 8, by the way of a identical data is netted more and sent simultaneously, recipient only handles it Middle a data, ignore remaining data.
It is preferred that in step 3 to step 8, mutual message uses symmetric key encryption, and after original message hash, use is non- Asymmetric private key is signed to hash values, and by the way of public key sign test.
It is preferred that when either party judges incompatible version when service end and terminal agent, incompatible version is thought.
The beneficial effects of the invention are as follows:
(1)After electric power secondary system all devices all deploy terminal agent, terminal agent will be handed over specified services end automatically Mutually, automatic obtain verifies configuration file, automatic acquisition recent program version, automatic uploading device information, and automaticity is high, section A large amount of human resources are saved.
(2)Terminal agent can be connected with multiple service ends, and support more net redundancy structures, when a servers go down When do not interfere with other servers, other networks are not interfered with during a network paralysis, as long as having a server and a net Network normal work, whole system is with regard to energy normal operation, and error rate is low, serious forgiveness is high.
(3)Terminal agent and equipment program in itself and business decouple, and do not influence the original business function of equipment, it is not necessary to set Standby supplier participates in, and flexibility is high, compatibility is high.
(4)Terminal agent uses symmetric key encryption with service end, after original message hash, uses asymmetric privacy keys pair Hash values signature, the mode of public key sign test, and input username and password, peace are also needed at terminal agent Connection Service end Quan Xinggao, can be with anti-eavesdrop and anti-tamper.
Brief description of the drawings
Fig. 1 is the workflow diagram of terminal agent of the present invention;
Fig. 2 is the workflow diagram of service end of the present invention;
Fig. 3 is the flow chart that terminal agent of the present invention interacts symmetric key and asymmetric public key with service end;
Fig. 4 is a typical format schematic diagram of message used in interaction of the present invention.
Embodiment
Technical solution of the present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings, so that ability The technical staff in domain can be better understood from the present invention and can be practiced, but illustrated embodiment is not as the limit to the present invention It is fixed.
As Figure 1-4, a kind of electric power secondary system equipment check method, comprises the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected, Enter step 2 after successful connection, continue to send TCP connection requests if unsuccessful.
Step 2, terminal agent interact public key and symmetric key with service end.
Step 3, terminal agent use the username and password login service end specified, if username and password mistake, Return to step 1, if username and password is correct, into step 4.
Username and password is controlled by service end, after service end username and password is changed, all terminal agents Need to be modified to identical, if the username and password mistake that terminal agent uses, terminates current interaction flow, again with clothes TCP connections are established at business end.
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, if version is simultaneous Hold, then into step 6, wherein, when either party judges incompatible version when service end and terminal agent, think that version is not simultaneous Hold.
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP companies after covering current version Connect, and return to step 1.
Step 6, terminal agent obtain from service end verifies configuration file, and verifying configuration file includes:
(1)The content of verification:As CPU running statuses, internal memory running status, disk use state, external equipment state, system are mended Fourth more new state, software installation unloading recording status, process status, illegal external connection state, vulnerability scanning state, virus scan shape State, operating system version, software version, software configuration file version.
(2)The parameter verified required for content:As CPU usage upper limit threshold, memory usage upper limit threshold, disk make With upper limit threshold, external equipment black and white lists, system mend list, software black and white lists, process black and white lists, external connection black and white name Single, crucial leak list, key viral list, operating system version scope, software version scope, software configuration file version model Enclose.
(3)Terminal agent performs the definition of operation:Such as detect that CPU running statuses, internal memory running status, disk use shape When state exceedes upper limit threshold, if need to send burst alarm to service end, illegality equipment accesses, illegal software installs unloading, Critical software installation unloading, illegal process initiation, critical processes are exited, illegal external connection occur, find leak, find virus, behaviour Make whether abnormal system version, software version exception, software configuration file version need to send alarm, illegality equipment access extremely Whether whether need prevention, leak afterwards needs whether reparation, virus need whether removing, illegal process need stopping, key to enter Whether journey, which needs, restarts, whether critical software needs whether renewal, software configuration file need renewal, terminal agent to be sent on the cycle Frequency.
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
Terminal agent obtains terminal device information, in information process is collected, terminal agent meeting according to configuration file is verified According to the setting for verifying configuration file, message is sent in burst, and such as CPU usage is too high, illegal process be present to service end, Service end can will be given on facility information in cycle.Accordingly, service end flow is similar with terminal agent, as shown in Figure 2:
Monitor and specify TCP port;Terminal agent is waited to establish connection;Connection establish after the completion of, interact with terminal agent public key and Symmetric key;The username and password of receiving terminal agent logs, judge whether correctly, version to be interacted with terminal agent if correct This information;Judge the compatibility of version, if incompatible, wait terminal agent to download latest edition;Terminal agent is waited to obtain Verify configuration file;The facility information that receiving terminal agency sends.Service end also can be as needed, is actively sent to terminal agent The program version specified, send and verify configuration file, inquiry apparatus information etc., after service end collects all information, be responsible for whole Reason, displaying and further processing, as above send main website etc..
Fig. 3 is the flow that terminal agent of the present invention interacts symmetric key and asymmetric public key with service end, terminal agent with Machine generates the RSA public private key pairs of 2048, and public key is sent into service end, the public key of service end receiving terminal agency, generation clothes 2048 RSA public private key pairs at business end, produce a 32 byte random numbers, using terminal acts on behalf of public key encryption, by service end Random number after RSA public keys and encryption is sent to terminal agent, and terminal agent receives service end public key, and with the private key solution of oneself Close random number;Both sides produce AES 256 symmetric key using this random number, in follow-up interaction, use AES corresponding Encrypted with layer data domain, use SHA1 and RSA private key signatures, public key sign test.
Fig. 4 is a typical format of message used in interaction of the present invention, and in application layer heading, start byte accounts for 4 bytes, it is 0xeb 0x90 0xeb 0x90, for synchronous applications layer data;Overall length is two bytes, represents whole TCP load Length, that is, the length of application data;1 byte of encryption indicator, it is table when being 1 in plain text that application layer data domain is represented when being 0 It is encryption to show application layer data domain, and application layer data domain is encrypted using AES 256 during encryption;The byte of signature length 256, signature Scope includes application layer heading and application layer data domain, if application layer data domain is encrypted, for the data label after encryption Name, after SHA1 algorithms hash, is filled to 256 bytes, then with the RSA private key signatures of 2048;In application layer data domain, number According to the byte of domain effective length 2, refer to the data field length under plaintext state, do not calculate filling during encryption;Client message mark Know 4 bytes, when referring to that terminal agent actively sends data, constantly incremental message label, needed when service end responds with identical Client message identification;The byte of service end message identification 4, when referring to that service end actively sends data, constantly incremental message Label, band identical service end message identification is needed when terminal agent responds;Client message identification and service end message identification Not only can with the frame message of unique mark one, can also anti-message playback;Whether the byte of control code 1, the direction of identification message, have Next frame message, whether make a mistake, transmit reason etc.;The byte of service codes 2, the particular type and work(of the content of identification message Energy.
It is preferred that quantity >=1 of terminal agent, quantity >=1 of service end.
It is preferred that electric power secondary system uses more net redundancy structures, i.e., do redundancy, such as A using at least two independent networks Net, B nets, C nets etc., each table apparatus can typically access multiple nets simultaneously in network, not intercommunication between more nets.Multiple networks are simultaneously TCP connections are established, and select any one network for being successfully established TCP connections to interact.
It is preferred that the network that selection is successfully established TCP connections at first interacts.
It is preferred that in step 3 to step 8, by the way of a identical data is netted more and sent simultaneously, recipient only handles it Middle a data, ignore remaining data.
It is preferred that in step 3 to step 8, mutual message uses symmetric key encryption, and after original message hash, use is non- Asymmetric private key is signed to hash values, and by the way of public key sign test.
Below by taking more net redundancy structures of the double nets of A/B as an example, the step of present invention includes, is as follows:
Step 1:Terminal agent nets IP to service end A and connects foundation request with port initiation TCP, if being successfully established connection, Into step 2, if unsuccessful, continue to initiate TCP connection requests;Meanwhile terminal agent nets IP to service end B and port is initiated Request is established in TCP connections, if being successfully established connection, into step 2, if unsuccessful, continues to initiate TCP connection requests.
Step 2:Terminal agent selection is first(I.e. at first)Network and the service end friendship that TCP is connected are successfully established with service end Mutual public key and symmetric key, if A nets first establish connection, terminal agent selection A nets interacted with service end public key with it is symmetrically close Key, if B nets first establish connection, terminal agent selection B nets interact public key and symmetric key with service end, and interaction flow is as schemed Shown in 3, public key is interacted with service end for terminal agent and after the completion of symmetric key, step 3 to step 8 mutual message is using symmetrical close Key is encrypted, to, to hash values signature, the mode of public key sign test, message format is such as after original message hash, using asymmetric privacy keys Shown in Fig. 4;Subsequent step terminal agent is all that message is sent in the double nets of A/B simultaneously, and service end receives a copy of it, loses it Remaining, service end message is also sent in the double nets of A/B simultaneously, and terminal agent receives a copy of it, loses remaining.
Step 3:Terminal agent is using the username and password login service end specified, if username and password mistake, is returned Step 1 is returned, if correctly, into step 4.
Step 4:Terminal agent sends the program version of itself to service end, service end receiving terminal act on behalf of after version with from The terminal agent edition comparison that body is supported, if the terminal agent version itself do not supported, then return to version verification to client Error message, after terminal agent receives check errors message, into step 5, if the terminal agent version that itself is supported, then Version is returned to terminal agent and verifies correct message, after terminal agent receives the correct message of verification, into step 6.
Step 5:Terminal agent sends the request of download terminal Agent, the terminal agent that service end would be compatible with to service end Version is sent to terminal agent in the form of message, and according to program size, meeting framing is sent, and terminal agent has received all programs After message, complete program is formed, disconnects TCP connections, return to step 1 after covering current version.
Step 6:Terminal agent is sent to service end obtains the request for verifying configuration file, and service end will verify configuration file Terminal agent is sent in the form of message, according to file size, meeting framing is sent, and terminal agent has received all file messages Afterwards, composition is complete verifies configuration file.
Step 7:Terminal agent obtains the facility information of terminal, such as obtained on request according to the configuration for verifying configuration file Equipment CPU usage, memory usage etc..
Step 8:The facility information of collection is sent to service end by terminal agent, and when to carry out burst alarm, tissue is prominent Warning message is sent out, is sent to service end;When being sent on the cycle to be carried out, text of being delivered newspaper on the cycle is organized, is sent to service end, serviced End is when having service request, and organizing-request response message returns to service end, service end collecting device information counted, alerted, Displaying and other operations, main website can be sent above, carries out data mining analysis etc..
Above-mentioned electric power secondary system equipment check method, electric power can be obtained on the basis of equipment existing capability is not influenceed Electrical secondary system all devices information, centralized management equipment software and hardware version, supervision equipment running status.Its human resources consumes It is low, error rate is low, automaticity is high, independent of equipment in itself, flexibility and compatibility be high, anti-eavesdrop and anti-tamper.
The beneficial effects of the invention are as follows:
(1)After electric power secondary system all devices all deploy terminal agent, terminal agent will be handed over specified services end automatically Mutually, automatic obtain verifies configuration file, automatic acquisition recent program version, automatic uploading device information, and automaticity is high, section A large amount of human resources are saved.
(2)Terminal agent can be connected with multiple service ends, and support more net redundancy structures, when a servers go down When do not interfere with other servers, other networks are not interfered with during a network paralysis, as long as having a server and a net Network normal work, whole system is with regard to energy normal operation, and error rate is low, serious forgiveness is high.
(3)Terminal agent and equipment program in itself and business decouple, and do not influence the original business function of equipment, it is not necessary to set Standby supplier participates in, and flexibility is high, compatibility is high.
(4)Terminal agent uses symmetric key encryption with service end, after original message hash, uses asymmetric privacy keys pair Hash values signature, the mode of public key sign test, and input username and password, peace are also needed at terminal agent Connection Service end Quan Xinggao, can be with anti-eavesdrop and anti-tamper.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure that bright specification and accompanying drawing content are made either equivalent flow conversion or to be directly or indirectly used in other related Technical field, be included within the scope of the present invention.

Claims (7)

1. a kind of electric power secondary system equipment check method, it is characterised in that comprise the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected, Enter step 2 after successful connection;
Step 2, terminal agent interact public key and symmetric key with service end;
Step 3, terminal agent are using the username and password login service end specified, if username and password mistake, is returned Step 1, if username and password is correct, into step 4;
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, and if edition compatibility, Into step 6;
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections after covering current version, and Return to step 1;
Step 6, terminal agent obtain from service end verifies configuration file;
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
A kind of 2. electric power secondary system equipment check method according to claim 1, it is characterised in that the number of terminal agent Amount >=1, quantity >=1 of service end.
A kind of 3. electric power secondary system equipment check method according to claim 2, it is characterised in that electric power secondary system Using more net redundancy structures, multiple networks establish TCP connections simultaneously, and the network for selecting any one to be successfully established TCP connections Interact.
4. a kind of electric power secondary system equipment check method according to claim 3, it is characterised in that selection succeeds at first The network for establishing TCP connections interacts.
A kind of 5. electric power secondary system equipment check method according to claim 3, it is characterised in that step 3 to step 8 In, by the way of a identical data is netted more and sent simultaneously, recipient only handles a copy of it data, ignores remaining number According to.
A kind of 6. electric power secondary system equipment check method according to claim 1, it is characterised in that step 3 to step 8 In, mutual message uses symmetric key encryption, and after original message hash, hash values are signed using asymmetric privacy keys, and By the way of public key sign test.
7. a kind of electric power secondary system equipment check method according to claim 1, it is characterised in that when service end and end End agency either party when judging incompatible version, think incompatible version.
CN201710747409.3A 2017-08-28 2017-08-28 A kind of electric power secondary system equipment check method Pending CN107566473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710747409.3A CN107566473A (en) 2017-08-28 2017-08-28 A kind of electric power secondary system equipment check method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710747409.3A CN107566473A (en) 2017-08-28 2017-08-28 A kind of electric power secondary system equipment check method

Publications (1)

Publication Number Publication Date
CN107566473A true CN107566473A (en) 2018-01-09

Family

ID=60977115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710747409.3A Pending CN107566473A (en) 2017-08-28 2017-08-28 A kind of electric power secondary system equipment check method

Country Status (1)

Country Link
CN (1) CN107566473A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765893A (en) * 2021-08-13 2021-12-07 成都安恒信息技术有限公司 Protocol proxy password penetration authentication method applied to MySQL system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277193A (en) * 2008-05-05 2008-10-01 北京航空航天大学 One-point entry and access system based on authentication service acting information facing to service architecture
CN102932350A (en) * 2012-10-31 2013-02-13 华为技术有限公司 TLS (Transport Layer Security) scanning method and device
CN103188088A (en) * 2011-12-27 2013-07-03 北京新媒传信科技有限公司 Equipment information acquisition system and equipment information acquisition method
CN103188101A (en) * 2011-12-31 2013-07-03 成都勤智数码科技股份有限公司 Distributed type collection scheduling method and device
US20140268226A1 (en) * 2013-03-12 2014-09-18 Kyocera Document Solutions Inc. Apparatus management system, electronic apparatus, apparatus management method, and computer readable recording medium
CN106162831A (en) * 2016-07-21 2016-11-23 北京小米移动软件有限公司 Method for connecting network and device
CN106407076A (en) * 2016-09-22 2017-02-15 山东浪潮云服务信息科技有限公司 A monitoring method for the operation information of software and hardware based on a domestic CPU and operating system environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277193A (en) * 2008-05-05 2008-10-01 北京航空航天大学 One-point entry and access system based on authentication service acting information facing to service architecture
CN103188088A (en) * 2011-12-27 2013-07-03 北京新媒传信科技有限公司 Equipment information acquisition system and equipment information acquisition method
CN103188101A (en) * 2011-12-31 2013-07-03 成都勤智数码科技股份有限公司 Distributed type collection scheduling method and device
CN102932350A (en) * 2012-10-31 2013-02-13 华为技术有限公司 TLS (Transport Layer Security) scanning method and device
US20140268226A1 (en) * 2013-03-12 2014-09-18 Kyocera Document Solutions Inc. Apparatus management system, electronic apparatus, apparatus management method, and computer readable recording medium
CN106162831A (en) * 2016-07-21 2016-11-23 北京小米移动软件有限公司 Method for connecting network and device
CN106407076A (en) * 2016-09-22 2017-02-15 山东浪潮云服务信息科技有限公司 A monitoring method for the operation information of software and hardware based on a domestic CPU and operating system environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765893A (en) * 2021-08-13 2021-12-07 成都安恒信息技术有限公司 Protocol proxy password penetration authentication method applied to MySQL system

Similar Documents

Publication Publication Date Title
US20210297410A1 (en) Mec platform deployment method and apparatus
EP3745639A1 (en) Method and apparatus for obtaining device identification
CN101873298A (en) Registration method, terminal, server and system
WO2014135195A1 (en) Handling of digital certificates
WO2021073375A1 (en) Remote authentication mode negotiation method for combined device, and related device
CN108990062B (en) Intelligent security Wi-Fi management method and system
WO2018160252A1 (en) Determining security vulnerabilities in application programming interfaces
Li et al. A secure sign-on protocol for smart homes over named data networking
CN106713236A (en) End-to-end identity authentication and encryption method based on CPK identifier authentication
US20230283479A1 (en) Data Transmission Method and Apparatus, Device, System, and Storage Medium
WO2013013837A1 (en) Simple group security for machine-to-machine networking (sgsm2m)
CN108134713A (en) A kind of communication means and device
US20220116387A1 (en) Remote attestation mode negotiation method and apparatus
CN114223233A (en) Data security for network slice management
CN107566473A (en) A kind of electric power secondary system equipment check method
CN109548026A (en) A kind of method and apparatus of controlling terminal access
CN115633359A (en) PFCP session security detection method, device, electronic equipment and storage medium
CN105791036A (en) AP access detection method and device
WO2019239191A1 (en) Methods, wireless modules, electronic devices and server devices
CN110505089B (en) Internet of things equipment management method and system
CN111221764B (en) Cross-link data transmission method and system
CN114301774B (en) Device configuration method, system, device, electronic device and storage medium
CN102148704A (en) Software implementation method for universal network management interface of safe switch
CN109150661A (en) A kind of method for discovering equipment and device
CN113595240B (en) Method, device, equipment and storage medium for detecting electric power data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109

RJ01 Rejection of invention patent application after publication