CN107566473A - A kind of electric power secondary system equipment check method - Google Patents
A kind of electric power secondary system equipment check method Download PDFInfo
- Publication number
- CN107566473A CN107566473A CN201710747409.3A CN201710747409A CN107566473A CN 107566473 A CN107566473 A CN 107566473A CN 201710747409 A CN201710747409 A CN 201710747409A CN 107566473 A CN107566473 A CN 107566473A
- Authority
- CN
- China
- Prior art keywords
- terminal agent
- service end
- electric power
- secondary system
- version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of electric power secondary system equipment check method, step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected, and step 2 is entered after successful connection;Step 2, terminal agent interact public key and symmetric key with service end;Step 3, terminal agent use the username and password login service end specified, if correctly, into step 4;Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, if edition compatibility, into step 6;Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections, return to step 1 after covering current version;Step 6, terminal agent obtain from service end verifies configuration file;Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
Description
Technical field
The present invention relates to a kind of electric power secondary system equipment check method.
Background technology
The equipment of electric power secondary system is critical asset, and the quality of its equipment running status, which is directly related to power system, is
No energy normal operation, and as the development of cyber-attack techniques, various forms of network attacks have special from wide area network to electric power
The trend of sprawling is netted, so electric power secondary system is badly in need of a kind of means that all devices are managed collectively and monitored.
Existing electric power secondary system equipment check method mainly has two kinds:The first is the method manually verified, i.e. hand
The information of all devices in dynamic typing electric power secondary system, forms the list of an equipment, regular artificial nucleus to field device and
The uniformity of list, this check method consumption human resources are big, time-consuming, error rate is high and real-time is low;It is based on for second
Specific network protocols, such as snmp, syslog, this method depend on support of each equipment to the agreement, and agreement
Implementation, its very flexible, compatibility are low, the data of acquisition are limited, and snmp v1, snmp v2, syslog are not propped up
Encrypted transmission is held, also ensures the integrality of data without means.
The content of the invention
In view of the above-mentioned problems, the present invention provides a kind of electric power secondary system equipment check method, solves artificial pattern verification
The problem of human resources are big, time-consuming, error rate is high, real-time is low is consumed, and solves to be based on specific network protocols verification side
The problem of formula very flexible, compatibility are low, the data of acquisition are limited, anti-eavesdrop, limited tamper-resistance.
To realize above-mentioned technical purpose and the technique effect, the present invention is achieved through the following technical solutions:
A kind of electric power secondary system equipment check method, comprises the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected,
Enter step 2 after successful connection;
Step 2, terminal agent interact public key and symmetric key with service end;
Step 3, terminal agent are using the username and password login service end specified, if username and password mistake, is returned
Step 1, if username and password is correct, into step 4;
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, and if edition compatibility,
Into step 6;
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections after covering current version, and
Return to step 1;
Step 6, terminal agent obtain from service end verifies configuration file;
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
It is preferred that quantity >=1 of terminal agent, quantity >=1 of service end.
It is preferred that electric power secondary system uses more net redundancy structures, multiple networks establish TCP connections simultaneously, and select any
One network for being successfully established TCP connections interacts.
It is preferred that the network that selection is successfully established TCP connections at first interacts.
It is preferred that in step 3 to step 8, by the way of a identical data is netted more and sent simultaneously, recipient only handles it
Middle a data, ignore remaining data.
It is preferred that in step 3 to step 8, mutual message uses symmetric key encryption, and after original message hash, use is non-
Asymmetric private key is signed to hash values, and by the way of public key sign test.
It is preferred that when either party judges incompatible version when service end and terminal agent, incompatible version is thought.
The beneficial effects of the invention are as follows:
(1)After electric power secondary system all devices all deploy terminal agent, terminal agent will be handed over specified services end automatically
Mutually, automatic obtain verifies configuration file, automatic acquisition recent program version, automatic uploading device information, and automaticity is high, section
A large amount of human resources are saved.
(2)Terminal agent can be connected with multiple service ends, and support more net redundancy structures, when a servers go down
When do not interfere with other servers, other networks are not interfered with during a network paralysis, as long as having a server and a net
Network normal work, whole system is with regard to energy normal operation, and error rate is low, serious forgiveness is high.
(3)Terminal agent and equipment program in itself and business decouple, and do not influence the original business function of equipment, it is not necessary to set
Standby supplier participates in, and flexibility is high, compatibility is high.
(4)Terminal agent uses symmetric key encryption with service end, after original message hash, uses asymmetric privacy keys pair
Hash values signature, the mode of public key sign test, and input username and password, peace are also needed at terminal agent Connection Service end
Quan Xinggao, can be with anti-eavesdrop and anti-tamper.
Brief description of the drawings
Fig. 1 is the workflow diagram of terminal agent of the present invention;
Fig. 2 is the workflow diagram of service end of the present invention;
Fig. 3 is the flow chart that terminal agent of the present invention interacts symmetric key and asymmetric public key with service end;
Fig. 4 is a typical format schematic diagram of message used in interaction of the present invention.
Embodiment
Technical solution of the present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings, so that ability
The technical staff in domain can be better understood from the present invention and can be practiced, but illustrated embodiment is not as the limit to the present invention
It is fixed.
As Figure 1-4, a kind of electric power secondary system equipment check method, comprises the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected,
Enter step 2 after successful connection, continue to send TCP connection requests if unsuccessful.
Step 2, terminal agent interact public key and symmetric key with service end.
Step 3, terminal agent use the username and password login service end specified, if username and password mistake,
Return to step 1, if username and password is correct, into step 4.
Username and password is controlled by service end, after service end username and password is changed, all terminal agents
Need to be modified to identical, if the username and password mistake that terminal agent uses, terminates current interaction flow, again with clothes
TCP connections are established at business end.
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, if version is simultaneous
Hold, then into step 6, wherein, when either party judges incompatible version when service end and terminal agent, think that version is not simultaneous
Hold.
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP companies after covering current version
Connect, and return to step 1.
Step 6, terminal agent obtain from service end verifies configuration file, and verifying configuration file includes:
(1)The content of verification:As CPU running statuses, internal memory running status, disk use state, external equipment state, system are mended
Fourth more new state, software installation unloading recording status, process status, illegal external connection state, vulnerability scanning state, virus scan shape
State, operating system version, software version, software configuration file version.
(2)The parameter verified required for content:As CPU usage upper limit threshold, memory usage upper limit threshold, disk make
With upper limit threshold, external equipment black and white lists, system mend list, software black and white lists, process black and white lists, external connection black and white name
Single, crucial leak list, key viral list, operating system version scope, software version scope, software configuration file version model
Enclose.
(3)Terminal agent performs the definition of operation:Such as detect that CPU running statuses, internal memory running status, disk use shape
When state exceedes upper limit threshold, if need to send burst alarm to service end, illegality equipment accesses, illegal software installs unloading,
Critical software installation unloading, illegal process initiation, critical processes are exited, illegal external connection occur, find leak, find virus, behaviour
Make whether abnormal system version, software version exception, software configuration file version need to send alarm, illegality equipment access extremely
Whether whether need prevention, leak afterwards needs whether reparation, virus need whether removing, illegal process need stopping, key to enter
Whether journey, which needs, restarts, whether critical software needs whether renewal, software configuration file need renewal, terminal agent to be sent on the cycle
Frequency.
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
Terminal agent obtains terminal device information, in information process is collected, terminal agent meeting according to configuration file is verified
According to the setting for verifying configuration file, message is sent in burst, and such as CPU usage is too high, illegal process be present to service end,
Service end can will be given on facility information in cycle.Accordingly, service end flow is similar with terminal agent, as shown in Figure 2:
Monitor and specify TCP port;Terminal agent is waited to establish connection;Connection establish after the completion of, interact with terminal agent public key and
Symmetric key;The username and password of receiving terminal agent logs, judge whether correctly, version to be interacted with terminal agent if correct
This information;Judge the compatibility of version, if incompatible, wait terminal agent to download latest edition;Terminal agent is waited to obtain
Verify configuration file;The facility information that receiving terminal agency sends.Service end also can be as needed, is actively sent to terminal agent
The program version specified, send and verify configuration file, inquiry apparatus information etc., after service end collects all information, be responsible for whole
Reason, displaying and further processing, as above send main website etc..
Fig. 3 is the flow that terminal agent of the present invention interacts symmetric key and asymmetric public key with service end, terminal agent with
Machine generates the RSA public private key pairs of 2048, and public key is sent into service end, the public key of service end receiving terminal agency, generation clothes
2048 RSA public private key pairs at business end, produce a 32 byte random numbers, using terminal acts on behalf of public key encryption, by service end
Random number after RSA public keys and encryption is sent to terminal agent, and terminal agent receives service end public key, and with the private key solution of oneself
Close random number;Both sides produce AES 256 symmetric key using this random number, in follow-up interaction, use AES corresponding
Encrypted with layer data domain, use SHA1 and RSA private key signatures, public key sign test.
Fig. 4 is a typical format of message used in interaction of the present invention, and in application layer heading, start byte accounts for
4 bytes, it is 0xeb 0x90 0xeb 0x90, for synchronous applications layer data;Overall length is two bytes, represents whole TCP load
Length, that is, the length of application data;1 byte of encryption indicator, it is table when being 1 in plain text that application layer data domain is represented when being 0
It is encryption to show application layer data domain, and application layer data domain is encrypted using AES 256 during encryption;The byte of signature length 256, signature
Scope includes application layer heading and application layer data domain, if application layer data domain is encrypted, for the data label after encryption
Name, after SHA1 algorithms hash, is filled to 256 bytes, then with the RSA private key signatures of 2048;In application layer data domain, number
According to the byte of domain effective length 2, refer to the data field length under plaintext state, do not calculate filling during encryption;Client message mark
Know 4 bytes, when referring to that terminal agent actively sends data, constantly incremental message label, needed when service end responds with identical
Client message identification;The byte of service end message identification 4, when referring to that service end actively sends data, constantly incremental message
Label, band identical service end message identification is needed when terminal agent responds;Client message identification and service end message identification
Not only can with the frame message of unique mark one, can also anti-message playback;Whether the byte of control code 1, the direction of identification message, have
Next frame message, whether make a mistake, transmit reason etc.;The byte of service codes 2, the particular type and work(of the content of identification message
Energy.
It is preferred that quantity >=1 of terminal agent, quantity >=1 of service end.
It is preferred that electric power secondary system uses more net redundancy structures, i.e., do redundancy, such as A using at least two independent networks
Net, B nets, C nets etc., each table apparatus can typically access multiple nets simultaneously in network, not intercommunication between more nets.Multiple networks are simultaneously
TCP connections are established, and select any one network for being successfully established TCP connections to interact.
It is preferred that the network that selection is successfully established TCP connections at first interacts.
It is preferred that in step 3 to step 8, by the way of a identical data is netted more and sent simultaneously, recipient only handles it
Middle a data, ignore remaining data.
It is preferred that in step 3 to step 8, mutual message uses symmetric key encryption, and after original message hash, use is non-
Asymmetric private key is signed to hash values, and by the way of public key sign test.
Below by taking more net redundancy structures of the double nets of A/B as an example, the step of present invention includes, is as follows:
Step 1:Terminal agent nets IP to service end A and connects foundation request with port initiation TCP, if being successfully established connection,
Into step 2, if unsuccessful, continue to initiate TCP connection requests;Meanwhile terminal agent nets IP to service end B and port is initiated
Request is established in TCP connections, if being successfully established connection, into step 2, if unsuccessful, continues to initiate TCP connection requests.
Step 2:Terminal agent selection is first(I.e. at first)Network and the service end friendship that TCP is connected are successfully established with service end
Mutual public key and symmetric key, if A nets first establish connection, terminal agent selection A nets interacted with service end public key with it is symmetrically close
Key, if B nets first establish connection, terminal agent selection B nets interact public key and symmetric key with service end, and interaction flow is as schemed
Shown in 3, public key is interacted with service end for terminal agent and after the completion of symmetric key, step 3 to step 8 mutual message is using symmetrical close
Key is encrypted, to, to hash values signature, the mode of public key sign test, message format is such as after original message hash, using asymmetric privacy keys
Shown in Fig. 4;Subsequent step terminal agent is all that message is sent in the double nets of A/B simultaneously, and service end receives a copy of it, loses it
Remaining, service end message is also sent in the double nets of A/B simultaneously, and terminal agent receives a copy of it, loses remaining.
Step 3:Terminal agent is using the username and password login service end specified, if username and password mistake, is returned
Step 1 is returned, if correctly, into step 4.
Step 4:Terminal agent sends the program version of itself to service end, service end receiving terminal act on behalf of after version with from
The terminal agent edition comparison that body is supported, if the terminal agent version itself do not supported, then return to version verification to client
Error message, after terminal agent receives check errors message, into step 5, if the terminal agent version that itself is supported, then
Version is returned to terminal agent and verifies correct message, after terminal agent receives the correct message of verification, into step 6.
Step 5:Terminal agent sends the request of download terminal Agent, the terminal agent that service end would be compatible with to service end
Version is sent to terminal agent in the form of message, and according to program size, meeting framing is sent, and terminal agent has received all programs
After message, complete program is formed, disconnects TCP connections, return to step 1 after covering current version.
Step 6:Terminal agent is sent to service end obtains the request for verifying configuration file, and service end will verify configuration file
Terminal agent is sent in the form of message, according to file size, meeting framing is sent, and terminal agent has received all file messages
Afterwards, composition is complete verifies configuration file.
Step 7:Terminal agent obtains the facility information of terminal, such as obtained on request according to the configuration for verifying configuration file
Equipment CPU usage, memory usage etc..
Step 8:The facility information of collection is sent to service end by terminal agent, and when to carry out burst alarm, tissue is prominent
Warning message is sent out, is sent to service end;When being sent on the cycle to be carried out, text of being delivered newspaper on the cycle is organized, is sent to service end, serviced
End is when having service request, and organizing-request response message returns to service end, service end collecting device information counted, alerted,
Displaying and other operations, main website can be sent above, carries out data mining analysis etc..
Above-mentioned electric power secondary system equipment check method, electric power can be obtained on the basis of equipment existing capability is not influenceed
Electrical secondary system all devices information, centralized management equipment software and hardware version, supervision equipment running status.Its human resources consumes
It is low, error rate is low, automaticity is high, independent of equipment in itself, flexibility and compatibility be high, anti-eavesdrop and anti-tamper.
The beneficial effects of the invention are as follows:
(1)After electric power secondary system all devices all deploy terminal agent, terminal agent will be handed over specified services end automatically
Mutually, automatic obtain verifies configuration file, automatic acquisition recent program version, automatic uploading device information, and automaticity is high, section
A large amount of human resources are saved.
(2)Terminal agent can be connected with multiple service ends, and support more net redundancy structures, when a servers go down
When do not interfere with other servers, other networks are not interfered with during a network paralysis, as long as having a server and a net
Network normal work, whole system is with regard to energy normal operation, and error rate is low, serious forgiveness is high.
(3)Terminal agent and equipment program in itself and business decouple, and do not influence the original business function of equipment, it is not necessary to set
Standby supplier participates in, and flexibility is high, compatibility is high.
(4)Terminal agent uses symmetric key encryption with service end, after original message hash, uses asymmetric privacy keys pair
Hash values signature, the mode of public key sign test, and input username and password, peace are also needed at terminal agent Connection Service end
Quan Xinggao, can be with anti-eavesdrop and anti-tamper.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure that bright specification and accompanying drawing content are made either equivalent flow conversion or to be directly or indirectly used in other related
Technical field, be included within the scope of the present invention.
Claims (7)
1. a kind of electric power secondary system equipment check method, it is characterised in that comprise the following steps:
Step 1, electric power secondary system all devices dispose terminal agent, and terminal agent is actively established TCP with service end and is connected,
Enter step 2 after successful connection;
Step 2, terminal agent interact public key and symmetric key with service end;
Step 3, terminal agent are using the username and password login service end specified, if username and password mistake, is returned
Step 1, if username and password is correct, into step 4;
Step 4, terminal agent interact version information with service end, if incompatible version, into step 5, and if edition compatibility,
Into step 6;
Step 5, terminal agent download compatible terminal agent version from service end, disconnect TCP connections after covering current version, and
Return to step 1;
Step 6, terminal agent obtain from service end verifies configuration file;
Step 7, terminal agent are according to the facility information for verifying configuration file acquisition terminal;
The facility information of collection is sent to service end by step 8, terminal agent, and service end terminates after receiving.
A kind of 2. electric power secondary system equipment check method according to claim 1, it is characterised in that the number of terminal agent
Amount >=1, quantity >=1 of service end.
A kind of 3. electric power secondary system equipment check method according to claim 2, it is characterised in that electric power secondary system
Using more net redundancy structures, multiple networks establish TCP connections simultaneously, and the network for selecting any one to be successfully established TCP connections
Interact.
4. a kind of electric power secondary system equipment check method according to claim 3, it is characterised in that selection succeeds at first
The network for establishing TCP connections interacts.
A kind of 5. electric power secondary system equipment check method according to claim 3, it is characterised in that step 3 to step 8
In, by the way of a identical data is netted more and sent simultaneously, recipient only handles a copy of it data, ignores remaining number
According to.
A kind of 6. electric power secondary system equipment check method according to claim 1, it is characterised in that step 3 to step 8
In, mutual message uses symmetric key encryption, and after original message hash, hash values are signed using asymmetric privacy keys, and
By the way of public key sign test.
7. a kind of electric power secondary system equipment check method according to claim 1, it is characterised in that when service end and end
End agency either party when judging incompatible version, think incompatible version.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710747409.3A CN107566473A (en) | 2017-08-28 | 2017-08-28 | A kind of electric power secondary system equipment check method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710747409.3A CN107566473A (en) | 2017-08-28 | 2017-08-28 | A kind of electric power secondary system equipment check method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107566473A true CN107566473A (en) | 2018-01-09 |
Family
ID=60977115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710747409.3A Pending CN107566473A (en) | 2017-08-28 | 2017-08-28 | A kind of electric power secondary system equipment check method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107566473A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113765893A (en) * | 2021-08-13 | 2021-12-07 | 成都安恒信息技术有限公司 | Protocol proxy password penetration authentication method applied to MySQL system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277193A (en) * | 2008-05-05 | 2008-10-01 | 北京航空航天大学 | One-point entry and access system based on authentication service acting information facing to service architecture |
CN102932350A (en) * | 2012-10-31 | 2013-02-13 | 华为技术有限公司 | TLS (Transport Layer Security) scanning method and device |
CN103188088A (en) * | 2011-12-27 | 2013-07-03 | 北京新媒传信科技有限公司 | Equipment information acquisition system and equipment information acquisition method |
CN103188101A (en) * | 2011-12-31 | 2013-07-03 | 成都勤智数码科技股份有限公司 | Distributed type collection scheduling method and device |
US20140268226A1 (en) * | 2013-03-12 | 2014-09-18 | Kyocera Document Solutions Inc. | Apparatus management system, electronic apparatus, apparatus management method, and computer readable recording medium |
CN106162831A (en) * | 2016-07-21 | 2016-11-23 | 北京小米移动软件有限公司 | Method for connecting network and device |
CN106407076A (en) * | 2016-09-22 | 2017-02-15 | 山东浪潮云服务信息科技有限公司 | A monitoring method for the operation information of software and hardware based on a domestic CPU and operating system environment |
-
2017
- 2017-08-28 CN CN201710747409.3A patent/CN107566473A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277193A (en) * | 2008-05-05 | 2008-10-01 | 北京航空航天大学 | One-point entry and access system based on authentication service acting information facing to service architecture |
CN103188088A (en) * | 2011-12-27 | 2013-07-03 | 北京新媒传信科技有限公司 | Equipment information acquisition system and equipment information acquisition method |
CN103188101A (en) * | 2011-12-31 | 2013-07-03 | 成都勤智数码科技股份有限公司 | Distributed type collection scheduling method and device |
CN102932350A (en) * | 2012-10-31 | 2013-02-13 | 华为技术有限公司 | TLS (Transport Layer Security) scanning method and device |
US20140268226A1 (en) * | 2013-03-12 | 2014-09-18 | Kyocera Document Solutions Inc. | Apparatus management system, electronic apparatus, apparatus management method, and computer readable recording medium |
CN106162831A (en) * | 2016-07-21 | 2016-11-23 | 北京小米移动软件有限公司 | Method for connecting network and device |
CN106407076A (en) * | 2016-09-22 | 2017-02-15 | 山东浪潮云服务信息科技有限公司 | A monitoring method for the operation information of software and hardware based on a domestic CPU and operating system environment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113765893A (en) * | 2021-08-13 | 2021-12-07 | 成都安恒信息技术有限公司 | Protocol proxy password penetration authentication method applied to MySQL system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210297410A1 (en) | Mec platform deployment method and apparatus | |
EP3745639A1 (en) | Method and apparatus for obtaining device identification | |
CN101873298A (en) | Registration method, terminal, server and system | |
WO2014135195A1 (en) | Handling of digital certificates | |
WO2021073375A1 (en) | Remote authentication mode negotiation method for combined device, and related device | |
CN108990062B (en) | Intelligent security Wi-Fi management method and system | |
WO2018160252A1 (en) | Determining security vulnerabilities in application programming interfaces | |
Li et al. | A secure sign-on protocol for smart homes over named data networking | |
CN106713236A (en) | End-to-end identity authentication and encryption method based on CPK identifier authentication | |
US20230283479A1 (en) | Data Transmission Method and Apparatus, Device, System, and Storage Medium | |
WO2013013837A1 (en) | Simple group security for machine-to-machine networking (sgsm2m) | |
CN108134713A (en) | A kind of communication means and device | |
US20220116387A1 (en) | Remote attestation mode negotiation method and apparatus | |
CN114223233A (en) | Data security for network slice management | |
CN107566473A (en) | A kind of electric power secondary system equipment check method | |
CN109548026A (en) | A kind of method and apparatus of controlling terminal access | |
CN115633359A (en) | PFCP session security detection method, device, electronic equipment and storage medium | |
CN105791036A (en) | AP access detection method and device | |
WO2019239191A1 (en) | Methods, wireless modules, electronic devices and server devices | |
CN110505089B (en) | Internet of things equipment management method and system | |
CN111221764B (en) | Cross-link data transmission method and system | |
CN114301774B (en) | Device configuration method, system, device, electronic device and storage medium | |
CN102148704A (en) | Software implementation method for universal network management interface of safe switch | |
CN109150661A (en) | A kind of method for discovering equipment and device | |
CN113595240B (en) | Method, device, equipment and storage medium for detecting electric power data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |
|
RJ01 | Rejection of invention patent application after publication |