CN108183553A - A kind of data test and acquisition monitoring device, intelligent grid and its user terminal - Google Patents
A kind of data test and acquisition monitoring device, intelligent grid and its user terminal Download PDFInfo
- Publication number
- CN108183553A CN108183553A CN201810006240.0A CN201810006240A CN108183553A CN 108183553 A CN108183553 A CN 108183553A CN 201810006240 A CN201810006240 A CN 201810006240A CN 108183553 A CN108183553 A CN 108183553A
- Authority
- CN
- China
- Prior art keywords
- data
- wireless
- acquisition terminal
- monitoring
- wireless data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012806 monitoring device Methods 0.000 title claims abstract description 26
- 238000012360 testing method Methods 0.000 title claims abstract description 13
- 238000012544 monitoring process Methods 0.000 claims abstract description 35
- 230000005540 biological transmission Effects 0.000 claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 11
- 230000003993 interaction Effects 0.000 claims abstract description 4
- 238000000034 method Methods 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 20
- 238000012546 transfer Methods 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 9
- 238000013500 data storage Methods 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 7
- 238000013480 data collection Methods 0.000 claims description 3
- 238000001514 detection method Methods 0.000 abstract description 4
- 238000006467 substitution reaction Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 241001269238 Data Species 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000005611 electricity Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012913 prioritisation Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- OCUSNPIJIZCRSZ-ZTZWCFDHSA-N (2s)-2-amino-3-methylbutanoic acid;(2s)-2-amino-4-methylpentanoic acid;(2s,3s)-2-amino-3-methylpentanoic acid Chemical compound CC(C)[C@H](N)C(O)=O.CC[C@H](C)[C@H](N)C(O)=O.CC(C)C[C@H](N)C(O)=O OCUSNPIJIZCRSZ-ZTZWCFDHSA-N 0.000 description 1
- 241000282472 Canis lupus familiaris Species 0.000 description 1
- 102100040225 Gamma-interferon-inducible lysosomal thiol reductase Human genes 0.000 description 1
- 101001037132 Homo sapiens Gamma-interferon-inducible lysosomal thiol reductase Proteins 0.000 description 1
- 238000012271 agricultural production Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000012938 design process Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000005194 fractionation Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000010572 single replacement reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B70/00—Technologies for an efficient end-user side electric power management and consumption
- Y02B70/30—Systems integrating technologies related to power network operation and communication or information technologies for improving the carbon footprint of the management of residential or tertiary loads, i.e. smart grids as climate change mitigation technology in the buildings sector, including also the last stages of power distribution and the control, monitoring or operating management systems at local level
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S20/00—Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
- Y04S20/20—End-user application control systems
- Y04S20/242—Home appliances
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/126—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of data test and acquisition monitoring device, intelligent grid and its user terminals, which includes data monitoring and processing module, for the data that wireless data acquisition terminal is sent to be handled and monitored;Control centre, for controlling the operation of whole system;Client control module, for monitoring wireless sensor network node;Display terminal is used to implement monitoring system and the human-computer interaction of administrator.The system can realize the radio detection and transmission to the power information of smart power grid user, can ensure the detection continuity and accuracy of user power utilization data, and can greatly ensure confidentiality and the safety of power information transmission.
Description
The application be application No. is:201510586655.6 the applying date:It is on 09 15th, 2015, entitled " a kind of
The divisional application of the patent of invention of the monitoring device of wireless test and data transmission system ".
Technical field
The present invention relate to data test and acquisition monitoring field, and in particular to a kind of wireless test at smart power grid user end and
The monitoring device of data transmission system.
Background technology
Intelligent grid, also known as knowledge type power grid or modern power network are by modern advanced sensing and measuring technique, letter
Message communication technology, control technology and original power transmission and distribution infrastructure it is highly integrated and formed novel power grid.Intelligent distribution network
Opening cause a large amount of collecting terminals and mobile terminal extensive use and access, this just passes data in intelligent distribution network
The problems such as defeated integrality, confidentiality, attack tolerant and secret protection, proposes new challenge.Intelligent electric energy meter is intelligent electricity
The intelligent terminal of net, it has not been traditional electric energy meter, and intelligent electric energy meter is used substantially in addition to having traditional electric energy meter
Other than the function of measuring of electricity, in order to adapt to the use of intelligent grid and new energy, it also has two-way a variety of rate metering work(
The intelligentized work(such as energy, user terminal control function, the bidirectional data communication function of plurality of data transmission modes, anti-stealing electricity function
Can, intelligent electric energy meter represents the developing direction of following energy-conserving intelligent power grid end user's intelligent terminal.
In recent years, it with the development and mutually fusion of sensor, computer, wireless communication and the technologies such as micro electronmechanical, generates
Wireless sensor network (WSN).Wireless sensor network by all kinds of integrated microsensors collaboratively in real time monitoring,
The information of various environment or monitored object is perceived and acquired, is widely used in environmental monitoring, health care, military defense, anti-terrorism
The every field such as the disaster relief.Wireless sensor network is considered as one of 21 century most important technology, is current built-in field
The hot spot of research has the boundless market space and researching value.Wireless sensor network is increasingly becoming intelligent power distribution
Most important user terminal data collecting system in net.
At present, the problems such as integrality transmitted both at home and abroad to wireless sensor network data, confidentiality, attack tolerant, carries out
Certain research, it is proposed that a variety of different Broadcast authentication protocols.One kind is μ TESLA Broadcast authentication protocols, and the agreement is right
It is using the shared key between base station and node, by way of unicast when the initiation parameter of broadcast authentication is allocated
Come what is completed.It sends authentication key by delay and judges delay duration and determine the integrality of transmitted data packet.The party
Case safety is preferable, but message authentication has delay, and this delay can lead to the generation of dos attack.Later researcher is to μ TESLA
A series of improvement are carried out, it is proposed that multistage μ TESLA schemes, the μ TESLA schemes of more base stations, the μ TESLA for certification drift
Prioritization scheme and μ TESLA certificate schemes based on message-driven etc..These prioritization schemes are all on basic μ TESLA bases
The improvement of upper progress, essential idea do not change, therefore it is the problem of always existing to be delayed, they still cannot resist DOS
Attack.Other researchers propose a kind of certificate scheme of once signed in intelligent grid, but the program is to reaching very
Good safety will consume very big signature and certification expense.Later researcher proposes the broadcast authentication based on Merkle trees again
Agreement, the method which uses direct certification, does not postpone, efficiently solve the problems, such ass dos attack, while realize more
The certification together of a node, the function being mutually authenticated.But it will result in node storage overhead when number of nodes is excessive and communication opened
The problem of pin is all excessive.Therefore researcher proposes a kind of broadcast for being classified Merkle trees on the basis of basic Merkle trees again
Strategy, this method are designed for great deal of nodes, substantially reduce storage and the communication overhead of node.Recent study persons propose
Merkle authentication tree agreements are applied to the scheme of intelligent grid, the safety which is applied to user and community portal is led to
The safety of communication is improved in letter.But effective secret protection is not carried out to user data, attacker intercepts user's hair
The information sent can also interpret useful data.The leakage of the privacies such as the power information and electricity consumption rule of user will cause into
The event that room theft etc. endangers people's lives safety occurs.
Invention content
The present invention provides a kind of wireless test and the monitoring device of data transmission system, the monitoring device and can realize to intelligence
The radio detection of the power information of power grid user and transmission can ensure the detection continuity and accuracy of user power utilization data,
And it can greatly ensure confidentiality and the safety of power information transmission.
To achieve these goals, the present invention provides a kind of wireless test and the monitoring device of data transmission system, wherein
The system has wireless sensor network node, monitoring device and wireless data transfer module, wherein, the wireless sensor network
The wireless data acquisition terminal of network node passes through wireless data transfer module wireless connection with monitoring device;
The monitoring device includes:
Data monitoring and processing module, for the data that wireless data acquisition terminal is sent to be handled and monitored;
Control centre, for controlling the operation of whole system;
Client control module, for monitoring wireless sensor network node;
Display terminal is used to implement monitoring system and the human-computer interaction of administrator.
Preferably, the control centre is low-power scm, it is preferred to use MSP430F149 microcontrollers certainly can also
Using other microcontrollers, such as ARM microcontrollers either AVR single chip.
Preferably, the data monitoring and processing module and wireless data transfer module can build secure communication jointly and lead to
Road, is bi-directionally connected wireless data acquisition terminal and control centre, control centre to the data into monitoring device at
Reason and control.
Preferably, control centre is completed by secured communication channel to the safety verification of wireless data acquisition terminal, if
Acquisition terminal is dangerous, then the acquisition terminal is prevented to enter monitoring device and carries out data storage with exchanging, if acquisition terminal is pacified
Entirely, then the wireless data acquisition terminal is allowed to carry out data storage with exchanging.
Preferably, the storage and exchange process that control centre can be to data all in system, are encrypted.
Preferably, the client control module can be sent out the control instruction of control centre by the form of wireless transmission
Wireless data acquisition terminal is given, the data of wireless data acquisition terminal to be controlled to acquire.
The present invention has the following advantages and beneficial effect:(1) wireless sensor network node can be realized in real time to intelligent electricity
The acquisition of the environment temperatures of network users, humidity, voltage, electric current, active and idle etc. information;(2) it uses and wirelessly carries out
Networking greatly reduces the stock number occupied in data transmission procedure, reduces implementation cost, and be easily installed, safeguard, is controlling
Room processed carries out the power information of the multiple smart power grid users of unified monitoring, improves monitoring efficiency, has saved human cost;(3)
Improved data collection station and data processing module can ensure the monitoring continuity and accuracy of climatic data, accurate to instruct
Agricultural production;(4) it by establishing secured communication channel, to the data storage in system and exchange process, is encrypted,
It can ensure the safety and reliability of system communication, avoid user power utilization information leakage.
Description of the drawings
Fig. 1 shows a kind of wireless test of monitoring device and the block diagram of data transmission system with the present invention.
Fig. 2 shows a kind of wireless test of the present invention and the monitoring methods of data transmission system.
Specific embodiment
Fig. 1 is a kind of wireless test and data transmission system for showing the monitoring device with the present invention.The system packet
It includes:Wireless sensor network node 1, for detecting and acquiring smart power grid user client information;Monitoring device 3, it is whole for controlling
The operation and data processing of a system;Wireless data transfer module 2, for the user data of wireless sensor network node acquisition
Radio to monitoring device;The wireless sensor network node 1 includes multiple sensor nodes 11 and data acquisition
Terminal 12;Wherein, the wireless data acquisition terminal 12 of the wireless sensor network node 1 leads to 3 mistake nothings with monitoring device
2 wireless connection of line data transmission module.
The monitoring device 3 includes:Data monitoring and processing module 31, control centre 32,33 He of client control module
Display terminal 34.Preferably, the control centre 32 is low-power scm, it is preferred to use MSP430F149 microcontrollers, certainly
Other microcontrollers, such as ARM microcontrollers either AVR single chip can also be used.
The data monitoring and processing module 31 and wireless data transfer module 2 can build secured communication channel jointly, double
To connection wireless data acquisition terminal 12 and control centre 32, control centre 32 carries out the data into monitoring device 3
Processing and control.
Control centre 32 completes the safety verification to wireless data acquisition terminal by secured communication channel, if acquisition is eventually
Hold it is dangerous, then prevent the acquisition terminal 12 enter monitoring device 3 carry out data storage with exchanging, if acquisition terminal 12 is pacified
Entirely, then the wireless data acquisition terminal 12 is allowed to carry out data storage with exchanging.
Control centre 32 can be to data all in system storage and exchange process, be encrypted.
The client control module 34 can be sent the control instruction of control centre 32 by the form of wireless transmission
To wireless data acquisition terminal 12, the data of wireless data acquisition terminal 12 to be controlled to acquire.
Control centre 32 is equipped with monitoring software and is configured with backstage real-time data base, and the monitoring software has monitoring work(
Software format can and can be stored data as.The monitoring software of middle control module installation customized development, realizes the company to monitoring data
Continuous acquisition is checked and is preserved.The software has a variety of monitoring functions, and such as real time monitoring, real-time curve is shown, history curve is shown
Show, alarm.Software configuration backstage real-time data base, can store acquired data according to actual demand, and such as timing storage becomes
Change storage etc.;Software support stores data as the popular softwares form such as Excel simultaneously, convenient for subsequently to the use of data.
The wireless data acquisition terminal 12 is provided with firewall module, and wireless data acquisition terminal 12 and wireless data pass
It send and an encrypting module is each provided in module 2, also set up in Wireless data transmission module there are one authentication module, data
Mutually independent binary channels link block is provided between delivery module and firewall module.
The wireless data acquisition terminal 12 includes:Including MCU, analog input unit, On-off signal unit, relay
Device output unit, digital output unit, sram cell, RTC units, watchdog unit, RS232/RS485/RS422 units,
Radio-cell and power supply unit;Wherein analog input unit, On-off signal unit are connect with MCU, and MCU is defeated with relay
Go out unit, digital output modular unit, at the same MCU also with sram cell, RTC units, watchdog unit, RS232/RS485/
RS422 units, radio-cell and LED light unit;RS232/RS485/RS422 units are connect with user interface circuit,
Radio-cell connects ZigBee transmission antennas and adapter circuit.
The wireless data transfer module 2 includes ZigBee reception antennas, adapter circuit and data/address bus, for receiving
Data collection station wireless signal, and give the data processing module via data bus transmission.
The sensor node 11 may include:Include air temperature sensor, air humidity sensor, voltage sensor, electricity
One or both of flow sensor, active sensor, idle sensor and above combination.
At the use High performance industrial grade of wireless data acquisition terminal 12 wireless module, 32 bit walk of High performance industrial grade
Device is managed, supports multistage suspend mode and awakening mode, reduces power consumption to greatest extent, built-in real-time clock (RTC) supports time switch
Machine.It is preferred that using metal shell, protection class IP30, metal shell and system security isolation, particularly suitable for industry control scene
Using.The wireless data acquisition terminal is designed using WDT house dogs, ensures that system is stablized, using the complete anti-mechanism that goes offline,
Ensure that data terminal is always online, 15KVESD built in S232/RS485 interfaces is protected, antennal interface lightning protection.
Fig. 2 shows a kind of wireless test of the present invention and the monitoring methods of data transmission system.This method specifically includes
Following steps:
S1. the communication including control centre, wireless data acquisition terminal and wireless data transfer module is built
System, wireless data acquisition terminal can send and receive data to the wireless data transfer module;
S2. secured communication channel is established, is bi-directionally connected wireless data acquisition terminal and control centre, control centre is to described
Data into the wireless data acquisition terminal of system are handled and are controlled;
S3. control centre completes the safety verification of wireless data acquisition terminal by secured communication channel, if acquisition is eventually
Hold it is dangerous, then prevent the wireless data acquisition terminal enter system carry out data encryption storage with exchanging, if acquisition terminal
Safety then allows the acquisition terminal to carry out data encryption storage with exchanging.
The foundation of secured communication channel is completed using following steps in S2:
S21. when wireless data acquisition terminal sends connection application to control centre, wireless data acquisition terminal is looked into first
The session connection information whether cached with control centre is ask, is, using the digest algorithm cached in session connection information to meeting
It talks about key and carries out digest calculations, it will words number and the session id and session cipher key digest field of abstract result write-in connection application packet
In;Whether buffer control center certificate is inquired again, is then by the control of the certificate serial number of control centre write-in connection application packet
In center certificate sequence-number field processed, then the sequence number write-in wireless data acquisition terminal card by wireless data acquisition terminal certificate
In preface row field;Asymmetric encryption and Digital Signature Algorithm Assembly Listing are filled in, and connection application is sent to control centre;
S22. it after control centre receives the connection application data packet of wireless data acquisition terminal transmission, is looked into according to session number
Whether inquiry is cached with corresponding session connection information, is, using the digest algorithm cached in session connection information to session key
Digest calculations are carried out, result of calculation is compared with the summary data of session key that wireless data acquisition terminal is sent;Such as
Fruit comparing result is consistent, then using session key and symmetry algorithm as the key and algorithm of data protection in secured communication channel,
And enter in next step;
S23. control centre sends to terminal negotiates to terminate order, and the negotiation that terminal receives control centre's transmission terminates order
Afterwards, escape way foundation terminates.
In S22, if comparing result is inconsistent, following step flow is performed:
S221. control centre reads the sequence number for control centre's certificate that wireless data acquisition terminal is sent, if with this
It holds the certificate serial number used consistent, does not then send the certificate of control centre to wireless data acquisition terminal, and perform next step
Flow;
S222. control centre reads the sequence number for the wireless data acquisition terminal certificate that wireless data acquisition terminal is sent,
Whether wireless data acquisition terminal certificate has been cached according to sequence number inquiry;It is not need to wireless data acquisition terminal to control
Center processed sends the certificate of wireless data acquisition terminal, and performs following workflows:
S2221. control centre reads the algorithm combination list that wireless data acquisition terminal is sent, and selects a group encryption intensity
Highest algorithm combination is sent to wireless data acquisition terminal, and perform as the AES combination used in below scheme
Next step flow;
S2222. control centre generates one group of interim unsymmetrical key pair, private key and the step using control centre
The asymmetric arithmetic in algorithm combination selected in rapid S2221 is digitally signed temporary public key, by signature result with facing
When public key group packet, to terminal send cipher key interaction data packet;
S2223. it sends connection application to wireless data acquisition terminal and terminates data packet;S2224. wireless data acquisition terminal
Receive the connection application response data packet of control centre's transmission, the combination of cache key negotiation algorithm and session number;Wireless data is adopted
If collection terminal receives control centre's certificate data packet of control centre's transmission, legitimate verification is carried out to control centre's certificate,
It is proved to be successful, then using the sequence number in certificate as mark, the digital certificate at buffer control center;Authentication failed then exits
This flow disconnects;If wireless data acquisition terminal receives the application wireless data acquisition terminal card of control centre's transmission
The certificate group of local terminal is then bundled into certificate data packet by the request for data packet of book, is sent to control centre;Wireless data acquisition terminal
The key agreement data packet of control centre's transmission is received, then using the public key in control centre's certificate of caching and the caching
Cipher key agreement algorithm combination in asymmetric arithmetic, the temporary public key signing messages of control centre is verified, if not into
Work(then exits flow, and break link;Next step is performed if success;
S2225. wireless data acquisition terminal at random generation one session key, as in escape way data protection it is close
Key, using the symmetry algorithm in algorithm combination as protection algorism;Using session number as mark, it will words key, symmetrical calculation
Method is cached with digest algorithm;Session key is encrypted using asymmetric arithmetic, and using asymmetric arithmetic to encryption
Session key afterwards carries out digital label;By encrypted session key and digital signature group packet, key is sent to control centre
Negotiation data packet;
S2226. it is sent to control centre and negotiates to terminate order;
If S2227. control centre receives wireless data acquisition terminal certificate data packet, wireless data acquisition terminal is demonstrate,proved
Book carries out legitimate verification, if be proved to be successful, using the sequence number in certificate as mark, and the number card at buffer control center
Book;If authentication failed exits this flow, disconnect;
S2228. after control centre receives the key agreement data packet of wireless data acquisition terminal transmission, wireless data is used
The asymmetric arithmetic in the algorithm combination selected in public key and step S22 in acquisition terminal certificate carries out signed data
Flow, and break link are exited in signature verification if unsuccessful;Local terminal private key and asymmetric arithmetic solution are used if success
Close session key, and the session number generated using in step S22 is as mark, it will words key, symmetry algorithm and digest algorithm
It is cached;And using session key and symmetry algorithm name as the key and algorithm of data protection in secured communication channel;It performs
Step S23.
Preferably, in the step S221, if not caching wireless data acquisition terminal certificate, in the step
Increase below scheme between S2221 and the step S2222:Control centre sends control centre's card to wireless data acquisition terminal
Book;Control centre sends the request for obtaining wireless data acquisition terminal certificate to wireless data acquisition terminal.
Preferably, in step s3, the control centre to through safety certification and enter system wireless data adopt
The detailed process for collecting progress data encryption storage and the exchange of terminal imports source data, S32 data intercepts by S31, and S33 systems turn
It changes, S34 character transcodings, S35 data recombinations, S36 character strings are substituted to be completed with S37 shortage of data storage composition, in addition to
Outside step S31 and step S32, other procedural orders can change.
Preferably, in step S32, in the function of interception character, need three elements, i.e., character to be intercepted, interception
Digit and the initial position of interception, source data is character to be intercepted, and the length intercepted is specified, and the initial position value of interception is
By password input by user, data that machine code or server end return split into it is several after all plus 1, the number of fractionation needs
The group number of source data to be imported with plan is identical.
For being intercepted with MID (text, start_num, num_chars) function by bank card password, wherein text tables
Show character to be intercepted i.e. source data, num_chars represents the digit of interception, and start_num is the start bit for representing interception
It puts, num_chars can be specified, when needing upgrading, it is only necessary to source data digit is changed, and reassigns num_chars values,
Such as num_chars values are designated as 20 by 10, then the character intercepted becomes 20 by 10, here it is expand algorithm,
And 6 numbers that bank card can be inputted password by start_num values decouple, the value split adds 1, as start_
Num values intercept character, and method for splitting is relatively more, example MID (password, 1,1), MID (password, 2,1), MID
(password, 3,1), MID (password, 4,1), MID (password, 5,1), MID (password, 6,1), i.e., by 6
Password values become 6 individual characters, for example, in 6 groups of source data first group be denoted as text1, utilize MID
(text1, MID (password, 1,1)+1,20), it is possible to 1 position be added to start with the first bit digital of password password
Text1 is intercepted, intercepts 20, the purpose for intercepting character is that simple data is mingled in complex data, for example, close in bank card
In the design process of code, by this step, password is mingled in source data, after introducing 6 groups of source datas, text values are exactly source number
According to, and start_num values are exactly+1 values of MID (password, A, 1), A is the position of code characters, in this manner it is possible to achieve 6
Group new data, they be the units in having intercepted since the 1st to the 10th num_chars value length data,
For example, the data after password is split are 6, mean that and intercepted since the 7th, num_chars values are 20, mean that the position of interception
Number is 20, and in a simple password 000000 and complicated password 658973, the meaning of the two represents that the former is from 6 sources respectively
The 1st of data starts to intercept, and the latter's expression is from the 7th of 6 source datas, the 6th, the 9th, the 10th, the 8th, the 4th
Position starts to intercept, unrelated with the complexity of password, as long as hardware is not supplied to others by Password Input personnel, and allows simultaneously
Others sees that Password Input acts, and when only being cracked from the password of storage, the difficulty that cracks of the two is not different,
During this step, there are 10 subdatas, that is, password combination number to increase 1,000,000 times for each source data.
Preferably, in the conversion of step S33 systems, if it is desirable, can be by any data conversion into another kind
The data of system, during low binary data is converted into high binary data, since high binary data needs are more basic
Element representation, basic element here is exactly similar 0 to the 9 of 10 systems this 10 numbers, can become fairly simple data
Into complicated data, while data length is shortened, for example cardinar number digital data becomes number and the data of letter mixing, sometimes
It waits, needs complex data becoming simple data or non-numeric data is converted into numerical data.
For example machine code is usually number and alphabetical blended data, and Chinese character is non-numeric data, in GB2312 standards
In, the region-position code of Chinese character can be directly quoted, numerical data is converted thereof into or is understood as GB2312 normative texts
The number (7445 include non-chinese symbol) of 7445 systems, Chinese document is encrypted or applied to digital certificate accordingly, will
Chinese text is understood as 7445 systems, is converted into 10 systems, and data are surprisingly huge, by taking 5 digits as an example, be converted into 10 into
System, digit is up to 20, and peak is 2.2873E+19, and reconvert is into 62 binary datas, that is, is converted into number and letter and mixes
Data are closed, encryption is without using negative data, and therefore, carry is as 10 binary datas and the first power of system number, and two
Power, cube etc. are incremented by successively, and when the digit of programming needs is not achieved in transformed data bits, a high position is supplied with 0
Number, such as transformed 10 binary data are 123, and the digit needed is 5, just adds 0 to supply 5 for 00123 in a high position,
Most people contact English alphabet and number is relatively more, and example is 62 systems and the conversion of 10 systems, with 0 to 9 table of Arabic numerals
Show that 0 to 9, alphabetical small letter a to z represent 10 to 35, alphabetical capitalization A to Z represents 36 to 61, there can also be other designated parties
One's own department or unit code of case, number that aft section is told about or letter, transcoding algorithm is also in compliance with same rule, such as by 62 binary datas
A6bJ9 is converted into 10 binary datas as 36*624+6*623+11*622+45*62+9=533423147, is 9 digits.
Preferably, the character transcoding in step S34 is realized using character transcoding algorithm, with a character or one group
Character is exactly character transcoding by the method that transcoding algorithm obtains another character or one group of character, and either single character is still
One group of character, transcoding are all transcodings one by one, and only the latter is to convert several characters simultaneously, and the transcoding meaning of single character is little
, so being that character group carries out transcoding, character group transcoding needs transcoding algorithm instruction set and transcoding table to realize jointly.
Example is to design four kinds of numbers and the transcoding algorithm of letter, is named as ABCD algorithms, transcoding algorithm follows following rule
Rule:
1:The result is that cannot be identical after the identical algorithm conversion of different source codes;
2:The transformation result of several algorithms of same source code mutually can not be identical;
3:The result of transcoding cannot be identical with source code;
4:Transcoding will set several transcoding algorithms, to strengthen the combinatorial complexity of password,
Example is converted with the basic condition of one's own department or unit of number and letter code, and one's own department or unit code of number 0 to 9 is respectively
Number 0 to 9, one's own department or unit code of lowercase a to z is number 10 to 35 respectively;One's own department or unit code of capitalization A to Z is number respectively
36 to 61.
In ABCD algorithms, wherein the 1st algorithm, the 2nd algorithm, the 3rd algorithm are the mathematics fortune carried out based on the code of one's own department or unit
It calculates, but the 4th algorithm is by manually adjusting, without what algorithm rule,
1st algorithm:The 2nd odd number behind one's own department or unit of number or letter yard plus one's own department or unit code is exactly turn of this number or letter
Code algorithm, as a result >=62, just subtract 62, record the corresponding number of its one's own department or unit code or letter;
2nd algorithm:The 13rd odd number is exactly that this number or alphabetical B turn after number or alphabetical one's own department or unit code plus one's own department or unit code
Code algorithm, as a result >=62, just subtract 62, record the corresponding number of its one's own department or unit code or letter;
3rd algorithm:One's own department or unit of number or letter code adds the transcoding algorithm that 30 be exactly the number or letter, as a result >=62,
Just subtract 62, record the corresponding number of its one's own department or unit code or letter;
4th algorithm:4th algorithm part follow number or letter one's own department or unit code plus the one's own department or unit code after the 3rd even number be exactly
The transcoding algorithm of the number or letter, as a result >=62, just subtract 62, the conflict of the data phase same sex, has done portion in order to prevent
The corresponding number of its one's own department or unit code or letter are recorded in adjustment, from its design principle it is recognised that each before and after transcoding is digital
All will not be identical with letter, this is a most basic designing points, and during calling, the 1st algorithm, the 2nd algorithm, the 3rd algorithm all may be used
It directly to be called using tables of data, can also be converted using mathematical operation, still, the 4th algorithm, which have passed through, to be manually adjusted, and needs to make
It is called with tables of data, other transcoding algorithms can also be designed, exemplary transcoding algorithm is utilized similar field and carries out algorithm
ABCD sorts.
Transcoding algorithm instruction set:Each character to be transcoded needs to instruct transcoding direction that could obtain correctly as source code
As a result, the data of instruction set and data to be transcoded there are correspondence, i.e. an instruction character corresponds to a word to be transcoded
Symbol, by rule is instructed to be converted into another character, for example, instruction set data are BACC, data to be transcoded are 1234, are exactly
1,234 four data are performed into B algorithms, A algorithm, C algorithms, C algorithms respectively.
Preferably, it is to add the one kind that other character substitutes of the partial character in character character string to be substituted in step S36
Secret skill art, replacement can be single replacement or character string substitutes, and preferably designing scheme is that character string substitutes, and is substituted
It is completed using character substitution tables, character substitution tables data are divided into record number and substitute character string, the character that record number occurs
Exactly need the character substituted.
Such as there are 5, A, b, 6 in record number, all 5, A, b, 6 characters all extract in the data that will exactly substitute
Coming, be grouped, the character digit needs after grouping are consistent with record number digit, when last organizes no corresponding digit,
Can abandon substituting or specify increases digit, such as specified first character is added to and meets digit, searches in character substitution tables
Corresponding record number is determined to substitute character string, since the several character original positions extracted are different, be needed
Determine insertion position, more typical method is that the several characters that will be extracted are converted into 10 binary datas, utilizes remainder function
It determines, for example, remainder adds 1 to be several, is just inserted into the original position of which character, the space of other characters is removed, obtained new
Data, the record number design of character substitution tables is it is noted that record number needs to enumerate all combinations being likely to occur, otherwise
It is likely to occur operation mistake, 3 when substituting, needs 27 groups, that is, 3 cube, 4 when substituting, record number just needs
256 groups, be 44 powers, if 5 be exactly 55 powers, up to 3125 groups, thus the number of characters substituted need it is suitable
In, data table data is too huge and too small imappropriate, and alternate data should not be too long, is otherwise possible to by long number it is investigated that finding word
Accord with substitution tables, 4 alternate data only needs 256 groups when substituting, during with English upper and lower case letter and digital representation, one and two
It is sufficient that position, so short data substitute, and just have no idea reversely to find character substitution tables by searching for replacement character string,
Do not allow the character for ciphering process occur or encryption data is not present, this is also for preventing by substituting string searching to word
Substitution tables are accorded with, reason is very simple, if some character only occurs in some tables of data, quickly with regard to that can find, as long as
Character existing for ciphering process or encryption data can serve as substituting character, even the former data character substituted can also go out
It is existing, for example, replacing this four characters of 5, A, b, 6, then, appearance 5, A, b, 6 are still allowed in alternate data, due to the word of replacement
Symbol digit differs, so the digit of final password is uncertain, replacement character may be used superposition encryption method and repeatedly encrypt,
More parts of character substitution tables are designed, connecting data by multiple variables completes repeatedly encryption, such as variable data 2356,6987,
3075,9837,8863,5534, by the sum of 6 groups of data difference divided by character substitution tables, it is connected to corresponding tables of data successively
It completes to substitute, that is, first passes through 2356 and be connected to corresponding tables of data completion replacement, and using the data after replacement as source number
According to, it completes to substitute with the 2nd group of data connection to corresponding tables of data, and so on, character substitution tables have one with homogeneous data table
Point difference, exactly different table record numbers can be different, and refer to that record number digit can also be different, for example, table 1 is
5, A, b, 6 are substituted, table 2 is to substitute c, and 8, H, k or table 1 are completed 3 characters and substituted, and what table 2 was completed is that 4 characters substitute, because
It is the digit and character designed by retrieving record number for program, the character substituted and grouping digit is determined, in programming
In, character transcoding, system conversion and interception character are preferred with obtaining the data of regular length, and after the completion of character substitutes, data
Length is not known, this gives the authorized strength work of the character length contingency table of this step ciphering process of rearrangement character position to bring difficulty,
Although the uncertain length value value of character length contingency table is more random, negative value can not occur, that is, other are determined
The sum of length value cannot be more than the digit of data, be needed after other steps for this purpose, character substitutes this step, shortage of data
Before preservation, otherwise design difficult.
Preferably, the missing algorithm in step S37, when introducing source data by link variable, link variable often has several groups,
Link variable is divided into several groups, and the source data introduced accordingly also has several groups, and link variable group number is very little, and password easily cracks, such as
It is complete that fruit link variable fails record, then, according to the codomain of the data, that is, the value that the data are likely to occur, add successively
It is close, the value consistent with encrypted result can be also obtained, and the number that may be needed and how much related, missing values of the value lacked calculated
When more, it may be necessary to calculation times it is more.
For example, the value range of missing one group of data ABCD, ABCD are all 0 to 9, then, from 0000 to 9999, always all
Matching value can be found, if source data is 6639, then from 0000 operation to 6639, will be obtained as a result, in this process,
10000 operations are at most needed, and if for encrypted as a result, data record is not equally complete, but this infull data bit
Put can be by obtaining, when encryption is compared successively during operation, and actually encrypted result is by these infull characters point
Several sections are cut into, the result of operation needs and this several segment data is all coincide, if encrypted data bits is very long, then,
Occur same password possibility it is also very little, since data record is not complete, from the password of record cracked almost without
May, the missing values for lacking algorithm cannot be too complicated, otherwise slowly obtains less than as a result, the shortcomings that lacking algorithm is and asymmetric calculation
Method is the same very time-consuming, it is not necessary that, it can not use.
Although it as described above, is illustrated according to the embodiment and attached drawing that embodiment is limited, to the art
It can carry out various modifications and deform from above-mentioned record for technical staff with general knowledge.For example, according to explanation
Technology illustrated in the mutually different sequence of method carry out and/or according to system, structure, device, circuit with explanation etc.
The mutually different form of method illustrated by inscape is combined or combines or carried out according to other inscapes or equipollent
It replaces or displacement also may achieve appropriate effect.For those of ordinary skill in the art to which the present invention belongs, it is not taking off
Under the premise of from present inventive concept, several equivalent substitute or obvious modifications are made, and performance or use is identical, should be all considered as
It belongs to the scope of protection of the present invention.
Claims (10)
1. a kind of data test and collection monitoring system, which is characterized in that the system has wireless sensor network node, prison
Device and wireless data transfer module are controlled, wherein, the wireless data acquisition terminal of the wireless sensor network node and monitoring
Device is included by wireless data transfer module wireless connection, the monitoring device in data monitoring and processing module and control
The heart, the data monitoring and processing module and wireless data transfer module can build secured communication channel jointly, be bi-directionally connected nothing
Line data collection station and control centre, control centre are handled and are controlled to the data into monitoring device.
2. monitoring system according to claim 1, which is characterized in that the monitoring device further includes:Client control mould
Block, for monitoring wireless sensor network node;And display terminal, it is used to implement monitoring system and the human-computer interaction of administrator.
3. monitoring system according to claim 1, which is characterized in that the control centre is low-power scm, preferably
Using MSP430F149 microcontrollers, other microcontrollers, such as ARM microcontrollers either AVR single chip can also be used certainly.
4. monitoring system according to claim 1, which is characterized in that the control centre is completed by secured communication channel
To the safety verification of wireless data acquisition terminal, if acquisition terminal is dangerous, the acquisition terminal is prevented to enter monitoring device
Data storage is carried out with exchanging, if acquisition terminal is safe, the wireless data acquisition terminal is allowed to carry out data storage and hand over
It changes.
5. monitoring system according to claim 1, which is characterized in that the control centre can be to data all in system
Storage and exchange process, are encrypted.
6. monitoring system according to claim 2, which is characterized in that the client control module, it can be by control centre
Control instruction, wireless data acquisition terminal is sent to by the form of wireless transmission, to control wireless data acquisition terminal
Data acquire.
7. monitoring system according to claim 1, which is characterized in that the wireless sensor network node includes multiple biographies
Sensor node and wireless data acquisition terminal;Wherein, the wireless data acquisition terminal and prison of the wireless sensor network node
Control device passes through wireless data transfer module wireless connection.
8. monitoring system according to claim 7, which is characterized in that the sensor node may include:Include air themperature
Sensor, air humidity sensor, voltage sensor, current sensor, active sensor, one kind in idle sensor or two
Kind and above combination.
9. a kind of smart power grid user end, which is characterized in that the smart power grid user end includes arbitrary in claim 1~8
Monitoring system in one.
10. a kind of intelligent grid, which is characterized in that the intelligent grid includes the monitoring in any one in claim 1~8
System.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810006240.0A CN108183553B (en) | 2015-09-15 | 2015-09-15 | Data testing and collecting monitoring device, smart power grid and user side thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510586655.6A CN105281432B (en) | 2015-09-15 | 2015-09-15 | A kind of supervising device of wireless test and data transmission system |
CN201810006240.0A CN108183553B (en) | 2015-09-15 | 2015-09-15 | Data testing and collecting monitoring device, smart power grid and user side thereof |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510586655.6A Division CN105281432B (en) | 2015-09-15 | 2015-09-15 | A kind of supervising device of wireless test and data transmission system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108183553A true CN108183553A (en) | 2018-06-19 |
CN108183553B CN108183553B (en) | 2021-04-06 |
Family
ID=55149966
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510586655.6A Expired - Fee Related CN105281432B (en) | 2015-09-15 | 2015-09-15 | A kind of supervising device of wireless test and data transmission system |
CN201810006240.0A Active CN108183553B (en) | 2015-09-15 | 2015-09-15 | Data testing and collecting monitoring device, smart power grid and user side thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510586655.6A Expired - Fee Related CN105281432B (en) | 2015-09-15 | 2015-09-15 | A kind of supervising device of wireless test and data transmission system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN105281432B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109412901A (en) * | 2018-12-07 | 2019-03-01 | 成都博宇利华科技有限公司 | Acquisition data continuity detection method and detection system based on Time Domain Processing |
CN110514927A (en) * | 2019-08-16 | 2019-11-29 | 惠州Tcl移动通信有限公司 | The unit exception detection method of mobile terminal, computer-readable medium |
CN113051589A (en) * | 2021-03-17 | 2021-06-29 | 重庆扬成大数据科技有限公司 | Big data government affair analysis and processing safety application platform |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106094642A (en) * | 2016-07-18 | 2016-11-09 | 合肥赑歌数据科技有限公司 | A kind of monitoring system of big data platform |
CN106205090A (en) * | 2016-07-22 | 2016-12-07 | 汤亮 | A kind of electric power network real-time monitoring system and control method thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007068991A1 (en) * | 2005-12-15 | 2007-06-21 | Nokia Corporation | Method, device, and system for network-based remote control over contactless secure storages |
CN101467131A (en) * | 2005-07-20 | 2009-06-24 | 美国唯美安视国际有限公司 | Network user authentication system and method |
CN101814226A (en) * | 2010-02-23 | 2010-08-25 | 南华大学 | Ammeter wireless monitoring interface devices and wireless monitoring system |
CN102742250A (en) * | 2012-03-13 | 2012-10-17 | 华为终端有限公司 | Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server |
CN102882688A (en) * | 2012-10-24 | 2013-01-16 | 北京邮电大学 | Lightweight authentication and key agreement protocol applicable to electric information acquisition |
CN103218876A (en) * | 2013-04-11 | 2013-07-24 | 成都秦川科技发展有限公司 | Information security management module of remote control intelligent electric energy meter |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8121618B2 (en) * | 2009-10-28 | 2012-02-21 | Digimarc Corporation | Intuitive computing methods and systems |
-
2015
- 2015-09-15 CN CN201510586655.6A patent/CN105281432B/en not_active Expired - Fee Related
- 2015-09-15 CN CN201810006240.0A patent/CN108183553B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101467131A (en) * | 2005-07-20 | 2009-06-24 | 美国唯美安视国际有限公司 | Network user authentication system and method |
WO2007068991A1 (en) * | 2005-12-15 | 2007-06-21 | Nokia Corporation | Method, device, and system for network-based remote control over contactless secure storages |
CN101814226A (en) * | 2010-02-23 | 2010-08-25 | 南华大学 | Ammeter wireless monitoring interface devices and wireless monitoring system |
CN102742250A (en) * | 2012-03-13 | 2012-10-17 | 华为终端有限公司 | Secret key transmitting method based on transport layer safety, intelligent meter reading terminal and server |
CN102882688A (en) * | 2012-10-24 | 2013-01-16 | 北京邮电大学 | Lightweight authentication and key agreement protocol applicable to electric information acquisition |
CN103218876A (en) * | 2013-04-11 | 2013-07-24 | 成都秦川科技发展有限公司 | Information security management module of remote control intelligent electric energy meter |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109412901A (en) * | 2018-12-07 | 2019-03-01 | 成都博宇利华科技有限公司 | Acquisition data continuity detection method and detection system based on Time Domain Processing |
CN110514927A (en) * | 2019-08-16 | 2019-11-29 | 惠州Tcl移动通信有限公司 | The unit exception detection method of mobile terminal, computer-readable medium |
CN113051589A (en) * | 2021-03-17 | 2021-06-29 | 重庆扬成大数据科技有限公司 | Big data government affair analysis and processing safety application platform |
Also Published As
Publication number | Publication date |
---|---|
CN108183553B (en) | 2021-04-06 |
CN105281432B (en) | 2018-01-16 |
CN105281432A (en) | 2016-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105305615B (en) | A kind of monitoring method of wireless test and data transmission system | |
CN105072636B (en) | A kind of wireless test and data transmission system | |
CN105281432B (en) | A kind of supervising device of wireless test and data transmission system | |
CN106205090A (en) | A kind of electric power network real-time monitoring system and control method thereof | |
CN110267270B (en) | Identity authentication method for sensor terminal access edge gateway in transformer substation | |
CN103746962B (en) | GOOSE electric real-time message encryption and decryption method | |
CN104580246B (en) | Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment | |
CN109525391A (en) | A kind of method that server is synchronous with lockset information security | |
CN115277040B (en) | Medical health data storage and sharing method and system based on blockchain technology | |
CN106992850B (en) | A kind of secret key verification method of blue-tooth intelligence lock controller | |
CN110912877B (en) | Data transmitting and receiving method and device based on IEC61850 model in transformer substation | |
CN104717644B (en) | A kind of two layers of sensor network range query method that can verify that secret protection | |
CN105915347A (en) | Control method for power electric wireless transmission device | |
CN115225339B (en) | Safe access and data transmission method and system for sensing terminal of power transmission Internet of things | |
CN105430017B (en) | Data safety communication means | |
CN110691358B (en) | Access control system based on attribute cryptosystem in wireless sensor network | |
CN104639328B (en) | A kind of GOOSE message authentication method and system | |
Jiao et al. | A blockchain-based trusted upload scheme for the internet of things nodes | |
CN117135626B (en) | Safe Internet of things control system based on high-speed encryption technology | |
CN102045870A (en) | Business processing device and method based on wireless machine-to-machine protocol (WMMP) | |
CN104639330B (en) | A kind of GOOSE message completeness certification method | |
CN111740965B (en) | Internet of things equipment authentication method based on physical unclonable equation | |
CN105959258A (en) | Wireless transmitting device of power grid | |
CN112311553A (en) | Equipment authentication method based on challenge response | |
CN110430207B (en) | Multi-point remote cross-network interaction collaborative authentication method for smart power grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210317 Address after: 25 Guangming Road, Yinchuan (National) economic and Technological Development Zone, Yinchuan City, Ningxia Hui Autonomous Region Applicant after: NINGXIA LONGJI NINGGUANG INSTRUMENT Co.,Ltd. Address before: 518000 duty-free business building 6, Fuhua Road, Futian District, Shenzhen, Guangdong 1403 Applicant before: Liu Chao |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |