CN108920935A - A kind of verifying and formation gathering method automatically - Google Patents
A kind of verifying and formation gathering method automatically Download PDFInfo
- Publication number
- CN108920935A CN108920935A CN201810646391.2A CN201810646391A CN108920935A CN 108920935 A CN108920935 A CN 108920935A CN 201810646391 A CN201810646391 A CN 201810646391A CN 108920935 A CN108920935 A CN 108920935A
- Authority
- CN
- China
- Prior art keywords
- equipment
- technical staff
- handheld terminal
- background server
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
Abstract
The invention discloses a kind of automatic verifyings and formation gathering method, technical staff to carry out certification login after scanning the two-dimensional code by the APP of handheld terminal;It logins successfully rear technical staff and starts commissioning device, equipment records the operational order when Debugging message and technical staff's commissioning device generated;The information package of record is sent handheld terminal by equipment, and handheld terminal is connected background server if having solved the problems, such as and sends record information in background server and store;Research staff is needed to help if not solving the problems, such as, the information that handheld terminal record is packaged is issued into research staff, after research staff is analyzed and processed problem, technical staff again debugs equipment and judges whether to have solved the problems, such as, until problem has solved ability power cut-off.The present invention is when logging device and handheld terminal are connect with equipment, and without inputting password, matching key has been set before equipment is produced, has reduced the risk of information leakage.
Description
Technical field
Being verified automatically the present invention relates to information with the technical field collected is specifically a kind of verifying and information automatically
Collection method.
Background technique
In the product facility for selling oneself in later maintenance, it is defeated that technical staff carries out debugging needs to equipment for many companies
Access customer name and password ability beaching accommodation, but there is the risk of leakage account and password in this process, thus to production
Product security presence threatens.And technical staff does not record operation during commissioning device, asks from the background in analysis
Inscribe producing cause when cannot well control problem come from earth where, may is that technical staff's statement in alternating-current technique problem
There is deviation, it is also possible to be that equipment thinks that technical staff's operation error causes when causing or debugging in running, for these
The problem of can not reappearing checked if just it is helpless, when encountering again just without reference to case and foundation.
Summary of the invention
The purpose of the present invention is to provide a kind of automatic verifying and formation gathering methods, have set before product facility use
Matching key is set, technical staff is in logging device without inputting password, it is therefore prevented that password leakage, technical staff is in debugging
The Debugging message and technical staff that equipment generates can be sent to by scanning the two-dimensional code and commissioning device the operational order of equipment
In the handheld terminal of connection, if technical staff can solve plant issue, the message that handheld terminal is received transmit to
It is saved in background server, research staff is sent information to if it not can solve problem and analyzes and solves, researched and developed
Personnel will be fed back in equipment after solving the problems, such as by handheld terminal again, and technical staff debugs again.
The present invention is achieved through the following technical solutions:A kind of verifying and formation gathering method automatically, specifically include following step
Suddenly:
Step F1:Certification login is carried out after the two dimensional code in APP scanning device that technical staff passes through handheld terminal;
Step F2:The network connection of handheld terminal and commissioning device is kept, technical staff starts commissioning device, and equipment record generates
Debugging message and technical staff's commissioning device when operational order;
Step F3:Technical staff judges whether solved plant issue in commissioning device;
Step F4:The information package of record is sent handheld terminal by equipment, after connecting handheld terminal if having solved the problems, such as
Platform server simultaneously sends record information in background server and stores, power cut-off;
Step F5:It needs research staff to help if not solving the problems, such as, the information that handheld terminal record is packaged is issued into research and development
Personnel, after research staff is analyzed and processed problem, technical staff again debugs equipment and judges whether to have solved to ask
Topic;Until problem has solved ability power cut-off, and sends record information in background server and store;If equipment without
Method solves the problems, such as, then record is directly sent to background server and stored.
Further, in order to preferably realize the present invention, the step F1 specifically includes following steps:
Step F11:Two dimensional code on the APP of the handheld terminal and the equipment will matching key setting when equipment is dispatched from the factory
It is good, without ephemeral encryption without input password, avoid the risk of password leakage;
Step F12:After two dimensional code on handheld terminal scanning device browser inquire background server whether with cipher key match;
Step F13:If background server is identified as matching status, mobile phone terminal success connects with background server and commissioning device
It connects, can not be connect with background server and commissioning device if mismatching.
Further, in order to preferably realize the present invention, the step F2 specifically includes following steps:
Step F21:For technical staff in commissioning device, equipment can generate Debugging message, and equipment can record Debugging message
Get off;
Step F22:Operational order of the technical staff in commissioning device can also be recorded by equipment.
Further, in order to preferably realize the present invention, the step F4 specifically includes following steps:
Step F41:After technical staff stops debugging, equipment beats the operational order of the Debugging message recorded and technical staff
Packet is sent to handheld terminal;
Step F42:If handheld terminal, by Resolving probiems, is passed through WIFI or mobile network in commissioning device by technical staff
It is connect with background server, and the information of packing is sent to background server and is stored, power cut-off.
Further, in order to preferably realize the present invention, the step F5 specifically includes following steps:
Step F51:If technical staff, not by Resolving probiems, the information that handheld terminal record is packaged is issued in commissioning device
Research staff requests help;
Step F52:The information that research staff sends according to handheld terminal is analyzed and is solved to problem, then again by hand-held
Terminal is fed back to commissioning device;
Step F53:Technical staff again debugs equipment and detection judges whether to have solved the problems, such as, continues if not solving
Research staff is fed back to, until solving the problems, such as, then power cut-off and sends record information in background server and stores;
If plant issue can not solve, directly sends the information of record in background server and store.
Working principle:
Matching key is provided with before product facility use, technical staff, without inputting password, prevents in logging device
Password leakage, technical staff Debugging message and technical staff that in debugging, equipment is generated can send the operational order of equipment
To by scanning the two-dimensional code in the handheld terminal being connect with commissioning device, if technical staff can solve plant issue, will hold
The message that terminal receives is transmitted to be saved into background server, is sent information to and is ground if it not can solve problem
Hair personnel analyze and solve, and research staff will be fed back in equipment after solving the problems, such as by handheld terminal again, technical staff
It is debugged again.
Compared with prior art, the present invention having the following advantages that and beneficial effect:
(1)The present invention is when logging device and handheld terminal are connect with equipment, without inputting password, has been arranged before equipment is produced
Key is matched well, prevents password from revealing;
(2)Handheld terminal of the invention collects the operation of Debugging message and technical staff to equipment automatically after connecting with commissioning device
Instruction;
(3)Information of the invention is collected and transmission process is defaulted as encrypted tunnel, reduces the risk of information leakage.
Detailed description of the invention
Fig. 1 is work flow diagram of the present invention;
Fig. 2 is present invention work block diagram;
Fig. 3 is that two dimensional code logs in schematic diagram.
Specific embodiment
The present invention is described in further detail below with reference to embodiment, embodiments of the present invention are not limited thereto.
Embodiment 1:
The present invention is achieved through the following technical solutions, as shown in Figure 1-Figure 3, a kind of verifying and formation gathering method automatically, and specifically
Include the following steps:
Step F1:Certification login is carried out after the two dimensional code in APP scanning device that technical staff passes through handheld terminal;
Step F2:The network connection of handheld terminal and commissioning device is kept, technical staff starts commissioning device, and equipment record generates
Debugging message and technical staff's commissioning device when operational order;
Step F3:Technical staff judges whether solved plant issue in commissioning device;
Step F4:The information package of record is sent handheld terminal by equipment, after connecting handheld terminal if having solved the problems, such as
Platform server simultaneously sends record information in background server and stores, power cut-off;
Step F5:It needs research staff to help if not solving the problems, such as, the information that handheld terminal record is packaged is issued into research and development
Personnel, after research staff is analyzed and processed problem, technical staff again debugs equipment and judges whether to have solved to ask
Topic;Until problem has solved ability power cut-off, and sends record information in background server and store;If equipment without
Method solves the problems, such as, then record is directly sent to background server and stored.
It should be noted that by above-mentioned improvement, commissioning device is the product that company has sold, and equipment is before sale
Built-in a set of two dimensional code login authentication mechanism, when the equipment sold need when something goes wrong technical staff it is carried out debugging and
Later maintenance, technical staff are scanned the two-dimensional code by handheld terminal APP when logging device is debugged and carry out certification login,
This process can avoid password leakage problem caused by input password and occur.Handheld terminal success identity keeps setting with debugging after logging in
Standby connection, technical staff start to debug.In debugging, equipment can generate Debugging message, but equipment can be by the debugging of generation
Information is recorded, while operational order when technical staff's commissioning device can also be recorded by equipment.
After debugging, technical staff judges whether to have solved the problems, such as, if successfully solving, tune that equipment will be recorded
Examination information and operational order transmit handheld terminal, and handheld terminal is retransmited into the background server of company and deposited
Storage, to regard case after the following if it happens same event.But the problem of some touching research and development, is belonged to than more sensitive
Confidential information, technical staff can not solve, and the research staff of enterprise backend is needed to go to solve.Equipment will be recorded at this time
Information package issues research staff after being sent to handheld terminal again, analyzes and solves for research staff.Research staff solves
Problem is fed back in equipment by handheld terminal afterwards, technical staff to scene adjusts again depending on the problem of feeding back
Examination, the power cut-off if successfully solving the problems, such as are analyzed and are solved if cannot successfully solve to continue to feed back to research staff,
Until the debugging problem of equipment successfully solves.
The present invention discloses a kind of method that automatic verifying is collected with information for the later maintenance and debugging of product facility,
Solve company sell for equipment in user rs environment, the information between the technical staff and backstage research staff that remove commissioning device
The effect got through.The technical staff usually sale, technical support, pre-sales after-sales staff etc. of curstomer's site commissioning device is gone to,
But they cannot may all understand all technologies, and some technologies belong to secret core technology and cannot disclose, this
Method allows them that will can more intuitively show the research staff on backstage the problem of field device, is equivalent to the view for getting through front and back
Angle avoids the problem that linking up generation, realizes automatic operation.The channel of information registration of the present invention and transmission is before equipment is dispatched from the factory
Just built-in good encrypted tunnel, could only succeed when background server successful match key login authentication, be not necessarily to
Play the role of encryption in the state of input password.
The other parts of the present embodiment are same as the previously described embodiments, and so it will not be repeated.
Embodiment 2:
The present embodiment advanced optimizes on the basis of the above embodiments, and as shown in Figure 1-Figure 3, the step F1 is specifically included
Following steps:
Step F11:Two dimensional code on the APP of the handheld terminal and the equipment will matching key setting when equipment is dispatched from the factory
It is good, without ephemeral encryption without input password, avoid the risk of password leakage;
Step F12:After two dimensional code on handheld terminal scanning device browser inquire background server whether with cipher key match;
Step F13:If background server is identified as matching status, mobile phone terminal success connects with background server and commissioning device
It connects, can not be connect with background server and commissioning device if mismatching.
It should be noted that the matching key can simply be divided into two stages by above-mentioned improvement:Key agreement phase
With the coded communication stage.99% attack is to be directed to key agreement phase, and have a name to be called " man-in-the-middle attack ", example
It will negotiate an encryption method when being communicated such as A and B, so-called " man-in-the-middle attack " is exactly C, and C had not only pretended to be A but also pretended to be B,
C controls the process of entire key agreement in centre, then what encryption method to be exactly finally that C has the final say with, encryption later
Channel, which seems, have been encrypted but actually C has decruption key, then C can obtain clear data at any time.If C not at
Function enters key agreement phase, then being difficult to enter back into the coded communication stage.So guaranteeing the safety of key agreement phase
The safety of energy basic guarantee message transmitting procedure.The matched key of equipment has just consulted when leaving the factory in the present invention, only
Intra-company's ability successful match, it is possible to guarantee the safety of key agreement phase.
The encryption method that this method can be used is as follows:
Symmetric encipherment algorithm list guarantees the safety of transmission data
3des-cbc
blowfish-cbc
cast128-cbc
arcfour
arcfour128
arcfour256
aes128-cbc
aes192-cbc
aes256-cbc
rijndael-cbc@lysator.liu.se
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
Message digest code algorithm list guarantees data data integrity in the transmission
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha1-etm@openssh.com
hmac-sha1-96-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-md5-etm@openssh.com
hmac-md5-96-etm@openssh.com
hmac-ripemd160-etm@openssh.com
umac-64-etm@openssh.com
umac-128-etm@openssh.com
Diffie-Hellman list, just negotiated configuration is good before equipment factory for this, and has been completed that key is handed over
It changes
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1
diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group1-sha1
curve25519-sha256@libssh.org
gss-gex-sha1-
gss-group1-sha1-
gss-group14-sha1-
The other parts of the present embodiment are same as the previously described embodiments, and so it will not be repeated.
Embodiment 3:
The present embodiment advanced optimizes on the basis of the above embodiments, and as Figure 1-Figure 2, the step F2 is specifically included
Following steps:
Step F21:For technical staff in commissioning device, equipment can generate Debugging message, and equipment can record Debugging message
Get off;
Step F22:Operational order of the technical staff in commissioning device can also be recorded by equipment.
It should be noted that by above-mentioned improvement, Debugging message and technology people that technical staff generates in commissioning device
Member can be recorded in a device the operation of equipment, check convenient for the later period, avoid technical staff and exchange with backstage research staff
Generation is led to the problem of when communication.
The other parts of the present embodiment are same as the previously described embodiments, and so it will not be repeated.
Embodiment 4:
The present embodiment advanced optimizes on the basis of the above embodiments, and as shown in Figure 1-Figure 3, the step F4 is specifically included
Following steps:
Step F41:After technical staff stops debugging, equipment beats the operational order of the Debugging message recorded and technical staff
Packet is sent to handheld terminal;
Step F42:If handheld terminal, by Resolving probiems, is passed through WIFI or mobile network in commissioning device by technical staff
It is connect with background server, and the information of packing is sent to background server and is stored, power cut-off.
The step F5 specifically includes following steps:
Step F51:If technical staff, not by Resolving probiems, the information that handheld terminal record is packaged is issued in commissioning device
Research staff requests help;
Step F52:The information that research staff sends according to handheld terminal is analyzed and is solved to problem, then again by hand-held
Terminal is fed back to commissioning device;
Step F53:Technical staff again debugs equipment and detection judges whether to have solved the problems, such as, continues if not solving
Research staff is fed back to, until solving the problems, such as, then power cut-off and sends record information in background server and stores;
If plant issue can not solve, directly sends the information of record in background server and store.
It should be noted that the technical staff for going to curstomer's site commissioning device is usually sale, skill by above-mentioned improvement
Art support, pre-sales after-sales staff etc., but they cannot may all understand all technologies, and some technologies belong to secret
Core technology cannot disclose, this method allows them that will can more intuitively show the research and development people on backstage the problem of field device
Member is equivalent to the visual angle for getting through front and back, avoids the problem that linking up generation, realizes automatic operation.Transmit the encryption letter of data
There are also benefit, some sensitive datas are that only research and development can contact in road, even the personnel of other departments also do not allow and see in company
, enterprise backend is passed back so directly having encrypted.No matter whether plant issue solves all to send out the information saved in debugging process
It is sent in background server, when encountering problems again, can check this solution to the problem and process.
The other parts of the present embodiment are same as the previously described embodiments, and so it will not be repeated.
The above is only presently preferred embodiments of the present invention, not does limitation in any form to the present invention, it is all according to
According to technical spirit any simple modification to the above embodiments of the invention, equivalent variations, protection of the invention is each fallen within
Within the scope of.
Claims (5)
1. a kind of automatic verifying and formation gathering method, it is characterised in that:Specifically include following steps:
Step F1:Certification login is carried out after the two dimensional code in APP scanning device that technical staff passes through handheld terminal;
Step F2:The network connection of handheld terminal and commissioning device is kept, technical staff starts commissioning device, and equipment record generates
Debugging message and technical staff's commissioning device when operational order;
Step F3:Technical staff judges whether solved plant issue in commissioning device;
Step F4:The information package of record is sent handheld terminal by equipment, after connecting handheld terminal if having solved the problems, such as
Platform server simultaneously sends record information in background server and stores, power cut-off;
Step F5:It needs research staff to help if not solving the problems, such as, the information that handheld terminal record is packaged is issued into research and development
Personnel, after research staff is analyzed and processed problem, technical staff again debugs equipment and judges whether to have solved to ask
Topic;Until problem has solved ability power cut-off, and sends record information in background server and store;If equipment without
Method solves the problems, such as, then record is directly sent to background server and stored.
2. a kind of automatic verifying according to claim 1 and formation gathering method, it is characterised in that:The step F1 is specific
Include the following steps:
Step F11:Two dimensional code on the APP of the handheld terminal and the equipment will matching key setting when equipment is dispatched from the factory
It is good, without ephemeral encryption without input password, avoid the risk of password leakage;
Step F12:After two dimensional code on handheld terminal scanning device browser inquire background server whether with cipher key match;
Step F13:If background server is identified as matching status, mobile phone terminal success connects with background server and commissioning device
It connects, can not be connect with background server and commissioning device if mismatching.
3. a kind of automatic verifying according to claim 2 and formation gathering method, it is characterised in that:The step F2 is specific
Include the following steps:
Step F21:For technical staff in commissioning device, equipment can generate Debugging message, and equipment can record Debugging message
Get off;
Step F22:Operational order of the technical staff in commissioning device can also be recorded by equipment.
4. a kind of automatic verifying according to claim 1 and formation gathering method, it is characterised in that:The step F4 is specific
Include the following steps:
Step F41:After technical staff stops debugging, equipment beats the operational order of the Debugging message recorded and technical staff
Packet is sent to handheld terminal;
Step F42:If handheld terminal, by Resolving probiems, is passed through WIFI or mobile network in commissioning device by technical staff
It is connect with background server, and the information of packing is sent to background server and is stored, power cut-off.
5. a kind of automatic verifying according to claim 1 and formation gathering method, it is characterised in that:The step F5 is specific
Include the following steps:
Step F51:If technical staff, not by Resolving probiems, the information that handheld terminal record is packaged is issued in commissioning device
Research staff requests help;
Step F52:The information that research staff sends according to handheld terminal is analyzed and is solved to problem, then again by hand-held
Terminal is fed back to commissioning device;
Step F53:Technical staff again debugs equipment and detection judges whether to have solved the problems, such as, continues if not solving
Research staff is fed back to, until solving the problems, such as, then power cut-off and sends record information in background server and stores;
If plant issue can not solve, directly sends the information of record in background server and store.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810646391.2A CN108920935A (en) | 2018-06-21 | 2018-06-21 | A kind of verifying and formation gathering method automatically |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810646391.2A CN108920935A (en) | 2018-06-21 | 2018-06-21 | A kind of verifying and formation gathering method automatically |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108920935A true CN108920935A (en) | 2018-11-30 |
Family
ID=64419859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810646391.2A Pending CN108920935A (en) | 2018-06-21 | 2018-06-21 | A kind of verifying and formation gathering method automatically |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108920935A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611794A (en) * | 2019-09-08 | 2019-12-24 | 天津市城西广源电力工程有限公司 | Safety monitoring system for construction site |
CN111815332A (en) * | 2020-06-15 | 2020-10-23 | 珠海格力电器股份有限公司 | Equipment activation method, device and system |
CN111814930A (en) * | 2020-06-24 | 2020-10-23 | 珠海格力电器股份有限公司 | Method and system for debugging air conditioner through code scanning |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070006154A1 (en) * | 2005-06-15 | 2007-01-04 | Research In Motion Limited | Controlling collection of debugging data |
JP2014211848A (en) * | 2013-04-22 | 2014-11-13 | 株式会社日立エルジーデータストレージ | Control method for data archive system, and server device |
CN104243221A (en) * | 2014-10-15 | 2014-12-24 | 闽江学院 | Campus network maintenance recording system and method based on smart phone platform |
CN106330570A (en) * | 2016-09-27 | 2017-01-11 | 三星电子(中国)研发中心 | Device client, mobile client and device fault diagnosis system |
CN106384208A (en) * | 2016-10-12 | 2017-02-08 | 国网江苏省电力公司徐州供电公司 | Interactive inspection system and method based on two-dimensional code technology |
CN106936803A (en) * | 2015-12-31 | 2017-07-07 | 亿阳安全技术有限公司 | Two-dimensional code scanning certification login method and relevant apparatus |
CN107194472A (en) * | 2017-04-26 | 2017-09-22 | 消检通(深圳)科技有限公司 | Method, server and the readable storage medium storing program for executing of fire-fighting equipment maintenance information record |
CN107203814A (en) * | 2017-04-26 | 2017-09-26 | 消检通(深圳)科技有限公司 | A kind of management of fire fighting equipment method, device and readable storage medium storing program for executing |
CN107564126A (en) * | 2017-09-14 | 2018-01-09 | 广东电网有限责任公司电力科学研究院 | Substation secondary device intelligent patrol detection mobile terminal, server and system |
CN107610266A (en) * | 2017-07-06 | 2018-01-19 | 北京万相融通科技股份有限公司 | A kind of station cruising inspection system |
CN107633567A (en) * | 2017-09-08 | 2018-01-26 | 上海梅迪优物联科技有限公司 | A kind of intelligent night watching method |
CN107657742A (en) * | 2017-08-23 | 2018-02-02 | 成都源来来科技有限公司 | The alarm of a kind of en-toutcas and umbrella stand and maintaining method |
CN207319184U (en) * | 2017-10-23 | 2018-05-04 | 北京华锐同创系统技术有限公司 | A kind of field device maintenance maintenance and current check system |
-
2018
- 2018-06-21 CN CN201810646391.2A patent/CN108920935A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070006154A1 (en) * | 2005-06-15 | 2007-01-04 | Research In Motion Limited | Controlling collection of debugging data |
JP2014211848A (en) * | 2013-04-22 | 2014-11-13 | 株式会社日立エルジーデータストレージ | Control method for data archive system, and server device |
CN104243221A (en) * | 2014-10-15 | 2014-12-24 | 闽江学院 | Campus network maintenance recording system and method based on smart phone platform |
CN106936803A (en) * | 2015-12-31 | 2017-07-07 | 亿阳安全技术有限公司 | Two-dimensional code scanning certification login method and relevant apparatus |
CN106330570A (en) * | 2016-09-27 | 2017-01-11 | 三星电子(中国)研发中心 | Device client, mobile client and device fault diagnosis system |
CN106384208A (en) * | 2016-10-12 | 2017-02-08 | 国网江苏省电力公司徐州供电公司 | Interactive inspection system and method based on two-dimensional code technology |
CN107194472A (en) * | 2017-04-26 | 2017-09-22 | 消检通(深圳)科技有限公司 | Method, server and the readable storage medium storing program for executing of fire-fighting equipment maintenance information record |
CN107203814A (en) * | 2017-04-26 | 2017-09-26 | 消检通(深圳)科技有限公司 | A kind of management of fire fighting equipment method, device and readable storage medium storing program for executing |
CN107610266A (en) * | 2017-07-06 | 2018-01-19 | 北京万相融通科技股份有限公司 | A kind of station cruising inspection system |
CN107657742A (en) * | 2017-08-23 | 2018-02-02 | 成都源来来科技有限公司 | The alarm of a kind of en-toutcas and umbrella stand and maintaining method |
CN107633567A (en) * | 2017-09-08 | 2018-01-26 | 上海梅迪优物联科技有限公司 | A kind of intelligent night watching method |
CN107564126A (en) * | 2017-09-14 | 2018-01-09 | 广东电网有限责任公司电力科学研究院 | Substation secondary device intelligent patrol detection mobile terminal, server and system |
CN207319184U (en) * | 2017-10-23 | 2018-05-04 | 北京华锐同创系统技术有限公司 | A kind of field device maintenance maintenance and current check system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611794A (en) * | 2019-09-08 | 2019-12-24 | 天津市城西广源电力工程有限公司 | Safety monitoring system for construction site |
CN111815332A (en) * | 2020-06-15 | 2020-10-23 | 珠海格力电器股份有限公司 | Equipment activation method, device and system |
CN111814930A (en) * | 2020-06-24 | 2020-10-23 | 珠海格力电器股份有限公司 | Method and system for debugging air conditioner through code scanning |
CN111814930B (en) * | 2020-06-24 | 2021-12-24 | 珠海格力电器股份有限公司 | Method and system for debugging air conditioner through code scanning |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103745351B (en) | A kind of acquisition method and system for transmitting cipher key T K | |
CN112073375A (en) | Isolation device and isolation method suitable for power Internet of things client side | |
CN105871873A (en) | Security encryption authentication module for power distribution terminal communication and method thereof | |
CN112398860A (en) | Safety control method and device | |
CN108920935A (en) | A kind of verifying and formation gathering method automatically | |
CN107911370A (en) | A kind of data ciphering method and device, data decryption method and device | |
CN111934879A (en) | Data transmission encryption method, device, equipment and medium for internal and external network system | |
CN105721443B (en) | A kind of link session cipher negotiating method and device | |
CN104717224B (en) | A kind of login method and device | |
CN103108028A (en) | Cloud computing processing system with security architecture | |
CN103426280A (en) | Intelligent handheld terminal for electric power mobile operation | |
CN108848107A (en) | A kind of method of secure transmission web information | |
CN103200562A (en) | Communication terminal locking method and communication terminal | |
CN111770076A (en) | Self-detection network security system and working method thereof | |
CN109462572A (en) | Multi-factor authentication method and system based on encryption card and UsbKey and security gateway | |
CN211352206U (en) | IPSec VPN cryptographic machine based on quantum key distribution | |
CN113242238B (en) | Secure communication method, device and system | |
CN112865965B (en) | Train service data processing method and system based on quantum key | |
CN112583594B (en) | Data processing method, acquisition device, gateway, trusted platform and storage medium | |
CN114338201A (en) | Data processing method and device, electronic device and storage medium | |
CN114139176A (en) | Industrial internet core data protection method and system based on state secret | |
CN107342963A (en) | A kind of secure virtual machine control method, system and the network equipment | |
CN115086085B (en) | New energy platform terminal security access authentication method and system | |
CN109615742B (en) | LoRaWAN-based wireless access control method and device | |
CN100561913C (en) | A kind of method of access code equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181130 |
|
RJ01 | Rejection of invention patent application after publication |