CN109150528A - A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing - Google Patents
A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN109150528A CN109150528A CN201811320238.7A CN201811320238A CN109150528A CN 109150528 A CN109150528 A CN 109150528A CN 201811320238 A CN201811320238 A CN 201811320238A CN 109150528 A CN109150528 A CN 109150528A
- Authority
- CN
- China
- Prior art keywords
- key
- public
- access token
- access
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F15/00—Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity
- G07F15/06—Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity with means for prepaying basic charges, e.g. rent for meters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of ammeter data access methods, method includes the following steps: receiving the access token after being encrypted or signed by first key generates request;Request is generated using the second key pair access token prestored and carries out corresponding decryption or sign test, obtains verification result;When verification result is to be proved to be successful, then access token is generated, so that request end carries out data access to target ammeter using access token;When verification result is authentication failed, then access token is not generated.Using technical solution provided by the embodiment of the present invention, the safety of ammeter data is significantly improved, it is possible to prevente effectively from third party illegally obtains access token, to ensure that public interest.The invention also discloses a kind of ammeter data access mechanism, equipment and storage mediums, have relevant art effect.
Description
Technical field
The present invention relates to technical field of power systems, more particularly to a kind of ammeter data access method, device, equipment and
Computer readable storage medium.
Background technique
Standard transmission specification (Standard Transfer Specification, abbreviation STS) is sold as pre-payment
Important technology in system is used to sell the information transmission between system and ammeter, is global unique general electric power prepaid access
Token TOKEN transmission specification.The agreement is organized to use by International Electrotechnical Commission IEC at present.
Regulation access token is encrypted using public encryption algorithm in standard transmission specification.System is sold according to open
STS standard " STS600-8-X " STS encryption box is accessed using application programming interfaces API mode directly acquire and supplement with money, manage visit
Ask token.STS encrypts box and is divided into serial ports type and network-type by communication media, once the stolen access third party system of serial ports type encryption box
System or network-type encryption box IP address leakage, third party system illegally can supplement and manage access with money for live ammeter generation and enable
Board accesses to ammeter data, and the safety of ammeter data is low, and the legal system that sells is pretended to be to be peddled, and greatly damages
Public interest.
In conclusion how to efficiently solve third party illegally is that access token is supplemented and managed in live ammeter generation with money, it is right
The problems such as ammeter data accesses, and the legal system that sells is pretended to be to be peddled, and damages public interest, is current art technology
Personnel's urgent problem.
Summary of the invention
The object of the present invention is to provide a kind of ammeter data access method, this method significantly improves the peace of ammeter data
Quan Xing, it is possible to prevente effectively from third party illegally obtains access token, to ensure that public interest.
In order to solve the above technical problems, the invention provides the following technical scheme:
A kind of ammeter data access method, which comprises
It receives the access token after being encrypted or signed by first key and generates request;
Request is generated using access token described in the second key pair prestored and carries out corresponding decryption or sign test, is verified
As a result;
When the verification result is to be proved to be successful, then access token is generated, so that request end utilizes the access token
Data access is carried out to target ammeter;
When the verification result is authentication failed, then the access token is not generated.
In a kind of specific embodiment of the invention, the first key and second key are to be added by asymmetric
The key that close algorithm generates.
In a kind of specific embodiment of the invention, the first key and second key are using elliptic curve
The public private key pair that algorithm generates;Wherein, the first key is the private key in the public private key pair, and second key is described
Public key in public private key pair.
In a kind of specific embodiment of the invention, further includes:
The public private key pair is updated.
In a kind of specific embodiment of the invention, the public private key pair is updated, comprising:
Receive Key Management Center transmission passes through the encrypted importing public key of the first ECDH arranging key;
Verifying is decrypted to the importing public key by the 2nd ECDH arranging key;
When the authentication succeeds, then the former public key prestored is updated using the importing public key, to utilize public key after updating
The private key of the request end is verified.
A kind of ammeter data access mechanism, described device include:
Request receiving module generates request for receiving the access token after being encrypted or signed by first key;
As a result module is obtained, is verified, is obtained for generating request using access token described in the second key pair prestored
Obtain verification result;
Token generation module, for when the verification result is to be proved to be successful, then access token being generated, so that request end
Data access is carried out to target ammeter using the access token;When the verification result is authentication failed, then institute is not generated
State access token.
In a kind of specific embodiment of the invention, comprising:
Key production module, for generating the first key and second key by rivest, shamir, adelman.
In a kind of specific embodiment of the invention, comprising:
Public private key pair generation module is made of for being generated using elliptic curve first key and second key
Public private key pair;Wherein, the first key is the private key in the public private key pair, and second key is the public private key pair
In public key.
A kind of ammeter data access equipment, comprising:
Memory, for storing computer program;
Processor, the step of ammeter data access method as previously described is realized when for executing the computer program.
A kind of computer readable storage medium is stored with computer program on the computer readable storage medium, described
The step of ammeter data access method as previously described is realized when computer program is executed by processor.
Using method provided by the embodiment of the present invention, receives the access after being encrypted or signed by first key and enable
Board generates request;Request is generated using the second key pair access token prestored and carries out corresponding decryption or sign test, is verified
As a result;When verification result be proved to be successful when, then generate access token so that request end using access token to target ammeter into
Row data access;When verification result is authentication failed, then access token is not generated.It is stored in advance by being encrypted in box in STS
Have the second key, using the second key pair request end send encrypted or signed using first key after access token
It generates request to be verified, only can just generate access token when the authentication succeeds, significantly improve the safety of ammeter data,
It is possible to prevente effectively from third party illegally obtains access token, to ensure that public interest.
Correspondingly, the embodiment of the invention also provides ammeter data corresponding with above-mentioned ammeter data access method access
Device, equipment and computer readable storage medium, have above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of ammeter data access method in the embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of ammeter data access mechanism in the embodiment of the present invention;
Fig. 3 is a kind of structural block diagram of ammeter data access equipment in the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Embodiment one:
Referring to Fig. 1, Fig. 1 is a kind of implementation flow chart of ammeter data access method in the embodiment of the present invention, and this method can
With the following steps are included:
S101: it receives the access token after being encrypted or signed by first key and generates request.
It sells system to access to the ammeter data of target ammeter, needs to encrypt from the access tool STS of ammeter data
The access token TOKEN for accessing corresponding ammeter data is obtained in box.Therefore access target ammeter is needed when selling system
Ammeter data when, box can be encrypted to STS send access token and generate request, and can use preset first key pair
Access token generates request and is encrypted or signed.
Sell system access to the ammeter data of target ammeter can be to ammeter data carry out parameter check, parameter
Setting etc., such as supplements parameter with money.
S102: request is generated using the second key pair access token prestored and carries out corresponding decryption or sign test, is tested
Demonstrate,prove result.
It can be previously stored with the second key matched with first key in STS encryption box, sell system hair when receiving
When the encrypted access token of the use first key sent generates request, it is raw to can use the second key pair access token prestored
Be decrypted at request, when receive sell system transmission signed using first key after access token generate request when,
It can use the second key pair access token prestored and generate request progress sign test, obtain the verification result whether being verified.
Access token generation is asked using symmetric encipherment algorithm it should be noted that first key and the second key can be
The cipher mode verified is sought, symmetric encipherment algorithm has many advantages, such as that calculation amount is small, enciphering rate is fast, encryption efficiency is high, asks
It asks end that can generate request to access token quickly to be encrypted, STS encryption box, which can generate encrypted access token, asks
Carry out fast decryption is sought, to improve the response speed for generating request to access token.First key and the second key can also
To be to generate the cipher mode that request is verified to access token using rivest, shamir, adelman, confidentiality more preferably, is improved
The safety of ammeter data.As long as can play corresponding preventive effect in a word, it is not limited in the embodiment of the present invention.
Explanation is needed further exist for, first and second in first key and the second key are merely to encrypt STS
Pre-stored key is distinguish with the key that the system of selling uses in box, without successive point.
S103: when verification result is to be proved to be successful, then access token is generated, so that request end is using access token to mesh
It marks ammeter and carries out data access.
When obtained verification result is to be proved to be successful, the request end for illustrating that access token generates request is legal sells
System, such as power office.In such a case, it is possible to generate access token, request end can use access token to target ammeter
Carry out data access.
S104: when verification result is authentication failed, then access token is not generated.
When obtained verification result be authentication failed when, explanation be most likely the third party of unauthorized access want to pretend to be it is legal
It sells system to access to the ammeter data of target ammeter, in this case, does not then generate access token, even if STS adds
Close box is stolen or the leakage of STS encryption box IP address can also the third party effectively to unauthorized access ammeter data intercept,
The safety for significantly improving ammeter data, ensure that public interest.
Using method provided by the embodiment of the present invention, receives the access after being encrypted or signed by first key and enable
Board generates request;Request is generated using the second key pair access token prestored and carries out corresponding decryption or sign test, is verified
As a result;When verification result be proved to be successful when, then generate access token so that request end using access token to target ammeter into
Row data access;When verification result is authentication failed, then access token is not generated.It is stored in advance by being encrypted in box in STS
Have the second key, using the second key pair request end send encrypted or signed using first key after access token
It generates request to be verified, only can just generate access token when the authentication succeeds, significantly improve the safety of ammeter data,
It is possible to prevente effectively from third party illegally obtains access token, to ensure that public interest.
In a kind of specific embodiment of the invention, first key and the second key are raw by rivest, shamir, adelman
At key.
First key and the second key can be the key generated by rivest, shamir, adelman, and the system that sells utilizes privately owned
Private key to access token generate request encrypted or signed, STS encrypt box using disclosed public key to encrypted access
Token generates request and carries out corresponding decryption or sign test, only sells the public affairs prestored in the private key and STS encryption box that system has
Key is pairs of, can be proved to be successful, and confidentiality more preferably, improves the safety of ammeter data.
In a kind of specific embodiment of the invention, first key and the second key are to be generated using elliptic curve
Public private key pair;Wherein, first key is the private key in public private key pair, and the second key is the public key in public private key pair.
First key and the second key can also be the public private key pair that is generated using elliptic curve, and first key
For the private key in public private key pair, the second key is the public key in public private key pair.Elliptic curve is a kind of calculation of asymmetric encryption
The advantages such as method has security performance higher, and calculation amount is small, and processing speed is fast, and memory space occupancy is small, and bandwidth requirement is low.
In a kind of specific embodiment of the invention, this method can also include:
Public private key pair is updated.
Based on the above embodiment, when being verified using rivest, shamir, adelman to access token generation request,
Public private key pair can also be updated.It such as can be when selling the private key leakage in system, triggering updates operation sequence, right
Public private key pair is updated, and is also possible to preset the time interval that operation is updated to public private key pair, default when reaching
Time interval when, triggering updates operation sequence, is updated to public private key pair, specifically which kind of mode to carry out public private key pair using
Update the embodiment of the present invention without limitation.
In a kind of specific embodiment of the invention, public private key pair is updated, may comprise steps of:
Step 1: receive Key Management Center transmission passes through the encrypted importing public key of the first ECDH arranging key;
Step 2: verifying is decrypted to public key is imported by the 2nd ECDH arranging key;
Step 3: when the authentication succeeds, then using the former public key prestored of public key update is imported, to utilize public key pair after updating
The private key of request end is verified.
For convenience of description, above three step can be combined and be illustrated.
Based on the above embodiment, access token can be deployed in Key Management Center, and use disclosed Encryption Algorithm
Carry out encryption storage.When needing to update public private key pair, box application can be encrypted to STS and imports public key, STS encrypts box and returns to public affairs
Key imports request command, and the public key that STS encryption box returns is imported request command and is sent to Key Management Center, legal sells
New public private key pair can be generated in system, and sends Key Management Center for new public key, and Key Management Center can be using logical
It crosses the first ECDH arranging key that ECDH arranging key negotiating algorithm goes out to encrypt the public key in public private key pair, be encrypted
Importing public key afterwards, and the importing public key is sent to STS encryption box.STS encryption box receives the importing public key, and uses and pass through
The twoth ECDH arranging key pairs of with the first ECDH arranging key that ECDH arranging key negotiating algorithm goes out to import public key into
Row decryption verification.When the authentication succeeds, illustrate that this public private key pair updates and belong to legal update operation, then utilize importing public key
The former public key prestored is updated, to verify using private key of the public key after update to request end.If authentication failed illustrates this
Public private key pair, which updates, probably belongs to illegal update operation, then the public key not prestored to original is updated, to ensure that pair
Public private key pair is updated safety, legitimacy and the confidentiality of operation.
The public key in public private key pair is encrypted using ECDH cipher key agreement algorithm the specific can be that, in key management
Key-encrypting key KEK is obtained using ECDH cipher key agreement algorithm between the heart and STS encryption box, Key Management Center is with KEK
Encryption key, AES-CCM-192 are that Encryption Algorithm encrypts the public key in new public private key pair.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of ammeter data access mechanisms, hereafter
The ammeter data access mechanism of description can correspond to each other reference with above-described ammeter data access mechanism method.
Referring to fig. 2, Fig. 2 is a kind of structural block diagram of ammeter data access mechanism in the embodiment of the present invention, which can be with
Include:
Request receiving module 21 is asked for receiving the generation of the access token after being encrypted or signed by first key
It asks;
As a result module 22 is obtained, is verified, is obtained for generating request using the second key pair access token prestored
Verification result;
Token generation module 23, for when verification result is to be proved to be successful, then access token being generated, so that request end is sharp
Data access is carried out to target ammeter with access token;When verification result is authentication failed, then access token is not generated.
Using method provided by the embodiment of the present invention, receives and encrypted access token generation is carried out by first key
Request;Request is generated using the second key pair access token prestored to be verified, and verification result is obtained;When verification result is to test
When demonstrate,proving successfully, then access token is generated, so that request end carries out data access to target ammeter using access token;When verifying is tied
When fruit is authentication failed, then access token is not generated.Be previously stored with the second key by encrypting in box in STS, using this
The use first key that two key pair request ends are sent carries out encrypted access token generation request and is verified, and only works as verifying
Access token can be just generated when success, the safety of ammeter data is significantly improved, it is possible to prevente effectively from third party illegally obtains
Access token is taken, to ensure that public interest.
In a kind of specific embodiment of the invention, comprising:
Key production module, for generating first key and the second key by rivest, shamir, adelman.
In a kind of specific embodiment of the invention, comprising:
Public private key pair generation module, for generating the public affairs being made of first key and the second key using elliptic curve
Private key pair;Wherein, first key is the private key in public private key pair, and the second key is the public key in public private key pair.
In a kind of specific embodiment of the invention, which can also include:
Public private key pair update module, for being updated to public private key pair.
In a kind of specific embodiment of the invention, public private key pair update module may include:
Public key receiving submodule, for receive Key Management Center transmission by the encrypted importing of ECDH arranging key
Public key;
Decryption verification submodule, for verifying to be decrypted to importing public key;
Public key updates submodule, for when the authentication succeeds, then updating the former public key prestored using importing public key, to utilize
Public key verifies the private key of request end after update.
Corresponding to above method embodiment, referring to Fig. 3, Fig. 3 is ammeter data access equipment provided by the present invention
Schematic diagram, the equipment may include:
Memory 31, for storing computer program;
Processor 32 can realize following steps when for executing the computer program of the above-mentioned storage of memory 31:
It receives and encrypted access token generation request is carried out by first key;It is accessed using the second key pair prestored
Token generates request and is verified, and obtains verification result;When verification result is to be proved to be successful, then access token is generated, so that
Request end carries out data access to target ammeter using access token;When verification result is authentication failed, then access is not generated
Token.
Above method embodiment is please referred to for the introduction of equipment provided by the invention, this will not be repeated here by the present invention.
It is computer-readable the present invention also provides a kind of computer readable storage medium corresponding to above method embodiment
It is stored with computer program on storage medium, can realize following steps when computer program is executed by processor:
It receives the access token after being encrypted or signed by first key and generates request;Utilize the second key prestored
Request is generated to access token to verify, and obtains verification result;When verification result is to be proved to be successful, then generates access and enable
Board, so that request end carries out data access to target ammeter using access token;When verification result is authentication failed, then do not give birth to
At access token.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Above method embodiment is please referred to for the introduction of computer readable storage medium provided by the invention, the present invention exists
This is not repeated them here.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other
The difference of embodiment, same or similar part may refer to each other between each embodiment.For being filled disclosed in embodiment
It sets, for equipment and computer readable storage medium, since it is corresponded to the methods disclosed in the examples, so the comparison of description
Simply, reference may be made to the description of the method.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Used herein a specific example illustrates the principle and implementation of the invention, and above embodiments are said
It is bright to be merely used to help understand technical solution of the present invention and its core concept.It should be pointed out that for the common of the art
, without departing from the principle of the present invention, can be with several improvements and modifications are made to the present invention for technical staff, these
Improvement and modification are also fallen within the protection scope of the claims of the present invention.
Claims (10)
1. a kind of ammeter data access method, which is characterized in that the described method includes:
It receives the access token after being encrypted or signed by first key and generates request;
Request is generated using access token described in the second key pair prestored and carries out corresponding decryption or sign test, obtains verifying knot
Fruit;
When the verification result is to be proved to be successful, then access token is generated, so that request end is using the access token to mesh
It marks ammeter and carries out data access;
When the verification result is authentication failed, then the access token is not generated.
2. the method according to claim 1, wherein the first key and second key are by non-right
The key for claiming Encryption Algorithm to generate.
3. the method according to claim 1, wherein the first key and second key are using oval
The public private key pair that curved line arithmetic generates;Wherein, the first key is the private key in the public private key pair, and second key is
Public key in the public private key pair.
4. according to the method described in claim 3, it is characterized by further comprising:
The public private key pair is updated.
5. according to the method described in claim 4, it is characterized in that, being updated to the public private key pair, comprising:
Receive Key Management Center transmission passes through the encrypted importing public key of the first ECDH arranging key;
Verifying is decrypted to the importing public key by the 2nd ECDH arranging key;
When the authentication succeeds, then update the former public key prestored using the importing public key, with using public key after updating to institute
The private key for stating request end is verified.
6. a kind of ammeter data access mechanism, which is characterized in that described device includes:
Request receiving module generates request for receiving the access token after being encrypted or signed by first key;
As a result obtain module, for using access token described in the second key pair prestored generate request carry out it is corresponding decryption or
Sign test obtains verification result;
Token generation module, for when the verification result is to be proved to be successful, then generating access token, so that request end utilizes
The access token carries out data access to target ammeter;When the verification result is authentication failed, then the visit is not generated
Ask token.
7. device according to claim 6 characterized by comprising
Key production module, for generating the first key and second key by rivest, shamir, adelman.
8. device according to claim 6 characterized by comprising
Public private key pair generation module, for generating the public affairs being made of first key and second key using elliptic curve
Private key pair;Wherein, the first key is the private key in the public private key pair, and second key is in the public private key pair
Public key.
9. a kind of ammeter data access equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the ammeter data access side as described in any one of claim 1 to 5 when for executing the computer program
The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the ammeter data access method as described in any one of claim 1 to 5 when the computer program is executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811320238.7A CN109150528A (en) | 2018-11-07 | 2018-11-07 | A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811320238.7A CN109150528A (en) | 2018-11-07 | 2018-11-07 | A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109150528A true CN109150528A (en) | 2019-01-04 |
Family
ID=64807940
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811320238.7A Pending CN109150528A (en) | 2018-11-07 | 2018-11-07 | A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150528A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414248A (en) * | 2019-07-11 | 2019-11-05 | 珠海格力电器股份有限公司 | Method for debugging microprocessor and microprocessor |
WO2020173019A1 (en) * | 2019-02-27 | 2020-09-03 | 平安科技(深圳)有限公司 | Access certificate verification method and device, computer equipment and storage medium |
CN111756701A (en) * | 2020-05-29 | 2020-10-09 | 苏州浪潮智能科技有限公司 | Method and system for acquiring equipment token access Rest interface by management platform |
CN113345139A (en) * | 2021-06-03 | 2021-09-03 | 珠海优特物联科技有限公司 | Unlocking method, intelligent lock cylinder and intelligent lock system |
CN114501373A (en) * | 2022-04-14 | 2022-05-13 | 济南瑞泉电子有限公司 | Intelligent water meter recharging anti-cheating method |
WO2024178634A1 (en) * | 2023-02-28 | 2024-09-06 | 西门子股份公司 | Method and apparatus for accessing memory, computer device, and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008135768A2 (en) * | 2007-05-08 | 2008-11-13 | First Ondemand Limited | Authorisation of signatures on documents |
CN102457378A (en) * | 2010-10-15 | 2012-05-16 | 洛克威尔自动控制技术股份有限公司 | Security model for industrial devices |
CN102546532A (en) * | 2010-12-07 | 2012-07-04 | 中国移动通信集团公司 | Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system |
CN103220261A (en) * | 2012-01-21 | 2013-07-24 | 华为技术有限公司 | Proxy method, device and system of open authentication application program interface |
CN104270383A (en) * | 2014-10-17 | 2015-01-07 | 国家电网公司 | Cross-subnet access control method of electric power mobile terminal |
CN104899741A (en) * | 2014-03-05 | 2015-09-09 | 中国银联股份有限公司 | Online payment method and online payment system based on IC bank card |
CN108471432A (en) * | 2018-07-11 | 2018-08-31 | 北京智芯微电子科技有限公司 | Prevent web application interface by the method for malicious attack |
CN108471395A (en) * | 2017-02-23 | 2018-08-31 | 华为技术有限公司 | Realize method, apparatus, cloud computing system and the computer system of certification/mandate |
-
2018
- 2018-11-07 CN CN201811320238.7A patent/CN109150528A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008135768A2 (en) * | 2007-05-08 | 2008-11-13 | First Ondemand Limited | Authorisation of signatures on documents |
CN102457378A (en) * | 2010-10-15 | 2012-05-16 | 洛克威尔自动控制技术股份有限公司 | Security model for industrial devices |
CN102546532A (en) * | 2010-12-07 | 2012-07-04 | 中国移动通信集团公司 | Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system |
CN103220261A (en) * | 2012-01-21 | 2013-07-24 | 华为技术有限公司 | Proxy method, device and system of open authentication application program interface |
CN104899741A (en) * | 2014-03-05 | 2015-09-09 | 中国银联股份有限公司 | Online payment method and online payment system based on IC bank card |
CN104270383A (en) * | 2014-10-17 | 2015-01-07 | 国家电网公司 | Cross-subnet access control method of electric power mobile terminal |
CN108471395A (en) * | 2017-02-23 | 2018-08-31 | 华为技术有限公司 | Realize method, apparatus, cloud computing system and the computer system of certification/mandate |
CN108471432A (en) * | 2018-07-11 | 2018-08-31 | 北京智芯微电子科技有限公司 | Prevent web application interface by the method for malicious attack |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020173019A1 (en) * | 2019-02-27 | 2020-09-03 | 平安科技(深圳)有限公司 | Access certificate verification method and device, computer equipment and storage medium |
CN110414248A (en) * | 2019-07-11 | 2019-11-05 | 珠海格力电器股份有限公司 | Method for debugging microprocessor and microprocessor |
CN111756701A (en) * | 2020-05-29 | 2020-10-09 | 苏州浪潮智能科技有限公司 | Method and system for acquiring equipment token access Rest interface by management platform |
CN111756701B (en) * | 2020-05-29 | 2022-12-27 | 苏州浪潮智能科技有限公司 | Method and system for acquiring equipment token access Rest interface by management platform |
CN113345139A (en) * | 2021-06-03 | 2021-09-03 | 珠海优特物联科技有限公司 | Unlocking method, intelligent lock cylinder and intelligent lock system |
CN114501373A (en) * | 2022-04-14 | 2022-05-13 | 济南瑞泉电子有限公司 | Intelligent water meter recharging anti-cheating method |
WO2024178634A1 (en) * | 2023-02-28 | 2024-09-06 | 西门子股份公司 | Method and apparatus for accessing memory, computer device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150528A (en) | A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing | |
CN109040090B (en) | A kind of data ciphering method and device | |
CN108377189A (en) | User's communication encrypting method, device, terminal device and storage medium on block chain | |
TWI715537B (en) | Encryption machine key injection system, method and device based on cloud environment | |
US10454674B1 (en) | System, method, and device of authenticated encryption of messages | |
CA3164765A1 (en) | Secure communication method and device based on identity authentication | |
CN104170312B (en) | For using the method and apparatus that hardware security engine is securely communicated by network | |
CN100468438C (en) | Encryption and decryption method for realizing hardware and software binding | |
CN109740384A (en) | Data based on block chain deposit card method and apparatus | |
ES2960797T3 (en) | Secure and implicit certificate chaining | |
US10880100B2 (en) | Apparatus and method for certificate enrollment | |
US20100115260A1 (en) | Universal secure token for obfuscation and tamper resistance | |
CN105553654B (en) | Key information processing method and device, key information management system | |
CN110050437A (en) | The device and method of distributed certificate registration | |
CN103684766A (en) | Private key protection method and system for terminal user | |
TW201010370A (en) | Integrated cryptographic security module for a network node | |
CN108964922A (en) | mobile terminal token activation method, terminal device and server | |
CN108259465A (en) | A kind of authentication encryption method of intelligent automobile internal network | |
CN110601855B (en) | Root certificate management method and device, electronic equipment and storage medium | |
CN110855667B (en) | Block chain encryption method, device and system | |
CN109816383A (en) | A kind of block chain endorsement method, block chain wallet and block chain | |
CN109600224A (en) | A kind of SM2 key generation, endorsement method, terminal, server and storage medium | |
CN108696518A (en) | User's communication encrypting method, device, terminal device and storage medium on block chain | |
CN110177001A (en) | A kind of NFC circle deposit method, system and storage medium based on soft certificate | |
CN111211905A (en) | Identity management method for Fabric alliance chain members based on certificate-free authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |
|
RJ01 | Rejection of invention patent application after publication |