CN110557374B - Power data acquisition method and device, computer equipment and storage medium - Google Patents
Power data acquisition method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110557374B CN110557374B CN201910705882.4A CN201910705882A CN110557374B CN 110557374 B CN110557374 B CN 110557374B CN 201910705882 A CN201910705882 A CN 201910705882A CN 110557374 B CN110557374 B CN 110557374B
- Authority
- CN
- China
- Prior art keywords
- power
- program
- file
- internal
- isolation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/08—Protocols for interworking; Protocol conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to a power data acquisition method, a power data acquisition device, computer equipment and a storage medium. The method comprises the following steps: after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port; receiving a TCP power data stream of the external application through the first data transmission port; converting the TCP power data stream according to a preset data format to obtain an effective power file; and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program. By adopting the method, system service logic and interfaces are not required to be modified, seamless trans-regional transmission between data is realized, the efficiency, convenience and reusability of trans-regional data transmission are improved, and the development cost and time cost of trans-regional data can be greatly saved.
Description
Technical Field
The present application relates to the field of data acquisition in power systems, and in particular, to a method and an apparatus for acquiring power data, a computer device, and a storage medium.
Background
At present, in order to meet new safety protection requirements, more and more power systems are all constructed comprehensively by adopting the principles of safety partition, network special, transverse isolation and longitudinal authentication.
In the existing power network data transmission method, special network isolation equipment is generally adopted for deployment in the aspect of transverse isolation, and the equipment realizes network protection on a power system through application of a physical isolation technology.
However, because the existing power network has a complex structure and a high program calling coupling degree, if the existing power network is applied to application scenes of different systems, the existing power network needs to be developed by program customization, so that the transmission efficiency of the power network data transmission method based on the structure is low.
Therefore, the existing power network data transmission method has the problem of low data transmission efficiency.
Disclosure of Invention
Therefore, it is necessary to provide a power data acquisition method, a power data acquisition device, a computer device, and a storage medium, which can reasonably solve the technical problem of low data transmission efficiency in the power network data transmission method.
A power data acquisition method comprises the following steps:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
In one embodiment, the converting the TCP power data stream according to a preset data format to obtain an effective power file includes:
determining a port input parameter of the first data transmission port;
and converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
In one embodiment, the preset isolation device includes an external isolation device and an internal isolation device, and the transmitting the active power file to the internal isolation penetration program for parsing and storing through the preset isolation device includes:
and transmitting the effective power file to a second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively, so that the internal isolation penetration program analyzes and stores the effective power file.
In one embodiment, a power communication module is disposed between the external isolation device and the internal isolation device, and the transmitting the valid power file to the second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively includes:
transmitting the effective power file to the power communication module through the external isolation device;
and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
In one embodiment, after the transmitting the active power file to the internal isolation penetration program through the preset isolation device, the method further includes:
extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address;
converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
In one embodiment, the power communication module comprises an NBIOT communication module.
In one embodiment, the first data transfer port includes an API interface.
A power data collection device, the device comprising:
the request receiving module is used for calling the external isolation penetration program after receiving the power data transmission request of the external application program; the external isolation penetration program is provided with a first data transmission port;
the data receiving module is used for receiving a TCP power data stream of the external application program through the first data transmission port;
the data conversion module is used for converting the TCP power data stream according to a preset data format to obtain an effective power file;
and the data transmission module is used for transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
According to the power data acquisition method, the power data acquisition device, the computer equipment and the storage medium, after receiving a power data transmission request of an external application program, the power server responds to the request to call the external isolation penetration program, receives a TCP power data stream uploaded by the external application program through a first data transmission port of the external isolation penetration program, converts the TCP power data stream into an effective power file according to a preset data format, and then transmits the effective power file to the internal isolation penetration program through the preset isolation equipment for analysis and storage, so that the internal application program calls the effective power file stored in the internal isolation penetration program. By adopting the method, data transmission between the external area and the internal area of the power system does not need to modify service logic and interfaces, seamless trans-regional transmission between data is realized, the efficiency, convenience and reusability of trans-regional data transmission are improved, and the development cost and time cost of trans-regional data can be greatly saved.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a power data collection method;
FIG. 2 is a schematic flow chart diagram of a method for collecting power data in one embodiment;
FIG. 3 is a block diagram of an embodiment of a power data collection device;
FIG. 4 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The electric power data acquisition method provided by the invention can be applied to the application environment shown in fig. 1. In a power data collection system, an internal terminal 102, a power server 104, and an external terminal 106 are included. The power server 104 is configured with an external isolation tunneling program and an internal isolation tunneling program, and is configured with program link ports, and the external terminal 106 and the internal terminal 102 can establish communication connection with the programs on the power server 104 through the corresponding program link ports, respectively, so as to implement data transmission. Meanwhile, the internal terminal 102 and the external terminal 106 respectively perform network communication with the power server 104 through a network, the internal terminal 102 and the external terminal 106 may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the power server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a power data collection method is provided, which is described by taking the method as an example applied to the power server 104 in fig. 1, and includes the following steps:
step S210, after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation passthrough has a first data transfer port.
The external application program is installed in the power server 104, specifically, a safety area in a power system framework operated by the power server 104, and the external application program may be a business application program including power basic application, collection management, data management, operation and maintenance monitoring, and the like.
In a specific implementation, the external isolation pass-through program of the device in the power server 104 is connected with the external application program through a port, and after receiving a power data transmission request sent by the external application program based on the port, the power server 104 calls the external isolation pass-through program in response to the request.
The first data transmission port may be a program emulation interface for implementing data communication.
However, it should be noted that before receiving the power data transmission request sent by the external application, the power server 104 may first generate a data collection request based on internal requirements and send the data collection request to the external isolation pass-through program, so that the external isolation pass-through program obtains the power data uploaded by the external application.
Step S220, receiving a TCP power data stream of the external application program through the first data transmission port.
The first data transmission port may be an api (application Programming interface).
Wherein, TCP (transmission Control protocol) is a connection-oriented, reliable, byte stream-based transport layer communication protocol, and the TCP power data stream may be a power data set suitable for a TCP protocol transmission mode in this embodiment and other embodiments.
In a specific implementation, after the external isolation pass-through program is called, the power server 104 receives a TCP power data stream uploaded by the external application program through a first data transmission port of the external isolation pass-through program.
It should be noted that, in this embodiment or other embodiments, the external application may upload not only TCP data streams but also udp (user data program) data streams.
Step S230, converting the TCP power data stream according to a preset data format to obtain an effective power file.
The effective power file refers to a power file with a file format suitable for transmission by preset isolation equipment.
In a specific implementation, after receiving the TCP power data stream uploaded by the external application program, the power server 104 further converts the TCP power data stream into an effective power file according to port input parameters included in the TCP power data stream and by combining a Hash algorithm.
Step S240, transmitting the effective power file to an internal isolation tunneling program for parsing and storage through a preset isolation device, so that an internal application program can call the effective power file stored in the internal isolation tunneling program.
Wherein the preset isolation device may be a power-dedicated forward/reverse network isolation device.
In specific implementation, after the external isolation penetration program in the power server 104 obtains the effective power file, the effective power file is transmitted to the internal isolation penetration program through the preset isolation device, specifically, the effective power file is transmitted to the internal isolation penetration program through the second data transmission port of the internal isolation penetration program, after the internal isolation penetration program receives the effective power file, the effective power file is reversely converted into a TCP power data stream according to analysis parameters included in the effective power file, so that the internal application program can call the TCP power data stream in real time, and bidirectional real-time data interaction between a master station and a terminal in the power system is realized.
In the electric power data acquisition method, after receiving an electric power data transmission request of an external application program, an electric power server responds to the request to call an external isolation penetration program, receives a TCP electric power data stream uploaded by the external application program through a first data transmission port of the external isolation penetration program, converts the TCP electric power data stream into an effective electric power file according to a preset data format, and then transmits the effective electric power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that the internal application program calls the effective electric power file stored in the internal isolation penetration program. By adopting the method, data transmission between the external area and the internal area of the power system does not need to modify service logic and interfaces, seamless trans-regional transmission between data is realized, the efficiency, convenience and reusability of trans-regional data transmission are improved, and the development cost and time cost of trans-regional data can be greatly saved.
In an embodiment, the converting the TCP power data stream according to a preset data format to obtain an effective power file includes:
determining a port input parameter of the first data transmission port; and converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
The port input parameter may be a parameter defining a file transmission mode, a parameter defining a socket handle of the TCP power data stream, an IP address of a receiving device of the TCP power data stream, or the like.
The Hash algorithm is an algorithm capable of calculating a character string with a fixed length corresponding to a digital message.
In specific implementation, after the TCP power data stream is obtained by an external isolation penetration program of the device in the power server 104, a port input parameter is determined first, and then the TCP power data stream is subjected to format conversion according to the port input parameter and by combining a preset Hash algorithm, that is, converted into a preset carry number valid character string which can be transmitted and operated by the power system, so as to obtain a valid power file.
In one embodiment, the preset isolation device includes an external isolation device and an internal isolation device, and the transmitting the active power file to the internal isolation penetration program for parsing and storing through the preset isolation device includes:
and transmitting the effective power file to a second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively, so that the internal isolation penetration program analyzes and stores the effective power file.
In a specific implementation, after the external isolation penetration program of the power server 104 obtains the effective power file, the preset isolation device is used to perform real-time cross-region data transmission on the effective power file, that is, the effective power file firstly sequentially passes through the external isolation device, the internal isolation device and the second data transmission port of the internal isolation penetration program in sequence, and is transmitted to the internal isolation penetration program to be stored and analyzed in real time, so as to obtain a TCP power data stream that can be called by the internal application program at any time.
In one embodiment, a power communication module is disposed between the external isolation device and the internal isolation device, and the transmitting the valid power file to the second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively includes:
transmitting the effective power file to the power communication module through the external isolation device; and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
The power communication module can be connected between the external isolation device and the internal isolation device to realize data communication of the internal and external areas, and can be any medium module with a data communication function.
In the specific implementation, a communication module can be arranged between the external isolation device and the internal isolation device, so that the purpose of transmitting the effective power files in a message queue mode is achieved.
In one embodiment, after the transmitting the active power file to the internal isolation penetration program through the preset isolation device, the method further comprises:
extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address; converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
In specific implementation, after the internal isolation penetration program receives the effective power file, the effective power file is reversely converted into a TCP power data stream according to the port input parameter in the effective power file, and the TCP power data stream is called by the internal application program.
In one embodiment, the power communication module comprises an NBIOT communication module.
The NBIOT (Narrow Band Internet of Things, NBIOT) communication module may be directly deployed in a GSM (Global System For Mobile Communications, GSM) network, a UMTS (Universal Mobile telecommunications System, UMTS) network, or an LTE (Long Term Evolution, LTE) network, and has the characteristics of low power consumption, reliable communication, low cost, and capability of being deployed randomly in any area with or without a public network.
In a specific implementation, the power communication module of the device between the external isolation device and the internal isolation device may be not only an NBIOT communication module, but also other communication modules having a cross-region data transmission function.
In one embodiment, the first data transfer port includes an API interface.
In a specific implementation, the first data transmission port may be an API interface to ensure feasibility of data communication between the programs.
According to the scheme provided by the embodiment of the invention, the data transmission between the external area and the internal area of the power system does not need to modify the service logic and the interface, the seamless trans-regional transmission between the data is realized, the efficiency, the convenience and the reusability of the trans-regional data transmission are improved, and the development cost and the time cost of the trans-regional data can be greatly saved.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps of fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 3, there is provided a power data collection apparatus, including a request receiving module 310, a data receiving module 320, a data converting module 330, and a data transmitting module 340, wherein:
a request receiving module 310, configured to invoke an external isolation pass-through program after receiving a power data transmission request of an external application program; the external isolation penetration program is provided with a first data transmission port;
a data receiving module 320, configured to receive a TCP power data stream of the external application through the first data transmission port;
the data conversion module 330 is configured to convert the TCP power data stream according to a preset data format to obtain an effective power file;
the data transmission module 340 is configured to transmit the effective power file to an internal isolation tunneling program through a preset isolation device for analysis and storage, so that an internal application program calls the effective power file stored in the internal isolation tunneling program.
According to the scheme provided by the embodiment of the invention, after receiving a power data transmission request of an external application program, a power server responds to the request to call the external isolation penetration program, receives a TCP power data stream uploaded by the external application program through a first data transmission port of the external isolation penetration program, further converts the TCP power data stream into an effective power file according to a preset data format, and then transmits the effective power file to the internal isolation penetration program for analysis and storage through preset isolation equipment, so that the internal application program calls the effective power file stored in the internal isolation penetration program. By adopting the scheme, the data transmission between the external area and the internal area of the power system does not need to modify the service logic and the interface, the seamless trans-regional transmission between the data is realized, the efficiency, the convenience and the reusability of the trans-regional data transmission are improved, and the development cost and the time cost of the trans-regional data can be greatly saved.
In one embodiment, the data conversion module 330 includes:
the parameter determination submodule is used for determining port input parameters of the first data transmission port; and the file acquisition submodule is used for converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
In one embodiment, the preset isolation device includes an external isolation device and an internal isolation device, and the data transmission module 340 is further configured to transmit the valid power file to the second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device, respectively, so that the internal isolation penetration program performs parsing storage on the valid power file.
In one embodiment, a power communication module is disposed between the external isolation device and the internal isolation device, and the data transmission module 340 is further configured to transmit the valid power file to the power communication module through the external isolation device; and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
In one embodiment, the apparatus further comprises:
the parameter extraction module is used for extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address; the data stream conversion module is used for converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
In one embodiment, the power communication module comprises an NBIOT communication module.
In one embodiment, the first data transfer port includes an API interface.
According to the scheme provided by the embodiment of the invention, the data transmission between the external area and the internal area of the power system does not need to modify the service logic and the interface, the seamless trans-regional transmission between the data is realized, the efficiency, the convenience and the reusability of the trans-regional data transmission are improved, and the development cost and the time cost of the trans-regional data can be greatly saved.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing identification information and device information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a power data collection method.
Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining a port input parameter of the first data transmission port; and converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and transmitting the effective power file to a second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively, so that the internal isolation penetration program analyzes and stores the effective power file.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
transmitting the effective power file to the power communication module through the external isolation device; and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address; converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through preset isolation equipment, so that an internal application program can call the effective power file stored in the internal isolation penetration program.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining a port input parameter of the first data transmission port; and converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and transmitting the effective power file to a second data transmission port of the internal isolation penetration program through the external isolation device and the internal isolation device respectively, so that the internal isolation penetration program analyzes and stores the effective power file.
In one embodiment, the computer program when executed by the processor further performs the steps of:
transmitting the effective power file to the power communication module through the external isolation device; and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
In one embodiment, the computer program when executed by the processor further performs the steps of:
extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address; converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A power data acquisition method is characterized by comprising the following steps:
after receiving a power data transmission request of an external application program, calling an external isolation penetration program; the external isolation penetration program is provided with a first data transmission port;
receiving a TCP power data stream of the external application through the first data transmission port;
converting the TCP power data stream according to a preset data format according to port input parameters of the first data transmission port to obtain an effective power file;
and transmitting the effective power file to an internal isolation penetration program for analysis and storage through a power communication module between external isolation equipment and internal isolation equipment, so that the internal isolation penetration program converts the effective power file into a TCP power data stream according to analysis parameters included in the effective power file, and an internal application program calls the effective power file stored in the internal isolation penetration program.
2. The method according to claim 1, wherein the converting the TCP power data stream according to a preset data format according to the port input parameter of the first data transmission port to obtain an effective power file comprises:
determining a port input parameter of the first data transmission port;
and converting the TCP power data stream according to a preset data format by combining a preset Hash algorithm according to the port input parameters to obtain an effective power file.
3. The method of claim 1, wherein the transmitting the active power file to an internal isolation pass-through program for parsing storage via a power communication module between an external isolation device and an internal isolation device comprises:
and transmitting the effective power file to a second data transmission port of the internal isolation penetration program through the external isolation device, the power communication module and the internal isolation device respectively, so that the internal isolation penetration program analyzes and stores the effective power file.
4. The method of claim 3, wherein the transmitting the active power file to the second data transmission port of the internal isolation pass-through via the external isolation device, the power communication module, and the internal isolation device, respectively, comprises:
transmitting the effective power file to the power communication module through the external isolation device;
and transmitting the effective power file to the internal isolation equipment through the power communication module according to a transmission mode of a message queue, and further transmitting the effective power file to the internal isolation penetration program for analysis and storage.
5. The method of claim 1, wherein after the transmitting the active power file to an internal isolation pass-through program via a power communication module between an external isolation device and an internal isolation device, further comprising:
extracting port input parameters of the effective power file; the port input parameter comprises at least one of a file format, a socket handle and an IP address;
converting the effective power file into a TCP power data stream according to the port input parameters; the TCP power data stream is stored in the internal isolation pass-through for the internal application to call.
6. The method of claim 4, wherein the power communication module comprises an NBIOT communication module.
7. The method of claim 1, wherein the first data transfer port comprises an API interface.
8. An electrical data collection device, the device comprising:
the request receiving module is used for calling the external isolation penetration program after receiving the power data transmission request of the external application program; the external isolation penetration program is provided with a first data transmission port;
the data receiving module is used for receiving a TCP power data stream of the external application program through the first data transmission port;
the data conversion module is used for converting the TCP power data stream according to a preset data format according to port input parameters of the first data transmission port to obtain an effective power file;
and the data transmission module is used for transmitting the effective power file to an internal isolation penetration program for analysis and storage through a power communication module between external isolation equipment and internal isolation equipment, so that the internal isolation penetration program converts the effective power file into a TCP power data stream according to analysis parameters included in the effective power file, and an internal application program calls the effective power file stored in the internal isolation penetration program.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910705882.4A CN110557374B (en) | 2019-08-01 | 2019-08-01 | Power data acquisition method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910705882.4A CN110557374B (en) | 2019-08-01 | 2019-08-01 | Power data acquisition method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110557374A CN110557374A (en) | 2019-12-10 |
CN110557374B true CN110557374B (en) | 2020-06-16 |
Family
ID=68736974
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910705882.4A Active CN110557374B (en) | 2019-08-01 | 2019-08-01 | Power data acquisition method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110557374B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111614618A (en) * | 2020-04-17 | 2020-09-01 | 国网上海能源互联网研究院有限公司 | Cross-region data transmission method and system for physical isolation device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10084747B2 (en) * | 2013-11-13 | 2018-09-25 | Allied Telesis Holdings Kabushiki Kaisha | External address space compression |
CN108965283A (en) * | 2018-07-06 | 2018-12-07 | 中国电力财务有限公司 | A kind of means of communication, device, application server and communication system |
CN109936532A (en) * | 2017-12-17 | 2019-06-25 | 陕西合度电子信息科技有限公司 | A kind of data bus transmission security protection system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9197417B2 (en) * | 2009-04-24 | 2015-11-24 | Microsoft Technology Licensing, Llc | Hosted application sandbox model |
CN102006307A (en) * | 2010-12-16 | 2011-04-06 | 中国电子科技集团公司第三十研究所 | Application proxy-based network management system isolation control device |
CN102843352B (en) * | 2012-05-15 | 2015-04-22 | 广东电网公司茂名供电局 | Cross-physical isolation data transparent transmission system and method between intranet and extranet |
CN203734701U (en) * | 2013-11-27 | 2014-07-23 | 国家电网公司 | Security zone crossing enterprise service bus transmission system |
CN104270355A (en) * | 2014-09-25 | 2015-01-07 | 国电南瑞科技股份有限公司 | Cross-safety-zone data transmission method based on network bus |
CN106209801A (en) * | 2016-06-28 | 2016-12-07 | 广东电网有限责任公司信息中心 | Mobile solution platform and inner-external network data safety switching plane integrated system |
-
2019
- 2019-08-01 CN CN201910705882.4A patent/CN110557374B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10084747B2 (en) * | 2013-11-13 | 2018-09-25 | Allied Telesis Holdings Kabushiki Kaisha | External address space compression |
CN109936532A (en) * | 2017-12-17 | 2019-06-25 | 陕西合度电子信息科技有限公司 | A kind of data bus transmission security protection system |
CN108965283A (en) * | 2018-07-06 | 2018-12-07 | 中国电力财务有限公司 | A kind of means of communication, device, application server and communication system |
Also Published As
Publication number | Publication date |
---|---|
CN110557374A (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108256114B (en) | Document online preview method and device, computer equipment and storage medium | |
CN110602445B (en) | Video monitoring data acquisition method and device, computer equipment and storage medium | |
CN111224864A (en) | Message transmission method and device, computer equipment and storage medium | |
CN111107051A (en) | Message transmission method and device, computer equipment and storage medium | |
CN109246235B (en) | Method and device for receiving monitoring data and data monitoring system | |
CN111541579B (en) | Industrial gateway control method and device, computer equipment and storage medium | |
CN111629342B (en) | Method and device for mapping Beidou short message terminal number | |
CN110995956B (en) | Image transmission method and device based on LoRa, computer equipment and storage medium | |
CN110166450B (en) | Data transmission method and device based on industrial Ethernet and communication equipment | |
CN114501593A (en) | Network slice access method, device, system and storage medium | |
CN110557374B (en) | Power data acquisition method and device, computer equipment and storage medium | |
CN110290130B (en) | VOLTE data transmission method and device, access network equipment and storage medium | |
CN112256774B (en) | Power data processing method, device, computer equipment and storage medium | |
CN111262837B (en) | Data encryption method, data decryption method, system, equipment and medium | |
CN110401935B (en) | NB-IOT (network node B-Internet of things) -based data transmission method and device, communication equipment and storage medium | |
CN109474386B (en) | Signaling tracking method, system, network element equipment and storage medium | |
CN116886770A (en) | Engineering truck data transmission method based on Internet of things and engineering truck | |
CN114124914B (en) | Data security transmission method, device, computer equipment and storage medium | |
CN113691684B (en) | Outbound method, device, system, computer equipment and storage medium | |
CN112118136B (en) | Multi-cloud configuration conversion method and device, computer equipment and storage medium | |
CN112287265A (en) | Asynchronous event driven based file conversion method and system | |
CN111193641B (en) | Terminal network testing method, device, base station equipment and storage medium | |
CN115885520A (en) | Data processing apparatus, method and program | |
CN115152180A (en) | Improved packet transmission | |
CN111478802A (en) | Distribution network processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |