CN111130006B - Key type transmission line field operation method and system - Google Patents

Key type transmission line field operation method and system Download PDF

Info

Publication number
CN111130006B
CN111130006B CN201911268986.XA CN201911268986A CN111130006B CN 111130006 B CN111130006 B CN 111130006B CN 201911268986 A CN201911268986 A CN 201911268986A CN 111130006 B CN111130006 B CN 111130006B
Authority
CN
China
Prior art keywords
terminal
job
key
responsible
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911268986.XA
Other languages
Chinese (zh)
Other versions
CN111130006A (en
Inventor
段绍辉
宗伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Co ltd
Original Assignee
Shenzhen Power Supply Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Co ltd filed Critical Shenzhen Power Supply Co ltd
Priority to CN201911268986.XA priority Critical patent/CN111130006B/en
Publication of CN111130006A publication Critical patent/CN111130006A/en
Application granted granted Critical
Publication of CN111130006B publication Critical patent/CN111130006B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02GINSTALLATION OF ELECTRIC CABLES OR LINES, OR OF COMBINED OPTICAL AND ELECTRIC CABLES OR LINES
    • H02G1/00Methods or apparatus specially adapted for installing, maintaining, repairing or dismantling electric cables or lines
    • H02G1/02Methods or apparatus specially adapted for installing, maintaining, repairing or dismantling electric cables or lines for overhead lines or cables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Data Mining & Analysis (AREA)
  • Water Supply & Treatment (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to a key type transmission line field operation method and a key type transmission line field operation system. According to the key type transmission line field operation method, safety verification is performed through the key among the plurality of operation terminals, operation tokens can be transmitted behind the verification to perform operation, the safety of transmission line field operation is greatly improved, and each operation terminal is safe and reliable.

Description

Key type transmission line field operation method and system
Technical Field
The application relates to the technical field of transmission line field operation, in particular to a key type transmission line field operation method and system.
Background
The field operation of the power transmission line includes four types, namely inspection operation, maintenance operation, overhaul operation and test operation. The field operation of the power transmission line relates to ten elements, wherein one element is a person, and the other nine elements are object elements used in the operation process, such as an operation vehicle, safety equipment, safety measures, operation equipment, an operation method, an operation position, an operation environment, an operation object, an operation ticket and the like. Each personal element and the matter element interact to form an operation link in the operation.
In the traditional scheme, the operation mode of the operation link is that a work person in charge designates a work class member to interact with corresponding matter elements, so that the operation link is completed. However, the conventional work method has a problem: in actual operation, operators or equipment which do not accord with operation regulations exist, and each operator or equipment can not meet the requirements only by means of commanding of a working responsible person on site, so that the safety of the field operation of the power transmission line is greatly critical, and meanwhile, the operation efficiency is low.
For example, there are operators who do not operate according to the job rules, operators who do not have the qualifications and capabilities, equipment used during the job do not meet the requirements of the job rules, and so on.
Disclosure of Invention
Therefore, it is necessary to provide a key type transmission line field operation method and system for solving the problem that each operator or equipment is in accordance with requirements only by means of the on-site command of a working responsible person, which is caused by the existence of the operators or equipment which are not in accordance with the operation regulations in the conventional transmission line field operation method.
The application provides a key type transmission line field operation method, which comprises the following steps:
the responsible terminal sends a key to an operation terminal;
the operation terminal acquires the key sent by the responsible terminal, reads a verification key locally stored by the operation terminal, and sends the verification key to the responsible terminal;
the responsible terminal verifies the verification key, and after the verification is passed, the responsible terminal sends an operation token and the key to the operation terminal, wherein the operation token is used for unlocking the operation authority of the operation terminal and recording the operation flow of the operation terminal;
the operation terminal acquires the operation token and the secret key, scans an electronic tag attached to the surface of an operation object corresponding to the operation terminal, and starts to execute operation of a link responsible for the operation terminal;
after the operation terminal finishes the operation of the link responsible by the operation terminal, the operation terminal sends the secret key to the next operation terminal according to the operation sequence in the operation token;
the next operation terminal acquires the secret key, reads a verification secret key locally stored by the next operation terminal, and sends the verification secret key to the previous operation terminal;
the last operation terminal verifies the verification key, and after the verification is passed, the last operation terminal sends the operation token and the key to the next operation terminal;
the next operation terminal acquires the operation token and the secret key, scans an electronic tag attached to the surface of an operation object corresponding to the next operation terminal, and starts to execute the operation of a link responsible for the next operation terminal;
after the next operation terminal finishes the operation of the link which is responsible for the operation terminal, the next operation terminal continues to send the secret key to other operation terminals according to the operation sequence in the operation token;
and repeatedly executing the previous step until the last operation terminal finishes the operation of the link which is responsible for the last operation terminal.
The application also provides a key type transmission line field operation system, and the key type transmission line field operation method mentioned in the foregoing content is adopted, and the method comprises the following steps:
the responsible terminal is used for sending a key to the job terminal of the initial job, verifying the verification key sent by the job terminal of the initial job, and sending a job token and the key to the job terminal of the initial job after the verification is passed;
the system comprises a plurality of operation terminals which are connected in sequence according to an operation sequence, wherein the operation terminals are used for receiving a secret key sent by a previous operation terminal, sending a verification secret key to the previous operation terminal, acquiring an operation token and the secret key sent by the previous operation terminal after the verification secret key passes the verification of the previous operation terminal, scanning an electronic tag attached to the surface of an operation object corresponding to the operation terminal, starting to execute the operation of a link which is responsible for the operation terminal, and transmitting the secret key to a next operation terminal until the last operation terminal completes the operation of the link which is responsible for the last operation terminal;
the first operation terminal and the last operation terminal in the plurality of operation terminals are respectively connected with the responsible terminal;
each work object is connected with one work terminal and is used for being matched with the work terminal to complete the work of the link which is responsible for the work terminal.
The application relates to a key type transmission line field operation method and a key type transmission line field operation system, wherein safety verification is carried out through a mode of setting a plurality of operation terminals through keys, and operation can be carried out through a rear transferable operation token, so that the safety of transmission line field operation is greatly improved, and each operation terminal is ensured to be safe and reliable.
Drawings
Fig. 1 is a schematic flowchart of a key-type transmission line field operation method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a key-type power transmission line field operation system according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an operation object in the key-type power transmission line field operation system according to an embodiment of the present application.
10 secret key type transmission line field operation system
100 responsible terminal
200 operation terminal
300 work object
400 identity authentication module
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The application provides a key type transmission line field operation method.
It should be noted that the key type power transmission line field operation method provided by the present application is not limited to its execution subject. Optionally, an execution subject of the key type power transmission line field operation method provided by the present application may be a key type power transmission line field operation system 10. Alternatively, the execution subject may be a processor or other control device with a control function provided in the key type power transmission line field operation system 10.
As shown in fig. 1, in an embodiment of the present application, the key-based power transmission line field operation method includes the following steps S100 to S800:
s100, the responsible terminal 100 transmits the key to one job terminal 200.
Specifically, the responsible terminal 100 may be one of a mobile phone, a notebook computer and a tablet computer, or any other kind of intelligent terminal. Similarly, the operation terminal 200 may also be one of a mobile phone, a notebook computer and a tablet computer. The responsible terminal 100 is one. The work terminal 200 may be plural.
The person issuing the job task sets up the job sequence in advance. In this step, the plurality of work terminals 200 perform the work in order of the work. In this step, the in-charge terminal 100 transmits a key to one job terminal 200. The job terminal 200 can be understood as a job terminal 200 that executes a job first, also referred to as a job terminal 200 that starts a job.
The key is pre-stored locally in the responsible terminal 100. The in-charge terminal 100 extracts the key stored locally and transmits the key to the job terminal 200 that initiated the job.
S200, the job terminal 200 acquires the key sent by the responsible terminal 100. Further, the job terminal 200 reads the authentication key locally stored in the job terminal 200, and transmits the authentication key to the in-charge terminal 100.
Specifically, the job terminal 200 may store an authentication key. The operation terminal 200 may read an authentication key corresponding to the key, and send the authentication key to the responsible terminal 100, so that the responsible terminal 100 authenticates the authentication key.
S300, the responsible terminal 100 verifies the verification key. After the authentication is passed, the in-charge terminal 100 transmits a job token and the key to the job terminal 200. The job token is used for unlocking the job authority of the job terminal 200 and recording the job flow of the job terminal 200.
Specifically, the key is stored in the responsible terminal 100, and in order to ensure the validity of the job terminal 200, it is necessary to verify the verification key transmitted by the job terminal 200. The specific verification process may be to decrypt the key using the verification key, and determine whether decryption is successful. The key and the authentication key may be generated by a cryptographic algorithm. If the decryption is successful, the verification is determined to be passed, the verification key is valid, and the operation terminal 200 has validity. Further, the in-charge terminal 100 transmits the job token and the key to the job terminal 200.
The job token is used for recording a job flow when the job terminal 200 executes a job of a link in charge of the job terminal 200. The job token is also used to unlock the job authority of the job terminal 200. In step S200, the job terminal 200 responsible for transmitting the authentication key is the job terminal 200 that starts the job. It is to be understood that, in step S300, the in-charge terminal 100 transmits the job token and the key to the job terminal 200 that starts the job by authenticating the job terminal 200 that also starts the job.
S400, the job terminal 200 obtains the job token and the key. Further, the work terminal 200 scans the electronic tag attached to the surface of the work object 300 corresponding to the work terminal 200, and starts to execute the work of the link in which the work terminal 200 is responsible.
After the job terminal 200 completes the job of the link in which the job terminal 200 is responsible, the job terminal 200 sends the key to the next job terminal 200 according to the job sequence in the job token.
Specifically, the job terminal 200 in this step is the job terminal 200 that starts the job. And the operation terminal 200 which starts the operation acquires the operation token and unlocks the operation of the link which is responsible for the operation terminal 200. It is understood that the job terminal 200 that starts the job at this time is equivalent to being unlocked the job authority. Further, the job terminal 200 that starts the job may scan the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and start to execute the job of the link for which the job terminal 200 is responsible.
The number of the work objects 300 may be plural, and the work terminals 200 may correspond to the work objects 300 one by one. The work object 300 may be a vehicle, a work tool, a safety tool, or the like used in the field work of the power transmission line, and an electronic tag is attached to the surface of each work object 300. The electronic tag can be a two-dimensional code. The electronic tag can be a two-dimensional code.
The job terminal 200 scans the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and can establish a job relationship linked with the job object 300, so that the job terminal 200 can cooperate with the job object 300 to complete the job of the link in which the job terminal 200 is responsible.
After the job terminal 200 completes the job of the link in which the job terminal 200 is responsible, the job terminal 200 sends the key to the next job terminal 200 according to the job sequence in the job token. This step is to verify the validity of the next job terminal 200.
S500, the next job terminal 200 acquires the key, reads the authentication key locally stored in the next job terminal 200, and sends the authentication key to the previous job terminal 200.
Specifically, the next job terminal 200 may store the authentication key in advance, similarly to the step S200. The next job terminal 200 may read the authentication key corresponding to the key, and send the authentication key to the previous job terminal 200, so that the previous job terminal 200 authenticates the authentication key.
Note that, here, the terminal that performs the authentication process is not in charge of the terminal 100, but the last job terminal 200. Since the validity of the last job terminal 200 has already been verified at said step S400, the next job terminal 200 whose validity is unknown can be verified by the valid last job terminal 200.
S600, the previous job terminal 200 verifies the verification key. After the authentication is passed, the previous job terminal 200 transmits the job token and the key to the next job terminal 200.
Specifically, similarly to the step S300, in this step, the previous job terminal 200 authenticates the authentication key transmitted by the next job terminal 200. If the verification is passed, it indicates that the next job terminal 200 is legal, and the previous job terminal 200 transfers the job token and the key to the next job terminal 200. If the verification is not passed, it indicates that the next operation terminal 200 does not have validity, and the current step is interrupted.
S700, the next job terminal 200 acquires the job token and the secret key, scans the electronic tag attached to the surface of the job object 300 corresponding to the next job terminal 200, and starts to execute the job of the link in which the next job terminal 200 is responsible.
After the next job terminal 200 completes the job of the link for which the job terminal 200 is responsible, the next job terminal 200 continues to send the key to other job terminals 200 according to the job sequence in the job token.
Specifically, similar to step S400, the next job terminal 200 at this time is equivalent to being unlocked with the job authority. In this step, the next job terminal 200 may scan the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and start to execute the job of the link in which the job terminal 200 is responsible. After the job is completed, the key is continuously transmitted to the subsequent job terminal 200.
And S800, repeatedly executing the step S700 until the last operation terminal 200 finishes the operation of the link which is responsible for the last operation terminal 200.
Specifically, by repeatedly executing the process of verifying the verification key, transmitting the job token and the key-executing job after the verification passes, it is possible to accomplish the job flow completion of all the job terminals 200.
In the embodiment, the safety verification is performed by setting the plurality of operation terminals 200 in a secret key mode, and the operation token can be transmitted to the rear part for operation, so that the safety of the field operation of the power transmission line is greatly improved, and the safety and the reliability of each operation terminal 200 are ensured.
In an embodiment of the application, after the step S800, the key-based power transmission line field operation method further includes the following steps S910 to S940:
s910, after the last job terminal 200 completes the job, the last job terminal 200 sends the key to the responsible terminal 100.
After the last job terminal 200 completes the job, a job token needs to be returned to the responsible terminal 100. In order to return the security of data transmission at the job token, a security check needs to be performed on the responsible terminal 100. Steps S910 to S940 are security check processes for the responsible terminal 100.
Specifically, after the last job terminal 200 completes the job, the last job terminal 200 transmits the key to the in-charge terminal 100.
S920, the responsible terminal 100 locally extracts the verification key and sends the verification key to the last job terminal 200.
Specifically, the in-charge terminal 100 also stores the authentication key locally. The in-charge terminal 100 transmits the authentication key to the last job terminal 200.
S930, the last job terminal 200 verifies the verification key. After the verification is passed, the job token is returned to the responsible terminal 100.
Specifically, the last work terminal 200 also has an authentication function of authenticating a key. If the responsible terminal 100 is legal, the verification key sent by the responsible terminal 100 can be verified. After the verification is passed, the last job terminal 200 returns the job token to the in-charge terminal 100.
S940, the responsible terminal 100 obtains the job token, and closes the job flow of the last job terminal 200 to complete the whole job flow.
Specifically, after the responsible terminal 100 acquires the job token, it is determined that the entire job flow has been completed. Further, the in-charge terminal 100 sends a closing instruction to the last job terminal 200 to close the job flow of the last job terminal 200.
In this embodiment, after the last job terminal 200 completes the job, the security check is performed on the responsible terminal 100 once, so that the data security when the job token is returned to the responsible terminal 100 is ensured, and a complete security closed-loop system is formed.
In an embodiment of the present application, the key includes identity information of the responsible terminal 100. The step S200 includes the following steps S210 to S220:
s210, the job terminal 200 acquires the key sent by the responsible terminal 100.
In particular, the key may be a public key.
S220, the job terminal 200 uses the identity information of the responsible terminal 100 as an index, locally searches for the verification key corresponding to the responsible terminal 100, and sends the verification key to the responsible terminal 100.
In particular, the authentication key may be a private key. In order to perform different types of job tasks, the job terminal 200 may store a plurality of authentication keys to cooperate with different responsible terminals 100 to perform different job tasks. Each authentication key corresponds to a key. The key may include identity information of the responsible terminal 100. The identity information of the responsible terminal 100 may be an ID number of the responsible terminal 100. The job terminal 200 uses the ID number of the responsible terminal 100 as an index, and locally searches for the verification key corresponding to the ID number in the job terminal 200, so as to verify the key corresponding to the responsible terminal 100.
In this embodiment, the operation terminal 200 uses the identity information of the responsible terminal 100 as an index to locally search for the verification key corresponding to the responsible terminal 100, so as to determine the key association between the operation terminal 200 and the responsible terminal 100, thereby facilitating the implementation of the subsequent verification step of the verification key.
In an embodiment of the present application, the step S300 includes the following steps S310 to S320:
s310, the responsible terminal 100 obtains the verification key. Further, the responsible terminal 100 decrypts the key based on the verification key, and determines whether the decryption of the key is successful.
Specifically, the secret key may be a public key, and the verification secret key may be a private key. Similarly, the secret key may be a private key, and the verification secret key may be a public key. The key and the authentication key are generated based on a key generation algorithm, the key being used to encrypt data and the authentication key being used to decrypt data. Therefore, by decrypting the key based on the authentication key, it can be determined whether the decryption of the key is successful.
S320, if the key decryption is successful, the responsible terminal 100 sends a job token and the key to the job terminal 200.
Specifically, if the key decryption is successful, it is determined that the job terminal 200 is legitimate, and the responsible terminal 100 sends a job token and the key to the job terminal 200.
In this embodiment, whether the decryption of the secret key is successful is determined by decrypting the secret key based on the verification secret key, so that the safety verification between the operation terminal 200 and the responsible terminal 100 in the form of the secret key is realized, the operation token can be transmitted to the operation terminal 200 to perform operation after the verification, and the safety of the field operation of the power transmission line is greatly improved.
In an embodiment of the present application, the step S500 includes the following steps S510 to S520:
s510, the next job terminal 200 acquires the key sent by the previous job terminal 200.
S520, the next job terminal 200 uses the identity information of the responsible terminal 100 as an index, locally searches for the verification key corresponding to the responsible terminal 100, and sends the verification key to the previous job terminal 200.
Specifically, the principle of step S510 to step S520 is the same as that of step S210 to step S220. The difference is that steps S210 to S220 are security check processes between the job terminal 200 responsible for the initial job and the terminal 100. And steps S510 to S520 are security check processes between the previous job terminal 200 and the next job terminal 200. Likewise, the next job terminal 200 may also include a plurality of authentication keys. The next job terminal 200 also needs to locally search for the authentication key corresponding to the responsible terminal 100, using the identity information of the responsible terminal 100 as an index.
In this embodiment, the next operation terminal 200 uses the identity information of the responsible terminal 100 as an index to locally search for the verification key corresponding to the responsible terminal 100, so as to determine the key association between the next operation terminal 200 and the previous operation terminal 200, thereby facilitating the implementation of the subsequent verification step on the verification key.
In an embodiment of the present application, the step S600 includes the following steps S610 to S620:
s610, the previous job terminal 200 acquires the verification key. Further, the previous operation terminal 200 decrypts the key based on the verification key, and determines whether the decryption of the key is successful.
S620, if the key decryption is successful, the previous job terminal 200 sends the job token and the key to the next job terminal 200.
Specifically, the principle of step S610 to step S620 is the same as that of step S310 to step S320. The difference is that steps S310 to S320 are security check processes between the job terminal 200 responsible for the terminal 100 and the initial job. And steps S610 to S620 are security check processes between the previous job terminal 200 and the next job terminal 200.
In this embodiment, whether the decryption of the secret key is successful is determined by decrypting the secret key based on the verification secret key, so that the safety verification between the previous operation terminal 200 and the next operation terminal 200 in the form of the secret key is realized, the operation token can be transmitted to the next operation terminal 200 for operation after the verification, and the safety of the field operation of the power transmission line is greatly improved.
In an embodiment of the application, before the step S100, the key-based power transmission line field operation method further includes the following steps S010 to S030:
and S010, the responsible terminal 100 acquires the work ticket. The work ticket includes a job relationship and a job order.
The job relationship is used to represent the relationship between each job terminal 200 and the job object 300 corresponding to the job terminal 200, and each job terminal 200 has the job object 300 uniquely corresponding to the job terminal 200.
The job sequence is a sequence in which the job tokens and the keys are sequentially transferred by the plurality of job terminals 200 to perform a job.
Specifically, the work ticket is a written command that permits execution of work on each job object 300, and is also a written basis for execution of a security technical measure. The work ticket is filled in by the person issuing the job task and is generated after filling. After the work ticket is generated, the person who issues the job task inputs the work ticket to the charge terminal 100. The work ticket contains a job relationship and a job order.
And S020, reading the job relation and the job sequence in the work ticket by the responsible terminal 100. Further, the responsible terminal 100 generates a job token according to the job relation and the job sequence. The responsible terminal 100 also generates a key and an authentication key based on the encryption and decryption algorithm.
Specifically, the job token contains the job relationship and the job order. The responsible terminal 100 may generate a key and an authentication key based on any form of encryption and decryption algorithm. The key is used to encrypt a string of data. The verification key can decrypt the key to obtain the data before encryption.
S030, the responsible terminal 100 stores the job token, the key, and the verification key locally. Further, the in-charge terminal 100 sequentially transmits the authentication key to the plurality of job terminals 200 so that each job terminal 200 stores one authentication key.
Specifically, in order to perform the key-based power transmission line field operation method of steps S100 to S800, it is necessary to locally store the operation token, the key, and the verification key at the same time in the charge terminal 100. The key is used to verify the validity of the job terminal 200 that initiated the job. The job token is used for sending the job token to the job terminal 200 of the initial job after the job terminal 200 of the initial job passes the validity verification so as to unlock the job authority of the job terminal 200 of the initial job. The authentication key is used for receiving key authentication of the job terminal 200 that completed the last job when the job terminal 200 that completed the job returns the job token.
Each of the job terminals 200 stores an authentication key, so that each of the job terminals 200 can be authenticated by the key.
In this embodiment, an operation token is generated according to the operation relationship and the operation sequence, and a key and a verification key are generated according to an encryption and decryption algorithm, so that authority association and key association are provided for implementing the whole key type transmission line field operation method.
In an embodiment of the application, after the step S030, the key-type power transmission line field operation method further includes the following steps S040 to S050:
and S040, the responsible terminal 100 generates a plurality of electronic tags according to the operation relation. Each electronic tag corresponds to one job object 300 and one job terminal 200.
Specifically, the electronic tag may be a two-dimensional code including a job relation. Each job object 300 corresponds to a unique electronic tag. The electronic tag includes a correspondence relationship between the work terminal 200 and the work object 300.
S050, the responsible terminal 100 sets each electronic tag on the surface of the work object 300 corresponding to the electronic tag.
Specifically, the electronic tag may be attached to the surface of the work object 300 by means of pasting or spraying.
In the embodiment, the responsible terminal 100 reads the job relation in the job ticket, generates the electronic tag containing the job relation and arranges the electronic tag on the surface of the job object 300, so that the job terminal 200 and the job object 300 are rigidly bound, the illegal operation condition of the field operation of the power transmission line is reduced, and the safety degree of the field operation of the power transmission line is improved.
In an embodiment of the present application, the step S400 includes the following steps S410 to S490:
s410, the job terminal 200 acquires the job token and the key.
S430, the job terminal 200 reads the job relation in the job token.
S450, the job terminal 200 determines the job object 300 corresponding to the job terminal 200 according to the job relation.
S470, the job terminal 200 scans the electronic tag attached to the surface of the job object 300 corresponding to the job terminal 200, and starts to execute the job of the link in which the job terminal 200 is responsible.
S490, after the job terminal 200 completes the job of the link in which the job terminal 200 is responsible, the job terminal 200 sends the key to the next job terminal 200 according to the job sequence in the job token.
Specifically, steps S410 to S490 are steps in which the job terminal 200 that starts a job specifically executes a job flow and transfers a key. Steps S410 to S490 are not only steps for specifically executing the job flow for the job terminal 200 of the initial job, but also steps for specifically executing the job flow for other job terminals 200.
In this embodiment, the operation terminal 200 acquires the operation relationship from the operation token, and further determines the operation object 300 corresponding to the operation terminal 200, so that irregular operations of the irregular operation terminal 200 or the irregular operation object 300 can be prevented, and the operation safety is improved.
In an embodiment of the present application, after step S050, the key-based power transmission line field operation method further includes steps S061 to S063:
s061, generates the preset identity information and identity authentication module 400 corresponding to each job terminal 200.
Specifically, the preset identity information may be identity information of an operator who operates the work terminal 200. The identity authentication module 400 corresponds to the preset identity information one to one.
S062, searching for the job object 300 corresponding to each piece of the predetermined identity information according to the correspondence relationship.
Specifically, the job relationship in the job ticket has determined the correspondence of the job terminal 200 and the job object 300. Step S061 also determines the correspondence between the preset identity information and the job terminal 200. It is understood that, according to the job relationship, the corresponding relationship between the job object 300 and the preset identity information may be determined. In other words, the correspondence relationship of the job terminal 200, the job object 300, and the preset identification information can be determined.
S063, embeds each preset identity information and identity authentication module 400 in the job object 300 corresponding to the preset identity information.
In particular, the identity authentication module 400 may include a memory. The preset identity information may be stored in the memory. The identity authentication module 400 storing the preset identity information may be embedded in the job object 300 corresponding to the preset identity information. After this step is performed, the job object 300 includes both the preset identity information and the electronic tag.
In this embodiment, by generating the preset identity information and the identity authentication module 400 corresponding to each operation terminal 200, the preset identity information can be bound to the operation object 300 and the operation terminal 200, so that the identity information of the operation terminal 200 can be conveniently checked by the subsequent operation terminal 200 before scanning the two-dimensional code on the surface of the operation object 300, and the security is improved.
In an embodiment of the application, before the step S470, the key-type power transmission line field operation method further includes the following steps S461 to S464:
s461, the work terminal 200 sends an authentication request to the authentication module 400 built in the work object 300.
Specifically, after the step S450, that is, after the job object 300 corresponding to the job terminal 200 is determined, the step S470 is not performed for the first time, but the steps S461 to S464 are performed. The steps S461 to S464 are procedures of verifying the identity information of the work terminal 200.
S462, the identity authentication module 400 starts the identity verification function. The job terminal 200 inputs authentication information to the authentication module 400.
Specifically, after the identity authentication module 400 receives the identity authentication request, the identity authentication module 400 starts an identity verification function. Alternatively, the job object 300 may pop up an authentication interface, or may pop up the authentication interface on the job terminal 200. Through the authentication interface, the operation terminal 200 may input authentication information. For example, a password is entered.
S463, the identity authentication module 400 determines whether the identity verification information matches the preset identity information.
Specifically, the authentication information is the identity information input by the operation terminal 200. The preset identity information is pre-generated identity information. The identity authentication module 400 determines whether the identity verification information matches the preset identity information.
S464, if the identity verification information matches the preset identity information, the identity authentication module 400 sends an instruction allowing the operation terminal 200 to scan the electronic tag to the operation terminal 200.
Specifically, if the identity verification information matches the preset identity information, it is determined that the operation terminal 200 is a legal operation terminal 200, and the identity authentication module 400 sends an instruction allowing the operation terminal 200 to scan the electronic tag to the operation terminal 200.
If the identity verification information does not match the preset identity information, it is determined that the operation terminal 200 is an illegal operation terminal 200, and the identity authentication module 400 sends an instruction for rejecting the operation terminal 200 to scan the electronic tag to the operation terminal 200, and closes the connection relationship between the operation object 300 and the operation terminal 200.
In this embodiment, the identity authentication module 400 of the operation object 300 performs identity authentication on the operation terminal 200, so that validity verification of the operation terminal 200 is realized, and after the verification is passed, the operation terminal 200 is allowed to scan an instruction of an electronic tag, so that the safety of the field operation process of the whole power transmission line is further improved.
In an embodiment of the present application, the authentication information may be one of a password, fingerprint information, and face image information, which are presented in a digital form.
Specifically, the authentication information may not be limited to the above embodiments. When the authentication information is a password presented in a digital form, the operation terminal 200 inputs a digital password to the authentication module 400 to complete the authentication of the operation terminal 200. When the authentication information is fingerprint information, the operation terminal 200 inputs a fingerprint of an operator to the identity authentication module 400, and completes the identity authentication of the operation terminal 200 through fingerprint identification. When the authentication information is face image information, the operation terminal 200 completes the authentication of the operation terminal 200 through face recognition.
In this embodiment, by setting various forms of authentication information, the authentication process of the operation terminal 200 is simplified and made efficient.
The application also provides a key type transmission line field operation system 10. The key type transmission line field operation system 10 adopts the aforementioned key type transmission line field operation method.
In an embodiment of the present application, the key-type power transmission line field operation system 10 includes a responsible terminal 100, a plurality of operation terminals 200, and a plurality of operation objects 300. The plurality of job terminals 200 are connected in order in accordance with the job order. The first and last job terminals 200 and 200 of the plurality of job terminals 200 are connected to the in-charge terminal 100, respectively. Each job object 300 is connected to one job terminal 200.
The charge terminal 100 is configured to transmit a key to the job terminal 200 that initiates a job, and authenticate an authentication key transmitted by the job terminal 200 that initiates a job. After the authentication is passed, the job token and the key are transmitted to the job terminal 200 of the initial job.
The job terminal 200 is configured to receive a key sent by a previous job terminal 200, send a verification key to the previous job terminal 200, obtain a job token and the key sent by the previous job terminal 200 after the verification key passes verification of the previous job terminal 200, scan an electronic tag attached to a surface of a job object 300 corresponding to the job terminal 200, start to execute a job of a link in which the job terminal 200 is responsible, and transmit the key to a next job terminal 200 until the last job terminal 200 completes the job of the link in which the last job terminal 200 is responsible.
The job object 300 is configured to cooperate with the job terminal 200 to complete a job of a link in which the job terminal 200 is responsible.
Specifically, the number of the job terminals 200 may be equal to the number of the job objects 300. One job terminal 200 corresponds to one job object 300. The responsible terminal 100 may be one of a mobile phone, a notebook computer and a tablet computer, or any other kind of intelligent terminal. Similarly, the operation terminal 200 may be one of a mobile phone, a notebook computer and a tablet computer. The work object 300 may be one of a work vehicle, a safety tool, a safety measure, a work tool, a work method, a work location, a work environment, the work object 300, and a work ticket.
In this embodiment, the responsible terminal 100 is provided, so that the entire operation flow is monitored. By setting the rigid binding of the plurality of operation terminals 200 and the plurality of operation objects 300, the generation of the illegal operation condition of the field operation of the power transmission line is reduced, and the safety degree of the field operation of the power transmission line is improved. Safety verification is carried out between the plurality of operation terminals 200 in a secret key mode, operation tokens can be transmitted at the rear part for operation, safety of field operation of the power transmission line is greatly improved, and safety and reliability of each operation terminal 200 are guaranteed.
In an embodiment of the present application, the key type power transmission line field operation system 10 further includes a plurality of identity authentication modules 400. Each authentication module 400 is embedded in one of the job objects 300. The identity authentication module 400 is configured to perform identity verification on the work terminal 200 before the work terminal 200 scans an electronic tag attached to the surface of the work object 300 corresponding to the work terminal 200.
Specifically, the identity authentication module 400 may perform identity authentication on the operation terminal 200 through various implementation manners such as digital password authentication, fingerprint authentication, face authentication, and the like.
In this embodiment, the identity authentication module 400 is arranged to authenticate the identity of the operation terminal 200, so that the validity of the operation terminal 200 is verified, and after the verification is passed, the operation terminal 200 is allowed to scan the instruction of the electronic tag, so that the safety of the field operation process of the whole power transmission line is further improved.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (14)

1. A key type transmission line field operation method is characterized by comprising the following steps:
s100, the responsible terminal (100) sends a key to one operation terminal (200);
s200, the operation terminal (200) acquires the key sent by the responsible terminal (100), reads the verification key locally stored by the operation terminal (200), and sends the verification key to the responsible terminal (100);
s300, the responsible terminal (100) verifies the verification key, and after the verification is passed, the responsible terminal (100) sends a job token and the key to the job terminal (200), wherein the job token is used for unlocking the job authority of the job terminal (200) and recording the job flow of the job terminal (200);
s400, the job terminal (200) acquires the job token and the secret key, scans an electronic tag attached to the surface of a job object (300) corresponding to the job terminal (200), and starts to execute the job of a link in charge of the job terminal (200);
after the operation terminal (200) finishes the operation of the link in charge of the operation terminal (200), the operation terminal (200) sends the secret key to the next operation terminal (200) according to the operation sequence in the operation token;
s500, the next operation terminal (200) acquires the key, reads the verification key locally stored by the next operation terminal (200), and sends the verification key to the previous operation terminal (200);
s600, the last operation terminal (200) verifies the verification key, and after the verification is passed, the last operation terminal (200) sends the operation token and the key to the next operation terminal (200);
s700, the next operation terminal (200) acquires the operation token and the secret key, scans an electronic tag attached to the surface of an operation object (300) corresponding to the next operation terminal (200), and starts to execute the operation of the link in charge of the next operation terminal (200);
after the next operation terminal (200) finishes the operation of the link which is responsible for the operation terminal (200), the next operation terminal (200) continues to send the secret key to other operation terminals (200) according to the operation sequence in the operation token;
and S800, repeatedly executing the step S700 until the last operation terminal (200) finishes the operation of the link which is taken charge by the last operation terminal (200).
2. The keyed power transmission line field operation method according to claim 1, further comprising, after the step S800:
s910, after the last operation terminal (200) completes the operation, the last operation terminal (200) sends the key to the responsible terminal (100);
s920, the responsible terminal (100) locally extracts an authentication key and sends the authentication key to the last operation terminal (200);
s930, the last job terminal (200) verifies the verification key, and after the verification is passed, the job token is returned to the responsible terminal (100);
and S940, the responsible terminal (100) acquires the job token and closes the job flow of the last job terminal (200) to complete the whole job flow.
3. The keyed transmission line field work method according to claim 2, wherein the key includes identity information of the responsible terminal (100), and the step S200 includes:
s210, the operation terminal (200) acquires a key sent by the responsible terminal (100);
s220, the operation terminal (200) takes the identity information of the responsible terminal (100) as an index, locally searches a verification key corresponding to the responsible terminal (100), and sends the verification key to the responsible terminal (100).
4. The key-type power transmission line field operation method according to claim 3, wherein the step S300 comprises:
s310, the responsible terminal (100) acquires the verification key, decrypts the key based on the verification key, and judges whether the decryption of the key is successful;
and S320, if the key is decrypted successfully, the responsible terminal (100) sends a job token and the key to the job terminal (200).
5. The key-type power transmission line field operation method according to claim 4, wherein the step S500 comprises:
s510, the next operation terminal (200) acquires the key sent by the previous operation terminal (200);
s520, the next operation terminal (200) takes the identity information of the responsible terminal (100) as an index, locally searches for a verification key corresponding to the responsible terminal (100), and sends the verification key to the previous operation terminal (200).
6. The key-type power transmission line field operation method according to claim 5, wherein the step S600 comprises:
s610, the last operation terminal (200) acquires the verification key, decrypts the key based on the verification key, and judges whether the decryption of the key is successful;
and S620, if the key is decrypted successfully, the last operation terminal (200) sends an operation token and the key to the next operation terminal (200).
7. The keyed power transmission line field operation method according to claim 6, further comprising, before the step S100:
s010, the responsible terminal (100) obtains a work ticket, and the work ticket comprises a work relation and a work sequence;
the operation relation is used for representing the relation between each operation terminal (200) and the operation object (300) corresponding to the operation terminal (200), and each operation terminal (200) has the operation object (300) uniquely corresponding to the operation terminal (200);
the job sequence is a sequence in which a plurality of job terminals (200) sequentially transmit the job token and the secret key to perform the job;
s020, reading the job relation and the job sequence in the work ticket by the responsible terminal (100), generating a job token according to the job relation and the job sequence, and generating a key and a verification key based on an encryption and decryption algorithm;
s030, the responsible terminal (100) stores the job token, the key and the verification key locally, and sends the verification key to the plurality of job terminals (200) in sequence, so that each job terminal (200) stores one verification key.
8. The keyed transmission line field work method according to claim 7, wherein after the step S030, the method further comprises:
s040, the responsible terminal (100) generates a plurality of electronic tags according to the operation relation, and each electronic tag corresponds to one operation object (300) and one operation terminal (200);
and S050, wherein each electronic tag is arranged on the surface of the operation object (300) corresponding to the electronic tag by the responsible terminal (100).
9. The key-type power transmission line field operation method according to claim 8, wherein the step S400 comprises:
s410, the job terminal (200) acquires the job token and the secret key;
s430, the job terminal (200) reads the job relation in the job token;
s450, the operation terminal (200) determines an operation object (300) corresponding to the operation terminal (200) according to the operation relation;
s470, the work terminal (200) scans the electronic label attached to the surface of the work object (300) corresponding to the work terminal (200) and starts to execute the work of the link in charge of the work terminal (200);
and S490, after the job terminal (200) completes the job of the link in charge of the job terminal (200), the job terminal (200) sends the key to the next job terminal (200) according to the job sequence in the job token.
10. The keyed transmission line field work method according to claim 9, further comprising, after the step S050:
s061, generating a preset identity information and identity authentication module corresponding to each operation terminal (200);
s062, according to the said corresponding relation, search for each preset identity information correspondent job target (300);
s063, each preset identity information and identity authentication module is embedded into the operation object (300) corresponding to the preset identity information.
11. The keyed power transmission line field operation method according to claim 10, further comprising, before the step S470:
s461, the working terminal (200) sends an identity authentication request to an identity authentication module built in the working object (300);
s462, the identity authentication module starts an identity verification function, and the operation terminal (200) inputs identity verification information to the identity authentication module;
s463, the identity authentication module determines whether the identity verification information matches the preset identity information;
s464, if the identity verification information accords with the preset identity information, the identity authentication module sends an instruction allowing the operation terminal (200) to scan the electronic tag to the operation terminal (200).
12. The key type transmission line field operation method according to claim 11, wherein the authentication information is one of a password, fingerprint information, and face image information presented in a digital form.
13. A keyed transmission line field work system, characterized in that, using the keyed transmission line field work method according to any one of claims 1 to 12, the keyed transmission line field work system (10) comprises:
the system comprises a responsible terminal (100) for sending a key to a job terminal (200) of an initial job, verifying a verification key sent by the job terminal (200) of the initial job, and sending a job token and the key to the job terminal (200) of the initial job after the verification is passed;
the system comprises a plurality of operation terminals (200) which are sequentially connected according to an operation sequence, wherein the operation terminals (200) are used for receiving a secret key sent by a last operation terminal (200), sending a verification secret key to the last operation terminal (200), acquiring an operation token and the secret key sent by the last operation terminal (200) after the verification secret key passes the verification of the last operation terminal (200), scanning an electronic tag attached to the surface of an operation object (300) corresponding to the operation terminal (200), starting to execute the operation of a link which the operation terminal (200) is responsible for, and transmitting the secret key to a next operation terminal (200) until the last operation terminal (200) finishes the operation of the link which the last operation terminal (200) is responsible for;
a first work terminal (200) and a last work terminal (200) of the plurality of work terminals (200) are connected to the in-charge terminal (100), respectively;
the system comprises a plurality of work objects (300), wherein each work object (300) is connected with one work terminal (200) and is used for being matched with the work terminal (200) to complete the work of the link which is taken charge by the work terminal (200).
14. The keyed transmission line field operation system of claim 13, wherein the keyed transmission line field operation system (10) further comprises:
each identity authentication module is embedded in one operation object (300) and used for verifying the identity of the operation terminal (200) before the operation terminal (200) scans the electronic tag attached to the surface of the operation object (300) corresponding to the operation terminal (200).
CN201911268986.XA 2019-12-11 2019-12-11 Key type transmission line field operation method and system Active CN111130006B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911268986.XA CN111130006B (en) 2019-12-11 2019-12-11 Key type transmission line field operation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911268986.XA CN111130006B (en) 2019-12-11 2019-12-11 Key type transmission line field operation method and system

Publications (2)

Publication Number Publication Date
CN111130006A CN111130006A (en) 2020-05-08
CN111130006B true CN111130006B (en) 2021-08-24

Family

ID=70499207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911268986.XA Active CN111130006B (en) 2019-12-11 2019-12-11 Key type transmission line field operation method and system

Country Status (1)

Country Link
CN (1) CN111130006B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2940961A1 (en) * 2014-04-30 2015-11-04 Fujitsu Limited Device configuration for secure communication
KR101621931B1 (en) * 2014-12-19 2016-05-17 한국인터넷진흥원 Power information transmitting and receiving system in the smart grid
US9542863B2 (en) * 2008-10-02 2017-01-10 Certusview Technologies, Llc Methods and apparatus for generating output data streams relating to underground utility marking operations
CN107657677A (en) * 2017-09-14 2018-02-02 国网山东省电力公司汶上县供电公司 Substation inspection monitoring method, device and electronic equipment
WO2018160228A1 (en) * 2017-03-03 2018-09-07 General Electric Company Microgrid energy reservoir transaction verification via secure, distributed ledger
CN109326034A (en) * 2018-11-09 2019-02-12 国网青海省电力公司西宁供电公司 A kind of smart lock Work Bill Management System for electric distribution cabinet
CN109657509A (en) * 2018-12-05 2019-04-19 国网北京市电力公司 A kind of RFID system that can be quickly positioned in cut cable is cut and changed and method
CN109685352A (en) * 2018-12-18 2019-04-26 国网浙江省电力有限公司 A kind of device maintenance method and system of intelligence control linkage
CN109710696A (en) * 2018-12-28 2019-05-03 山东恒道信息技术有限公司 The System and method for the mobile operation of unusual fluctuation is verified for power equipment
CN109728540A (en) * 2018-11-22 2019-05-07 国网浙江省电力有限公司丽水供电公司 A kind of power network line inspection management method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9542863B2 (en) * 2008-10-02 2017-01-10 Certusview Technologies, Llc Methods and apparatus for generating output data streams relating to underground utility marking operations
EP2940961A1 (en) * 2014-04-30 2015-11-04 Fujitsu Limited Device configuration for secure communication
KR101621931B1 (en) * 2014-12-19 2016-05-17 한국인터넷진흥원 Power information transmitting and receiving system in the smart grid
WO2018160228A1 (en) * 2017-03-03 2018-09-07 General Electric Company Microgrid energy reservoir transaction verification via secure, distributed ledger
CN107657677A (en) * 2017-09-14 2018-02-02 国网山东省电力公司汶上县供电公司 Substation inspection monitoring method, device and electronic equipment
CN109326034A (en) * 2018-11-09 2019-02-12 国网青海省电力公司西宁供电公司 A kind of smart lock Work Bill Management System for electric distribution cabinet
CN109728540A (en) * 2018-11-22 2019-05-07 国网浙江省电力有限公司丽水供电公司 A kind of power network line inspection management method
CN109657509A (en) * 2018-12-05 2019-04-19 国网北京市电力公司 A kind of RFID system that can be quickly positioned in cut cable is cut and changed and method
CN109685352A (en) * 2018-12-18 2019-04-26 国网浙江省电力有限公司 A kind of device maintenance method and system of intelligence control linkage
CN109710696A (en) * 2018-12-28 2019-05-03 山东恒道信息技术有限公司 The System and method for the mobile operation of unusual fluctuation is verified for power equipment

Also Published As

Publication number Publication date
CN111130006A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
TWI667585B (en) Method and device for safety authentication based on biological characteristics
CN107113315B (en) Identity authentication method, terminal and server
CN101300808B (en) Method and arrangement for secure autentication
CA2748563C (en) Biometric key
CN107771383A (en) At least two authenticating devices are mapped to the method for user account using certificate server
CN110990827A (en) Identity information verification method, server and storage medium
EP4024311A1 (en) Method and apparatus for authenticating biometric payment device, computer device and storage medium
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN109643473A (en) A kind of method, apparatus and system of identity legitimacy verifying
CN113591057B (en) Biological characteristic off-line identity recognition method and system
CN115527292B (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
CN109743283B (en) Information transmission method and equipment
CN113963464B (en) Bank safe deposit box unlocking system and method based on blockchain
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
WO2012001768A1 (en) Mobile communication terminal, method for activating same, and network communication system
CN111130006B (en) Key type transmission line field operation method and system
JP4998314B2 (en) Communication control method and communication control program
CN105512520A (en) Anti-cloning vehicle-mounted system and work method thereof
CN111162908B (en) Key solar power transmission line field operation method and system
US20220386118A1 (en) Method for proximity communication between terminals and apparatus thereof
CN111130007B (en) Sequential power transmission line field operation method and system
US20180060558A1 (en) Method of authenticating a user at a security device
CN110994452B (en) Sequential solar power transmission line field operation method and system
CN105227562A (en) The key business data transmission mediation device of identity-based checking and using method thereof
CN111105207B (en) Random transmission line field operation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant