CN111404269A - Port-based information interaction method and device and power terminal - Google Patents

Port-based information interaction method and device and power terminal Download PDF

Info

Publication number
CN111404269A
CN111404269A CN202010182506.4A CN202010182506A CN111404269A CN 111404269 A CN111404269 A CN 111404269A CN 202010182506 A CN202010182506 A CN 202010182506A CN 111404269 A CN111404269 A CN 111404269A
Authority
CN
China
Prior art keywords
verification file
data
port
communication port
information interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010182506.4A
Other languages
Chinese (zh)
Inventor
陈文敏
苟孟生
冯丹荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Sanxing Electric Co Ltd
Original Assignee
Ningbo Sanxing Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Sanxing Electric Co Ltd filed Critical Ningbo Sanxing Electric Co Ltd
Priority to CN202010182506.4A priority Critical patent/CN111404269A/en
Publication of CN111404269A publication Critical patent/CN111404269A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention provides a port-based information interaction method and device and an electric power terminal, and relates to the technical field of intelligent electric meters. The port-based information interaction method is applied to a processor of a power terminal, the power terminal further comprises a communication port electrically connected with the processor, and the communication port is used for being in communication connection with electronic equipment, and the method comprises the following steps: receiving message information; the message information comprises authorization time length information of a configured communication port, and the authorization time length information is used for representing the authorization time of the communication port; judging whether the time represented by the authorization duration information is zero or not; if not, performing information interaction with the electronic equipment through the communication port within the time represented by the authorized duration information and when the communication port is connected with the electronic equipment. The port-based information interaction method and device and the power terminal provided by the embodiment of the invention can prevent an unauthorized operator from operating the information of the power terminal.

Description

Port-based information interaction method and device and power terminal
Technical Field
The invention relates to the technical field of intelligent electric meters, in particular to a port-based information interaction method and device and an electric power terminal.
Background
In recent years, with the steady development of the economy of China, the industry of the intelligent electric meters in China is developed more maturely, and more than 100 thousands of currently operated electric power acquisition terminals are achieved. With the increasing application and functions of the power acquisition terminal, the safety problem of the power acquisition terminal is increasingly prominent. How to prevent an unauthorized operator from operating information of the power acquisition terminal through a communication interface of the power acquisition terminal is a problem to be solved urgently at present.
Disclosure of Invention
The invention aims to provide a port-based information interaction method, a port-based information interaction device and an electric power terminal, which can prevent an unauthorized operator from operating information of the electric power terminal.
Embodiments of the invention may be implemented as follows:
in a first aspect, an embodiment of the present invention provides a port-based information interaction method, which is applied to a processor of an electric power terminal, where the electric power terminal further includes a communication port electrically connected to the processor, and the communication port is used for being communicatively connected to an electronic device, and the method includes: receiving message information; the message information comprises authorization duration information for configuring the communication port, and the authorization duration information is used for representing the authorization time of the communication port; judging whether the time represented by the authorization duration information is zero or not; if not, performing information interaction with the electronic equipment through the communication port within the time represented by the authorization duration information and when the communication port is connected with the electronic equipment.
Therefore, the authorized time of the communication port is set, so that the operation and maintenance personnel can only perform information interaction between the electronic equipment and the power terminal within the authorized time, and can effectively prevent the operation of the information of the power terminal by the operation personnel without permission when the authorized time is exceeded or the unauthorized time is not exceeded.
In an optional implementation manner, the step of performing information interaction with the electronic device through the communication port includes: reading a preset verification file in the electronic equipment through the communication port; judging whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule; and if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to the preset rule, executing corresponding operation according to the verification file.
Therefore, through the verification of the memory size and the data format of the verification file, the operation of an unauthorized operator on the information of the power terminal can be further prevented, and the information interaction between the unauthorized electronic equipment and the power terminal can be prevented.
In an optional embodiment, the step of determining whether the data format of the verification file conforms to a preset rule includes: judging whether the data in the verification file is a preset parameter, whether the line number of the data in the verification file is within a preset range, and whether the number of each line of data in the verification file accords with a second preset value; and when the data in the verification file is the preset parameter, the line number of the data in the verification file is within the preset range, and the number of each line of data in the verification file is the same as the second preset value, judging that the data format of the verification file conforms to the preset rule.
In an optional embodiment, the step of performing the corresponding operation according to the verification file includes: and executing one or more of software upgrading operation, data downloading operation, data deleting operation and data modifying operation according to the verification file.
Therefore, by setting the authorization time of the communication port, the software upgrading operation, the data downloading operation, the data deleting operation and the data modifying operation of an operator without permission on the power terminal can be effectively prevented.
In an optional embodiment, the processor is further communicatively connected to a backend terminal, and the method further includes: acquiring an event for information interaction with the electronic equipment; and reporting the event for information interaction with the electronic equipment to the background terminal.
Therefore, the event of information interaction with the electronic equipment is reported to the background terminal, so that the staff can monitor the safety state of the power terminal in real time.
In an alternative embodiment, the method further comprises: if the time represented by the authorization duration information is not zero, acquiring an abnormal login event of the electronic equipment when the communication port is connected with the electronic equipment; and sending the abnormal login event of the electronic equipment to the background terminal.
In a second aspect, an embodiment of the present invention provides a port-based information interaction method, which is applied to a processor of an electric power terminal, where the electric power terminal further includes a communication port electrically connected to the processor, and the communication port is used for being communicatively connected to an electronic device, and the apparatus includes: the receiving module is used for receiving message information; the message information comprises authorization duration information for configuring the communication port, and the authorization duration information is used for representing the authorization time of the communication port; the judging module is used for judging whether the time represented by the authorization duration information is zero or not; and the interaction module is used for carrying out information interaction with the electronic equipment through the communication port within the time represented by the authorization duration information and when the communication port is connected with the electronic equipment if the time represented by the authorization duration information is not zero.
In an alternative embodiment, the interaction module comprises: the reading unit is used for reading a preset verification file in the electronic equipment through the communication port; the judging unit is used for judging whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule or not; and the execution unit is used for executing corresponding operation according to the verification file if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to the preset rule.
In an optional embodiment, the determining unit is configured to determine whether data in the verification file is a preset parameter, whether the number of rows of data in the verification file is within a preset range, and whether the number of each row of data in the verification file meets a second preset value; the judging unit is further configured to judge that the data format of the verification file conforms to the preset rule when the data in the verification file is the preset parameter, the number of rows of data in the verification file is within the preset range, and the number of each row of data in the verification file is the same as the second preset value.
In a third aspect, an embodiment of the present invention provides an electric power terminal, which includes a memory storing a computer program and a processor, where the computer program is read by the processor and executed to implement the port-based information interaction method according to any one of the foregoing embodiments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic application environment diagram of an electric power terminal according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a port-based information interaction method according to an embodiment of the present invention;
FIG. 3 is a schematic view of a sub-flow of step S103 shown in FIG. 2;
fig. 4 is a schematic flowchart of another port-based information interaction method according to an embodiment of the present invention;
fig. 5 is a block diagram of a port-based information interaction apparatus according to an embodiment of the present invention;
FIG. 6 is a block diagram of the structure of the interaction module shown in FIG. 5;
fig. 7 is a block diagram of another port-based information interaction apparatus according to an embodiment of the present invention.
Icon: 100-a power terminal; 110-a processor; 120-a communication port; 130-a memory; 140-port-based information interaction means; 141-a receiving module; 142-a judgment module; 143-an interaction module; 1431-a reading unit; 1432-a determination unit; 1433 — an execution unit; 144-an acquisition module; 145-reporting module; 200-an electronic device; 300-background terminal.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that if the terms "upper", "lower", "inside", "outside", etc. indicate an orientation or a positional relationship based on that shown in the drawings or that the product of the present invention is used as it is, this is only for convenience of description and simplification of the description, and it does not indicate or imply that the device or the element referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present invention.
Furthermore, the appearances of the terms "first," "second," and the like, if any, are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
It should be noted that the features of the embodiments of the present invention may be combined with each other without conflict.
Referring to fig. 1, an application environment diagram of the power terminal 100 provided in this embodiment is shown, the power terminal 100 includes a processor 110, a communication port 120 and a memory 130, the processor 110 is electrically connected to both the communication port 120 and the memory 130, and the communication port 120 is further used for being communicatively connected to an electronic device 200.
The memory 130 is used for storing computer programs or data, among others. The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an erasable Read Only Memory (EPROM), an electrically erasable Read Only Memory (EEPROM), and the like.
The processor 110 is used to read/write data or computer programs stored in the memory 130 and perform corresponding functions. For example, when the computer program in the memory 130 is read and executed by the processor 110, the port-based information interaction method disclosed in the present embodiment is implemented. The processor 110 may be, but is not limited to, a Micro Controller Unit (MCU), an FPGA (Field Programmable Gate Array), and the like.
The communication port 120 is used for realizing information interaction between the processor 110 and the electronic device 200. The communication port 120 may be, but is not limited to, a Universal Serial Bus (USB) port, a 485 port, etc.
The electronic device 200 may be, but is not limited to, a usb disk, a mobile phone, a notebook, etc. The power terminal 100 may also be a concentrator.
Further, as shown in fig. 1, the processor 110 is also communicatively connected to the backend terminal 300. The processor 110 is configured to report the event generated by the power terminal 100 to the backend terminal 300.
The background terminal 300 is provided with a super terminal, and the super terminal can be understood as a section of process or a software function module of the background terminal 300, and the super terminal is used for performing log recording. The backend terminal 300 may be a computer.
Fig. 2 is a schematic flow chart of a port-based information interaction method according to an embodiment of the present invention. It should be noted that, the port-based information interaction method provided in the embodiment of the present invention is not limited by fig. 2 and the following specific sequence, and it should be understood that, in other embodiments, the sequence of some steps in the port-based information interaction method provided in the embodiment of the present invention may be interchanged according to actual needs, or some steps in the port-based information interaction method may also be omitted or deleted. The port-based information interaction method can be applied to the processor 110 shown in fig. 1, and the specific flow shown in fig. 2 will be described in detail below.
Step S101, receiving message information; the message information comprises authorization time length information of a configured communication port, and the authorization time length information is used for representing the authorization time of the communication port.
In this embodiment, the power terminal 100 is automatically logged in after being powered on, the power terminal 100 can perform information interaction with the backend terminal 300 after logging in, and the backend terminal 300 can respond to the operation of the worker to send message information to the processor 110 of the power terminal 100. Of course, the power terminal 100 may also generate message information in response to the operation of the operation and maintenance personnel on the site, and send the message information to the processor 110. The message information may be set to 07013FF20E03000202110111FF 00.
And step S102, judging whether the time represented by the authorization duration information is zero or not.
And step S103, if not, performing information interaction with the electronic equipment through the communication port within the time represented by the authorization duration information and when the communication port is connected with the electronic equipment.
In this embodiment, the time period authorized by the communication port 120 represented by the authorized time period information may be set to 0-254 minutes, and when the time period authorized by the communication port 120 is 0 minute, it indicates that the communication port 120 is authorized to be closed, it can be understood that even though the electronic device 200 is in a communication connection state with the communication port 120, the electronic device 200 cannot perform information interaction with the communication port 120. When the authorized time of the communication port 120 is any number of 1-254 minutes, it indicates that the communication port 120 is in the commissioning state during the authorized time, and it can be understood that information interaction can be performed between the electronic device 200 and the communication port 120 during the authorized time, and beyond the authorized time, information interaction cannot be performed between the electronic device 200 and the communication port 120. For example, if the time authorized by the communication port 120 is 30 minutes, the electronic device 200 and the communication port 120 may perform information interaction within 30 minutes after the communication port 120 receives the message information, and if the time exceeds 30 minutes, the electronic device 200 and the communication port 120 may not perform information interaction.
Referring to fig. 3, a flow chart of the substep of step S103 is shown, which specifically includes:
step S201, reading a verification file preset in the electronic device through the communication port.
In this embodiment, when the electronic device 200 is a usb disk, the format of the authentication file may be set to usb. If there is no verification document in the electronic device 200, the processor 110 will not perform any operation. If the electronic device 200 has the authentication file and the time authorized by the communication port 120, the processor 110 reads the authentication file in the electronic device 200. The processor 110 determines whether the electronic device 200 has the verification file according to whether the file format of usb.sp.6 exists in the electronic device 200.
Step S202, determining whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule.
In this embodiment, after the processor 110 sets the time authorized by the communication port 120, the processor 110 further sets the abnormal event valid function of the electronic device 200. That is, the power terminal 100 has an effective function of the electronic device 200 for the abnormal event, and the processor 110 can determine whether the memory size of the verification file exceeds the first preset value and the data format of the verification file conforms to the preset rule after reading the verification file.
In this embodiment, the first preset value may be a transmission rate of the electronic device 200. For example, if the electronic device 200 is a usb disk, the first preset value may be set to 2M, because when the electronic device 200 is a usb disk, if the memory size of the verification file exceeds 2M, the information exchange rate between the electronic device 200 and the communication port 120 is lower than that when the memory size of the verification file does not exceed 2M.
In this embodiment, the specific principle of determining whether the data format of the verification file conforms to the preset rule is as follows: and judging whether the data in the verification file is a preset parameter, whether the line number of the data in the verification file is within a preset range, and whether the number of each line of data in the verification file conforms to a second preset value.
It is understood that the preset parameters may be set to 1-5, where 1 may indicate the way of software upgrade, 2 may indicate data download instructions, 3 may indicate data delete instructions, 4 may indicate data modify instructions, and 5 may indicate other instructions. That is, the data in the verification file can only be one or more of 1-5, and if the data is other than 1-5, it is determined that the data format of the verification file does not conform to the preset rule. Of course, the preset parameter may also be set to other contents, and may be set according to an actual situation, which is not limited herein.
The preset range may be set to not more than 5, i.e. the number of rows of data in the verification document is at most 5 rows. If the number of rows of the data in the verification file exceeds 5 rows, it is determined that the data format of the verification file does not conform to the preset rule. Of course, the preset range may also be set to other values, and may be set according to actual situations, and is not limited herein.
The second preset value may be set to 1, i.e. each row in the verification file has only one bit of data. If the data in the verification file is 1-5, the number of lines of data in the verification file is 5, and the data in each line is 1, 2, 3, 4 and 5 respectively.
In this embodiment, the verification file may further include a format end symbol, that is, when the data format of the verification file is determined, and when the format end symbol is read, the determination of whether the data format of the verification file meets the preset rule is ended. Wherein the format terminator may be set to "; ".
In this embodiment, the data of different rows in the verification file may be set to the same content, but read only once when the data of different rows in the verification file is the same. That is, if the data in the first row and the data in the third row in the verification document are 1, the processor 110 will only read 1 once and will not read repeatedly.
In step S203, if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to the preset rule, the corresponding operation is executed according to the verification file.
In this embodiment, when the data in the verification file is the preset parameter, the line number of the data in the verification file is within the preset range, and the number of each line of data in the verification file is the same as the second preset value, it is determined that the data format of the verification file conforms to the preset rule.
In this embodiment, if the memory size of the verification file exceeds the first predetermined value and the data format of the verification file conforms to the predetermined rule, the processor 110 may perform one or more of a software upgrade operation, a data download operation, a data delete operation, and a data modify operation according to the verification file.
It is to be understood that if the data in the verification file is set to 1 and 2, and the processor 110 reads the data 1, the processor 110 will automatically download the upgrade installation package and automatically run the upgrade installation package to perform the software upgrade operation. When the processor 110 reads the data 2, the processor 110 sets the right to download the data of the power terminal 100 to the electronic device 200, and the processor 110 responds to the downloading operation of the operation and maintenance personnel to download the data of the power terminal 100 to the electronic device 200.
Referring to fig. 4, another flow chart of the port-based information interaction method according to the embodiment of the present invention is shown, and based on the flow chart shown in fig. 2, the port-based information interaction method further includes the following steps:
and step S104, acquiring an event for information interaction with the electronic equipment.
In this embodiment, when the time represented by the authorized duration information of the communication port 120 is not zero, if the processor 110 performs information interaction with the electronic device 200 within the time represented by the authorized duration information, an event of performing information interaction with the electronic device 200 is correspondingly generated, and the processor 110 acquires the event of performing information interaction with the electronic device 200.
And step S105, reporting the event of information interaction with the electronic equipment to the background terminal.
In this embodiment, the power terminal 100 further includes a reporting port (not shown), the processor 110 is electrically connected to the reporting port, and the reporting port is used for being in communication connection with the background terminal 300. After the processor 110 sets the time authorized by the communication port 120, the reporting port is also opened, so that the reporting port and the background terminal 300 are in a communication connection state.
In this embodiment, when the reporting port and the backend terminal 300 are in a communication connection state, if the processor 110 acquires an information interaction event with the electronic device 200, the processor 110 reports the event of information interaction with the electronic device 200 to the backend terminal 300 through the reporting port. The background terminal 300 stores an event of information interaction with the electronic device 200, and a worker can control the working state of the power terminal 100 according to the event of information interaction with the electronic device 200 stored in the background terminal 300.
And step S106, if the time represented by the authorization duration information is not zero, acquiring an abnormal login event of the electronic equipment when the communication port is connected with the electronic equipment.
In this embodiment, since the authorized time of the communication port 120 is zero, if there is an electronic device 200 connected to the communication port 120, which indicates that an unauthorized operator is operating the power terminal 100 through the communication port 120, the power terminal 100 will generate an abnormal login event of the electronic device 200.
And step S107, sending an abnormal login event of the electronic equipment to the background terminal.
In this embodiment, after the power terminal 100 generates the abnormal logging event of the electronic device 200, if the reporting port is in a communication connection state with the backend terminal 300, the processor 110 sends the abnormal logging event of the electronic device 200 to the backend terminal through the reporting port.
In this embodiment, if the memory size of the verification file exceeds the first preset value or the data format of the verification file does not conform to the preset rule, the processor 110 may further obtain an abnormal event of the electronic device 200, and send the abnormal event of the electronic device 200 to the background terminal 300 through the report port. The abnormal event of the electronic device 200 represents that the electronic device 200 is not authorized for the electronic device 200.
In order to perform the corresponding steps in the above embodiments and various possible manners, an implementation manner of the port-based information interaction apparatus 140 is given below. Referring to fig. 5, fig. 5 is a functional module schematic diagram of a port-based information interaction device 140 according to an embodiment of the present invention. It should be noted that the basic principle and the generated technical effect of the port-based information interaction device 140 provided in the present embodiment are the same as those of the above embodiments, and for the sake of brief description, no part of the present embodiment is mentioned, and reference may be made to the corresponding contents in the above embodiments. The port-based information interaction device 140 includes a receiving module 141, a determining module 142, and an interaction module 143.
The receiving module 141 is configured to receive message information; the message information includes authorization duration information configuring the communication port 120, and the authorization duration information is used to represent authorization time of the communication port 120.
It is understood that the receiving module 141 is configured to execute the content of the above step S101.
The judging module 142 is configured to judge whether the time represented by the authorized duration information is zero.
It is understood that the determining module 142 is used for executing the content of the above step S102.
The interaction module 143 is configured to perform information interaction with the electronic device 200 through the communication port 120 when the time represented by the authorized duration information is not zero and the communication port 120 is connected to the electronic device 200.
It is understood that the interaction module 143 is configured to execute the content of step S103.
Referring to fig. 6, the interaction module 143 includes a reading unit 1431, a determining unit 1432, and an executing unit 1433.
The reading unit 1431 is configured to read an authentication file preset in the electronic device 200 through the communication port 120.
It is understood that the reading unit 1431 is used to execute the content of the above step S201.
The determining unit 1432 is configured to determine whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule.
In this embodiment, the determining unit 1432 is configured to determine whether data in the verification file is a preset parameter, whether the line number of the data in the verification file is within a preset range, and whether the number of each line of data in the verification file conforms to a second preset value;
the determining unit 1432 is further configured to determine that the data format of the verification file conforms to the preset rule when the data in the verification file is the preset parameter, the line number of the data in the verification file is within the preset range, and the number of each line of data in the verification file is the same as the second preset value.
It is understood that the judging unit 1432 is used for executing the content of the above step S202.
The executing unit 1433 is configured to execute a corresponding operation according to the verification file if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to a preset rule.
It is understood that the execution unit 1433 is configured to execute the content of step S203.
Further, as shown in fig. 7, the port-based information interaction apparatus 140 further includes an obtaining module 144 and a reporting module 145 on the basis of fig. 5.
The obtaining module 144 is configured to obtain an event for information interaction with the electronic device 200.
The obtaining module 144 is further configured to obtain an abnormal login event of the electronic device 200 when the communication port 120 is connected to the electronic device 200 if the time represented by the authorized duration information is not zero.
It is understood that the obtaining module 144 is used for executing the contents of step S104 and step S106.
The reporting module 145 is configured to report an event of information interaction with the electronic device 200 to the background terminal 300.
The reporting module 145 is further configured to send an abnormal login event of the electronic device 200 to the background terminal 300.
It can be understood that the reporting module 145 is configured to perform the contents of the above step S105 and step S107.
Alternatively, the receiving module 141, the determining module 142, the interacting module 143, the obtaining module 144 and the reporting module 145 may be stored in the memory 130 in the form of software or Firmware (Firmware), and may be executed by the processor 110.
In summary, the embodiments of the present invention provide a port-based information interaction method and apparatus, and an electric power terminal, where the authorization time of a communication port is set, so that an operation and maintenance worker can perform information interaction between an electronic device and the electric power terminal only in the authorization time, and when the authorization time is exceeded or the authorization-free time is not exceeded, an unauthorized operator can be effectively prevented from operating information of the electric power terminal.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A port-based information interaction method is applied to a processor of a power terminal, the power terminal further comprises a communication port electrically connected with the processor, and the communication port is used for being in communication connection with an electronic device, and the method comprises the following steps:
receiving message information; the message information comprises authorization duration information for configuring the communication port, and the authorization duration information is used for representing the authorization time of the communication port;
judging whether the time represented by the authorization duration information is zero or not;
if not, performing information interaction with the electronic equipment through the communication port within the time represented by the authorization duration information and when the communication port is connected with the electronic equipment.
2. The port-based information interaction method of claim 1, wherein the step of performing information interaction with the electronic device through the communication port comprises:
reading a preset verification file in the electronic equipment through the communication port;
judging whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule;
and if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to the preset rule, executing corresponding operation according to the verification file.
3. The port-based information interaction method according to claim 2, wherein the step of determining whether the data format of the verification file conforms to a preset rule comprises:
judging whether the data in the verification file is a preset parameter, whether the line number of the data in the verification file is within a preset range, and whether the number of each line of data in the verification file accords with a second preset value;
and when the data in the verification file is the preset parameter, the line number of the data in the verification file is within the preset range, and the number of each line of data in the verification file is the same as the second preset value, judging that the data format of the verification file conforms to the preset rule.
4. The port-based information interaction method of claim 2, wherein the step of performing corresponding operations according to the verification file comprises:
and executing one or more of software upgrading operation, data downloading operation, data deleting operation and data modifying operation according to the verification file.
5. The port-based information interaction method of claim 1, wherein the processor is further communicatively connected to a backend terminal, and the method further comprises:
acquiring an event for information interaction with the electronic equipment;
and reporting the event for information interaction with the electronic equipment to the background terminal.
6. The port-based information interaction method of claim 5, wherein the method further comprises:
if the time represented by the authorization duration information is not zero, acquiring an abnormal login event of the electronic equipment when the communication port is connected with the electronic equipment;
and sending the abnormal login event of the electronic equipment to the background terminal.
7. A port-based information interaction device is applied to a processor of a power terminal, the power terminal further comprises a communication port electrically connected with the processor, the communication port is used for being in communication connection with electronic equipment, and the device comprises:
the receiving module is used for receiving message information; the message information comprises authorization duration information for configuring the communication port, and the authorization duration information is used for representing the authorization time of the communication port;
the judging module is used for judging whether the time represented by the authorization duration information is zero or not;
and the interaction module is used for carrying out information interaction with the electronic equipment through the communication port within the time represented by the authorization duration information and when the communication port is connected with the electronic equipment if the time represented by the authorization duration information is not zero.
8. The port-based information interaction device of claim 7, wherein the interaction module comprises:
the reading unit is used for reading a preset verification file in the electronic equipment through the communication port;
the judging unit is used for judging whether the memory size of the verification file exceeds a first preset value and whether the data format of the verification file conforms to a preset rule or not;
and the execution unit is used for executing corresponding operation according to the verification file if the memory size of the verification file does not exceed the first preset value and the data format of the verification file conforms to the preset rule.
9. The port-based information interaction device according to claim 8, wherein the determining unit is configured to determine whether data in the verification file is a preset parameter, whether a number of rows of data in the verification file is within a preset range, and whether a number of rows of data in the verification file conforms to a second preset value;
the judging unit is further configured to judge that the data format of the verification file conforms to the preset rule when the data in the verification file is the preset parameter, the number of rows of data in the verification file is within the preset range, and the number of each row of data in the verification file is the same as the second preset value.
10. An electric terminal, characterized in that it comprises a memory storing a computer program and a processor, the computer program being read and executed by the processor to implement the port-based information interaction method according to any one of claims 1 to 6.
CN202010182506.4A 2020-03-16 2020-03-16 Port-based information interaction method and device and power terminal Pending CN111404269A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010182506.4A CN111404269A (en) 2020-03-16 2020-03-16 Port-based information interaction method and device and power terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010182506.4A CN111404269A (en) 2020-03-16 2020-03-16 Port-based information interaction method and device and power terminal

Publications (1)

Publication Number Publication Date
CN111404269A true CN111404269A (en) 2020-07-10

Family

ID=71430993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010182506.4A Pending CN111404269A (en) 2020-03-16 2020-03-16 Port-based information interaction method and device and power terminal

Country Status (1)

Country Link
CN (1) CN111404269A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182620A (en) * 2020-09-30 2021-01-05 Oppo广东移动通信有限公司 Authorization method, terminal, WEB server and computer storage medium
CN115221490A (en) * 2022-09-20 2022-10-21 陕西天视致远航空技术有限公司 Port information reinforcing computer and port information reinforcing method thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2329582A1 (en) * 2008-08-25 2011-06-08 Cleanpoint Holdings Pty Ltd An electricity management device, an electrical appliance, a system for authorising electrical appliances to utilise electricity and a method of delivering renewable energy into a power grid
CN102215433A (en) * 2010-04-06 2011-10-12 北京视博数字电视科技有限公司 User authorization method and safety device
CN105243810A (en) * 2015-10-21 2016-01-13 宁波三星医疗电气股份有限公司 Power consumer electricity information collecting system and collecting method thereof
CN105866490A (en) * 2016-03-29 2016-08-17 德周科技(北京)有限公司 Smart electricity meter case based on dual authorization of remote cloud and short-range bluetooth
CN205720336U (en) * 2016-04-01 2016-11-23 溧阳市华鹏电力仪表有限公司 A kind of modernization intelligent electric meter device
CN106919109A (en) * 2017-03-27 2017-07-04 杭州世创电子技术股份有限公司 A kind of intelligent electric power lock based on internet
CN108957078A (en) * 2018-08-24 2018-12-07 国网山东省电力公司济南供电公司 A kind of monitoring system and method for measuring equipment
CN110197543A (en) * 2019-05-31 2019-09-03 广东电网有限责任公司 A kind of access of computer USB port limitation intelligent lock, system and method
CN209402238U (en) * 2018-12-29 2019-09-17 国家电网有限公司 Power transmission line dynamic monitoring system
CN110531307A (en) * 2019-09-12 2019-12-03 宁波三星医疗电气股份有限公司 Adjustment method, device and the electric power acquisition terminal of electric power acquisition terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2329582A1 (en) * 2008-08-25 2011-06-08 Cleanpoint Holdings Pty Ltd An electricity management device, an electrical appliance, a system for authorising electrical appliances to utilise electricity and a method of delivering renewable energy into a power grid
CN102215433A (en) * 2010-04-06 2011-10-12 北京视博数字电视科技有限公司 User authorization method and safety device
CN105243810A (en) * 2015-10-21 2016-01-13 宁波三星医疗电气股份有限公司 Power consumer electricity information collecting system and collecting method thereof
CN105866490A (en) * 2016-03-29 2016-08-17 德周科技(北京)有限公司 Smart electricity meter case based on dual authorization of remote cloud and short-range bluetooth
CN205720336U (en) * 2016-04-01 2016-11-23 溧阳市华鹏电力仪表有限公司 A kind of modernization intelligent electric meter device
CN106919109A (en) * 2017-03-27 2017-07-04 杭州世创电子技术股份有限公司 A kind of intelligent electric power lock based on internet
CN108957078A (en) * 2018-08-24 2018-12-07 国网山东省电力公司济南供电公司 A kind of monitoring system and method for measuring equipment
CN209402238U (en) * 2018-12-29 2019-09-17 国家电网有限公司 Power transmission line dynamic monitoring system
CN110197543A (en) * 2019-05-31 2019-09-03 广东电网有限责任公司 A kind of access of computer USB port limitation intelligent lock, system and method
CN110531307A (en) * 2019-09-12 2019-12-03 宁波三星医疗电气股份有限公司 Adjustment method, device and the electric power acquisition terminal of electric power acquisition terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐其武 等: "《煤矿专业基础知识读本 下册》", 31 July 2012, 重庆大学出版社 *
宋增民: "《数字电视原理与应用》", 30 June 2005, 东南大学出版社 *
陈潇潇 等: "《云计算与数据的应用》", 31 October 2018, 延边大学出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182620A (en) * 2020-09-30 2021-01-05 Oppo广东移动通信有限公司 Authorization method, terminal, WEB server and computer storage medium
CN112182620B (en) * 2020-09-30 2024-04-05 Oppo广东移动通信有限公司 Authorization method, terminal, WEB server and computer storage medium
CN115221490A (en) * 2022-09-20 2022-10-21 陕西天视致远航空技术有限公司 Port information reinforcing computer and port information reinforcing method thereof
CN115221490B (en) * 2022-09-20 2024-02-23 陕西天视致远航空技术有限公司 Port information reinforcement computer and port information reinforcement method thereof

Similar Documents

Publication Publication Date Title
EP3101491B1 (en) Security system for industrial control infrastructure
EP3101581B1 (en) Security system for industrial control infrastructure using dynamic signatures
CN101542518B (en) Remote monitoring/diagnosing system
CN101682528B (en) Systems and methods for dynamically configuring node behavior in sensor network
US9544300B2 (en) Method and system for providing device-specific operator data for an automation device in an automation installation
CN104011727A (en) System and method for managing industrial processes
CN111404269A (en) Port-based information interaction method and device and power terminal
CN104199703A (en) Unattended setup management method and device
JP2018014097A (en) Fleet management system for portable maintenance tools
EP3101490B1 (en) Rapid configuration security system for industrial control infrastructure
US10805304B2 (en) Edge server and management server
EP3667526A1 (en) Rapid file authentication on automation devices
CN104765316A (en) Technology of adopting intelligent terminals as human-computer interface of industrial equipment control
US7089155B2 (en) Method for remotely diagnosing process flows in systems
EP3078167B1 (en) Method, secure element and system for monitoring controller area network devices
CN111770100B (en) Method and system for verifying safe access of external equipment to Internet of things terminal
CN109670296A (en) A kind of method and apparatus removing iOS backup password
EP4254870A1 (en) Multi-factor authentication of industrial assets
CN114860508B (en) Backup system and method for firmware of industrial equipment
CA3072749A1 (en) Control system, method and computer program for an automatic milking machine
CN216596008U (en) Site communicator equipment
CN106446698A (en) MTP-based mobile terminal data leakage prevention method
CN103081400A (en) Method for processing messages in a communication network consisting of several network nodes
CN209417588U (en) A kind of PCB serial equipment remote data acquisition warning device
CN117729008A (en) Data security protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200710

RJ01 Rejection of invention patent application after publication