CN112231754B - Method, system and storage medium for monitoring configuration information of power edge computing node - Google Patents

Method, system and storage medium for monitoring configuration information of power edge computing node Download PDF

Info

Publication number
CN112231754B
CN112231754B CN202011133460.3A CN202011133460A CN112231754B CN 112231754 B CN112231754 B CN 112231754B CN 202011133460 A CN202011133460 A CN 202011133460A CN 112231754 B CN112231754 B CN 112231754B
Authority
CN
China
Prior art keywords
configuration information
edge computing
node
power edge
computing node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011133460.3A
Other languages
Chinese (zh)
Other versions
CN112231754A (en
Inventor
蒋屹新
张宇南
许爱东
匡晓云
周保荣
徐培明
谢平平
黄开天
冯玉仙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CSG Electric Power Research Institute
Original Assignee
CSG Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CSG Electric Power Research Institute filed Critical CSG Electric Power Research Institute
Priority to CN202011133460.3A priority Critical patent/CN112231754B/en
Publication of CN112231754A publication Critical patent/CN112231754A/en
Application granted granted Critical
Publication of CN112231754B publication Critical patent/CN112231754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for monitoring configuration information of a power edge computing node, which comprises the following steps: when the power edge computing node learns that the configuration information of the power edge computing node is changed, the power edge computing node judges the validity of the change, generates secret uplink information and sends an uplink request containing the secret uplink information to a block building node when the change is legal, and the block building node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value and updates the new configuration information block chain into the block node; and when the change is illegal, the power edge computing node acquires and checks the stored configuration information and the current configuration information, and when the check result is not matched, the current configuration information is corrected according to the stored configuration information. The embodiment of the invention also provides a power edge computing node configuration information monitoring system and a storage medium, which can effectively improve the monitoring convenience and disaster tolerance of the power edge node configuration information.

Description

Method, system and storage medium for monitoring configuration information of power edge computing node
Technical Field
The invention relates to the technical field of power edge computing networks, in particular to a method, a system and a storage medium for monitoring configuration information of a power edge computing node.
Background
The edge computing emerging in recent years provides a new mode for the development of the power universe internet of things. However, the extent and difficulty of access control and threat prevention of the power edge network system are greatly improved. At present, most of power edge computing node configuration information management adopts an isolated management mode, the mode has large configuration workload, low network system robustness, poor disaster tolerance and low overall safety, and the requirements of large-scale cross-domain edge computing node monitoring of a power global Internet of things on safety, reliability and disaster tolerance cannot be gradually met.
Disclosure of Invention
Embodiments of the present invention provide a method, a system, and a storage medium for monitoring configuration information of a power edge computing node, which can effectively improve efficiency and security of monitoring configuration information of the power edge computing node, thereby improving convenience, reliability, and disaster tolerance of monitoring configuration information of the power edge computing node.
In order to achieve the above object, an embodiment of the present invention provides a method for monitoring configuration information of a power edge computing node, including:
when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the legality of the change of the configuration information of the power edge computing node;
when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node sends a configuration information uplink request containing the secret uplink information to the building block node;
the block building node performs hash calculation on the confidential uplink information, generates a new configuration information block chain according to a hash value and updates the new configuration information block chain into the block node;
when the change is illegal, the electric power edge computing node reads the hash value in the configuration information block chain and decrypts the hash value to obtain the stored configuration information of the electric power edge computing node;
the power edge computing node reads the current configuration information of the node;
the power edge computing node checks the saved configuration information of the power edge computing node with the current configuration information;
and when the checking result is not matched, the power edge computing node corrects the current configuration information according to the stored power edge computing node configuration information.
As an improvement of the above scheme, when the power edge computing node learns that its configuration information changes, it generates encrypted secret uplink information, specifically:
forming tree list information according to system settings, recording corresponding administrators and generation time before and after the configuration information of the power edge computing nodes is changed, and generating a configuration information file;
compressing the configuration information file by adopting an LZW algorithm;
and encrypting the compressed configuration information file to generate the secret uplink information.
As an improvement of the above scheme, the block node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, specifically:
and carrying out hash calculation on the confidential uplink information to generate a hash value, storing the hash value to form a new configuration information block chain, calculating all alternative node addresses which can be backed up by a consistent hash algorithm, and sending the hash value to the alternative nodes so that the alternative nodes form the new configuration information block chain according to the hash value and update and store the new configuration information block chain to the nodes of the nodes, wherein the block nodes except the block building nodes are alternative nodes.
As an improvement of the above solution, the method for monitoring configuration information of a power edge computing node further includes:
and when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain, and displays the hash value and the current configuration information for manual correction.
The embodiment of the invention also provides a power edge computing node configuration information monitoring system, which comprises a power edge computing node; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node is used for generating encrypted secret uplink information when the configuration information of the power edge computing node is changed;
the power edge computing node is further configured to send a configuration information uplink request including the secure uplink information to the building block node;
and the block building node is used for carrying out hash calculation on the secret uplink information, generating a new configuration information block chain according to a hash value and updating the new configuration information block chain into the block node.
The embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium includes a stored computer program, and when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the method for monitoring configuration information of a power edge computing node in any of the foregoing embodiments.
Compared with the prior art, the power edge computing node encrypts the legally changed configuration information to generate the secret uplink information, sends the configuration information uplink request containing the secret uplink information to the block building node, performs hash calculation on the secret uplink information by the block building node, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, so that the reliability and the convenience of configuration information monitoring are improved. The configuration information is updated and stored in the block node after being encrypted for the second time, so that the configuration information is difficult to tamper due to a plurality of backups while the leakage of the configuration information is avoided, and the safety is greatly improved; and all the configuration information is stored in the block nodes, so that the difficulty in checking the configuration information of the power edge computing nodes is greatly reduced, and the convenience and disaster tolerance of monitoring the configuration information of the large-scale cross-domain power edge computing nodes are improved.
Drawings
Fig. 1 is a schematic flowchart of a method for monitoring configuration information of a power edge computing node in embodiment 1 of the present invention.
Fig. 2 is a schematic structural diagram of a power edge computing node configuration information monitoring system in embodiment 2 of the present invention.
Fig. 3 is a schematic structural diagram of a power edge computing node configuration information monitoring system according to embodiment 3 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of a method for monitoring configuration information of a power edge computing node according to embodiment 1 of the present invention. The configuration information monitoring method provided in embodiment 1 of the present invention includes steps S110 to S180.
S110, when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the validity of the change of the configuration information of the power edge computing node;
s120, when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain.
It can be understood that the number of the block nodes is less than or equal to the number of the block nodes, the number of the block nodes is less than or equal to the number of the power edge calculation nodes, and the number of the block nodes can be two or more, so that the beneficial effect of the invention is not influenced;
in this embodiment, by setting the index parameters of the block nodes, the power edge calculation nodes with block chain calculation capability are selected as the block nodes and the building block nodes by using the authorized byzantine fault-tolerant algorithm.
The specific process of the power edge computing node acquiring the change of the configuration information of the power edge computing node can be that the change of the configuration information of the power edge computing node triggers a recording program, the recording program provides a 'save' button and save detection during exit, when the recording program detects that the save is finished, a save completion prompt is sent and a generation command is triggered, when the recording program detects that the save is not finished, a non-save prompt is sent, whether a save window is used or not is popped up, when the save is cancelled, the change record content is deleted and the exit is carried out, and when the save is selected, the generation command is triggered;
when the power edge computing node receives a command, tree list information is formed according to system settings, corresponding administrators and generation time before and after the configuration information of the node is changed are recorded, a configuration information file is generated, an LZW algorithm is adopted to compress the configuration information file, the compressed configuration information file is encrypted, and secret uplink information is generated, wherein the tree list information can also record corresponding node identity information.
S130, the electric power edge computing node sends an uplink configuration information request containing the secret uplink information to the building block node.
S140, the block building node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value and updates the block chain into the block node.
Specifically, the building block node receives a configuration information uplink request, performs hash calculation on the secret uplink information according to the uplink request, generates a hash value, stores the hash value and forms a new configuration information block chain, calculates all backup alternative node addresses through a consistent hash algorithm, sends the hash value and the power edge node corresponding to the hash value to the alternative node, forms a new configuration information block chain according to the received hash value, updates and stores the new configuration information block chain in the node, wherein the block node other than the building block node is the alternative node.
Furthermore, the power edge computing node configuration information monitoring method further comprises configuration information proofreading, and when the power edge computing node configuration information is tampered due to the fact that the system is attacked, the tampered information can be corrected through the configuration information proofreading.
In a preferred embodiment, the configuration information verification may be performed by the power edge computing node by a system auto-verification, including steps S150 to S180.
And S150, when the configuration information is illegally changed, reading the hash value in the block chain of the configuration information and decrypting the hash value to obtain the configuration information stored in the block chain.
And S160, reading the current configuration information of the node.
S170, the configuration information stored in the block chain is checked with the current configuration information.
And S180, when the check results are not matched, correcting the current configuration information according to the stored power edge computing node configuration information.
Optionally, the configuration information may also be checked by automatic timing detection, and the power edge calculation node may read the hash value stored by the blocking node from the blocking node.
Optionally, the configuration information checking may also be performed by the block node.
In another preferred embodiment, the configuration information collation may also be: when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain according to the access request, generates Excel or displays the acquired hash value and the current configuration information through a pop-up window for manual correction.
Fig. 2 is a schematic structural diagram of a power edge computing node configuration information monitoring system according to embodiment 2 of the present invention. The power edge computing node configuration information monitoring system 20 provided in embodiment 2 of the present invention includes a power edge computing node 21, block nodes 22, and building block nodes 23, where the power edge computing node 21 includes at least one block node 22, the block nodes include at least one building block node 23, and all the block nodes form a configuration information block chain.
The power edge computing node 21 is used for judging the validity of the configuration information change when the change of the configuration information of the power edge computing node is known; the power edge computing node 21 is further configured to generate encrypted secret uplink information when the configuration information is changed legally; the power edge computing node 21 is further configured to send a configuration information uplink request including the secret uplink information to a building block node 23; the block building node 23 is used for performing hash calculation on the secret uplink information, generating a new configuration information block chain according to the hash value and updating the new configuration information block chain into the block node 22; the power edge computing node 21 is further configured to, when the change is illegal, read a hash value in the configuration information block chain, and decrypt the hash value to obtain stored power edge computing node configuration information; the power edge computing node 21 is further configured to read current configuration information of the node itself; the power edge computing node 21 is further configured to check the stored configuration information of the power edge computing node and the current configuration information; the power edge computing node 21 is further configured to, when the check result does not match, correct the current configuration information according to the stored configuration information of the power edge computing node.
The working process of the configuration information monitoring system 20 is the configuration information monitoring method described in embodiment 1, and details are not described here.
Fig. 3 is a schematic structural diagram of a power edge computing node configuration information monitoring system 30 according to an embodiment of the present invention. The configuration information monitoring system 30 of this embodiment includes: a processor 31, a memory 32, and a computer program, such as a power edge compute node configuration information monitor, stored in the memory 32 and operable on the processor. The processor 31 implements the steps in the above-described respective configuration information monitoring method embodiments when executing the computer program. Alternatively, the processor implements the functions of the nodes in the system embodiments described above when executing the computer program.
The configuration information monitoring system 30 may be a computing device such as an electric power intelligent terminal, a computer, and a cloud server. The configuration information monitoring system 30 may include, but is not limited to, a processor 31, a memory 32. It will be appreciated by those skilled in the art that the schematic diagram is merely an example of a configuration information monitoring system and is not intended to limit configuration information monitoring system 30.
The processor 31 may be a Central Processing Unit (CPU), or may be other general-purpose processor, a digital signal processor, an application specific integrated circuit, an off-the-shelf programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, and the processor 31 is the control center of the configuration information monitoring system 30, and various interfaces and lines are used to connect the various parts of the overall configuration information monitoring system 30.
The memory 32 may be used to store the computer program, and the processor 31 may implement various functions of the configuration information monitoring system 30 by executing or executing the computer program stored in the memory 32 and calling data stored in the memory 32. The memory 32 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system and the like; the storage data area may store configuration information of the power edge calculation node, and the like. Further, the memory 32 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The nodes in the configuration information monitoring system 30 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as independent products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U.S. disk, removable hard disk, magnetic diskette, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signal, telecommunications signal, and software distribution medium, etc.
The method, the system and the readable storage medium for monitoring the configuration information of the power edge computing node disclosed by the embodiment of the invention adopt the idea of the block chain, the block chain is a novel application mode integrating the technologies of distributed storage, point-to-point transmission, a common identification mechanism, an encryption algorithm and the like, and from the application perspective, the block chain is a distributed shared account book and a database and has the characteristics of decentralization, no falsification, whole-course trace retention, traceability, collective maintenance, openness and transparency and the like. By utilizing the characteristics of the block chain, a decentering, secrecy and non-tampering storage and management mode can be provided for the monitoring of the configuration information of the power edge computing node, and the safety, reliability and disaster tolerance of the monitoring of the power edge computing node are improved. Detecting whether the configuration information of the power edge computing node is changed or not by a recording program, sending a storage completion prompt and triggering a generation command when the completion of storage is detected, sending an unsaved prompt when the incomplete storage is detected by the recording program, popping up a storage window, deleting the content of a change record and quitting when the storage is cancelled, and triggering the generation command when the storage is selected, so that the problem that when the configuration information of the power edge computing node is legally changed, the change information is not stored due to misoperation, and the block node cannot record accurate configuration information can be avoided; when the power edge computing node receives a command, tree list information is formed according to system settings, corresponding administrators and generation time before and after the configuration information of the node is changed are recorded, a configuration information file is generated, the configuration information file is compressed through an LZW algorithm, the calculation amount is reduced for subsequent encryption, the compressed configuration information file is encrypted, secret uplink information is generated, the configuration information is prevented from being leaked, a building block node performs Hash calculation on the secret uplink information, the configuration information is stored by adopting shorter information, the waste of resources is reduced, and a reverse rule is difficult to find; and generating a new configuration information block chain according to the hash value and updating the new configuration information block chain into the block node so as to improve the reliability and convenience of configuration information monitoring. The configuration information is updated and stored in the block node after being encrypted for the second time, so that the configuration information is difficult to tamper due to a plurality of backups while the configuration information is prevented from being leaked, and the safety is greatly improved; and all the configuration information is stored in the block nodes, so that the difficulty in checking the configuration information of the power edge computing nodes is greatly reduced, and the convenience and disaster tolerance of monitoring the configuration information of the large-scale cross-domain power edge computing nodes are improved.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (6)

1. A power edge computing node configuration information monitoring method is characterized by comprising the following steps:
when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the legality of the change of the configuration information of the power edge computing node;
when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node sends a configuration information uplink request containing the secret uplink information to the building block node;
the block building node performs hash calculation on the confidential uplink information, generates a new configuration information block chain according to a hash value and updates the new configuration information block chain into the block node;
when the change is illegal, the electric power edge computing node reads the hash value in the configuration information block chain and decrypts the hash value to obtain the stored configuration information of the electric power edge computing node;
the power edge computing node reads the current configuration information of the node;
the power edge computing node checks the saved power edge computing node configuration information with the current configuration information;
and when the checking result is not matched, the power edge computing node corrects the current configuration information according to the stored power edge computing node configuration information.
2. The method as claimed in claim 1, wherein the step of generating an encrypted private uplink message by the PE computing node when the change is valid comprises:
forming tree list information according to system settings, recording corresponding administrators and generation time before and after the configuration information of the power edge computing nodes is changed, and generating a configuration information file;
compressing the configuration information file by adopting an LZW algorithm;
and encrypting the compressed configuration information file to generate the secret uplink information.
3. The method as claimed in claim 1, wherein the block node performs hash calculation on the secured uplink information, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, specifically:
and carrying out hash calculation on the confidential uplink information to generate a hash value, storing the hash value to form a new configuration information block chain, calculating all alternative node addresses which can be backed up by a consistent hash algorithm, and sending the hash value to the alternative nodes so that the alternative nodes form the new configuration information block chain according to the hash value and update and store the new configuration information block chain to the nodes of the nodes, wherein the block nodes except the block building nodes are alternative nodes.
4. The power edge compute node configuration information monitoring method of claim 1 further comprising:
and when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain, and displays the hash value and the current configuration information for manual correction.
5. A power edge computing node configuration information monitoring system is characterized by comprising power edge computing nodes; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node is used for judging the validity of the change of the configuration information when the change of the configuration information is acquired;
the power edge computing node is further configured to generate encrypted private uplink information when the change is legitimate;
the power edge computing node is further configured to send a configuration information uplink request including the secure uplink information to the block building node;
the block building node is used for carrying out hash calculation on the secret uplink information, generating a new configuration information block chain according to a hash value and updating the new configuration information block chain into the block node;
the power edge computing node is further configured to, when the change is illegal, read the hash value in the configuration information block chain, and decrypt the hash value to obtain the stored configuration information of the power edge computing node;
the power edge computing node is also used for reading the current configuration information of the node per se;
the power edge computing node is further configured to check the saved configuration information of the power edge computing node and the current configuration information;
and the power edge computing node is also used for correcting the current configuration information according to the stored configuration information of the power edge computing node when the checking result is not matched.
6. A computer-readable storage medium, comprising a stored computer program, wherein the computer program when executed controls an apparatus in which the computer-readable storage medium is located to perform the power edge computing node configuration information monitoring method according to any one of claims 1 to 4.
CN202011133460.3A 2020-10-21 2020-10-21 Method, system and storage medium for monitoring configuration information of power edge computing node Active CN112231754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011133460.3A CN112231754B (en) 2020-10-21 2020-10-21 Method, system and storage medium for monitoring configuration information of power edge computing node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011133460.3A CN112231754B (en) 2020-10-21 2020-10-21 Method, system and storage medium for monitoring configuration information of power edge computing node

Publications (2)

Publication Number Publication Date
CN112231754A CN112231754A (en) 2021-01-15
CN112231754B true CN112231754B (en) 2022-12-06

Family

ID=74108971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011133460.3A Active CN112231754B (en) 2020-10-21 2020-10-21 Method, system and storage medium for monitoring configuration information of power edge computing node

Country Status (1)

Country Link
CN (1) CN112231754B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114661231B (en) * 2022-02-18 2023-08-11 南京南瑞继保电气有限公司 Storage synchronization method and device for parameter change records of power grid monitoring master station system
CN117939572B (en) * 2024-03-25 2024-05-28 国网江苏省电力有限公司 Electric power Internet of things terminal access method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107104816A (en) * 2017-03-07 2017-08-29 阿里巴巴集团控股有限公司 A kind of information change monitoring method and device
CN108809630A (en) * 2018-06-19 2018-11-13 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of testament store method, system, equipment and computer readable storage medium
CN109242299A (en) * 2018-08-31 2019-01-18 深圳付贝科技有限公司 Distribution digs mine method, digs mine machine and block catenary system
CN111125020A (en) * 2019-12-20 2020-05-08 西安翻译学院 Block chain-based information security management method, system and server
CN111382463B (en) * 2020-04-02 2022-11-29 中国工商银行股份有限公司 Block chain system and method based on stream data

Also Published As

Publication number Publication date
CN112231754A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN109412812B (en) Data security processing system, method, device and storage medium
CN111262701A (en) Replay attack detection method, system, equipment and storage medium
CN112231754B (en) Method, system and storage medium for monitoring configuration information of power edge computing node
CN109447809B (en) Video active identification method combined with block chain
CN107920052B (en) Encryption method and intelligent device
CN111130798B (en) Request authentication method and related equipment
CN113569266B (en) Host remote monitoring method based on chip level privacy calculation
CN113378119B (en) Software authorization method, device, equipment and storage medium
CN111585995B (en) Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN114257376B (en) Digital certificate updating method, device, computer equipment and storage medium
CN111814132B (en) Security authentication method and device, security authentication chip and storage medium
CN108833133B (en) Network configuration management method and device based on cloud computing network and storage medium
CN108650261A (en) Mobile terminal system software method for burn-recording based on remote encryption interaction
CN108540447B (en) Block chain-based certificate verification method and system
CN113395406B (en) Encryption authentication method and system based on power equipment fingerprint
CN111600701B (en) Private key storage method, device and storage medium based on blockchain
CN110233828B (en) Mobile office method and device based on block chain
CN109302442B (en) Data storage proving method and related equipment
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN115567200A (en) http interface anti-brush method, system and related device
CN108880785B (en) Method, device, terminal and readable medium for detecting C + + virtual table quilt hook
CN108228219B (en) Method and device for verifying BIOS validity during in-band refreshing of BIOS
CN110933047A (en) Network authentication information security verification method, device, medium and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant