CN112231754B - Method, system and storage medium for monitoring configuration information of power edge computing node - Google Patents
Method, system and storage medium for monitoring configuration information of power edge computing node Download PDFInfo
- Publication number
- CN112231754B CN112231754B CN202011133460.3A CN202011133460A CN112231754B CN 112231754 B CN112231754 B CN 112231754B CN 202011133460 A CN202011133460 A CN 202011133460A CN 112231754 B CN112231754 B CN 112231754B
- Authority
- CN
- China
- Prior art keywords
- configuration information
- edge computing
- node
- power edge
- computing node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000008859 change Effects 0.000 claims abstract description 24
- 238000004364 calculation method Methods 0.000 claims abstract description 20
- 238000004590 computer program Methods 0.000 claims description 14
- 238000004422 calculation algorithm Methods 0.000 claims description 9
- 238000012937 correction Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 5
- 230000006872 improvement Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001915 proofreading effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for monitoring configuration information of a power edge computing node, which comprises the following steps: when the power edge computing node learns that the configuration information of the power edge computing node is changed, the power edge computing node judges the validity of the change, generates secret uplink information and sends an uplink request containing the secret uplink information to a block building node when the change is legal, and the block building node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value and updates the new configuration information block chain into the block node; and when the change is illegal, the power edge computing node acquires and checks the stored configuration information and the current configuration information, and when the check result is not matched, the current configuration information is corrected according to the stored configuration information. The embodiment of the invention also provides a power edge computing node configuration information monitoring system and a storage medium, which can effectively improve the monitoring convenience and disaster tolerance of the power edge node configuration information.
Description
Technical Field
The invention relates to the technical field of power edge computing networks, in particular to a method, a system and a storage medium for monitoring configuration information of a power edge computing node.
Background
The edge computing emerging in recent years provides a new mode for the development of the power universe internet of things. However, the extent and difficulty of access control and threat prevention of the power edge network system are greatly improved. At present, most of power edge computing node configuration information management adopts an isolated management mode, the mode has large configuration workload, low network system robustness, poor disaster tolerance and low overall safety, and the requirements of large-scale cross-domain edge computing node monitoring of a power global Internet of things on safety, reliability and disaster tolerance cannot be gradually met.
Disclosure of Invention
Embodiments of the present invention provide a method, a system, and a storage medium for monitoring configuration information of a power edge computing node, which can effectively improve efficiency and security of monitoring configuration information of the power edge computing node, thereby improving convenience, reliability, and disaster tolerance of monitoring configuration information of the power edge computing node.
In order to achieve the above object, an embodiment of the present invention provides a method for monitoring configuration information of a power edge computing node, including:
when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the legality of the change of the configuration information of the power edge computing node;
when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node sends a configuration information uplink request containing the secret uplink information to the building block node;
the block building node performs hash calculation on the confidential uplink information, generates a new configuration information block chain according to a hash value and updates the new configuration information block chain into the block node;
when the change is illegal, the electric power edge computing node reads the hash value in the configuration information block chain and decrypts the hash value to obtain the stored configuration information of the electric power edge computing node;
the power edge computing node reads the current configuration information of the node;
the power edge computing node checks the saved configuration information of the power edge computing node with the current configuration information;
and when the checking result is not matched, the power edge computing node corrects the current configuration information according to the stored power edge computing node configuration information.
As an improvement of the above scheme, when the power edge computing node learns that its configuration information changes, it generates encrypted secret uplink information, specifically:
forming tree list information according to system settings, recording corresponding administrators and generation time before and after the configuration information of the power edge computing nodes is changed, and generating a configuration information file;
compressing the configuration information file by adopting an LZW algorithm;
and encrypting the compressed configuration information file to generate the secret uplink information.
As an improvement of the above scheme, the block node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, specifically:
and carrying out hash calculation on the confidential uplink information to generate a hash value, storing the hash value to form a new configuration information block chain, calculating all alternative node addresses which can be backed up by a consistent hash algorithm, and sending the hash value to the alternative nodes so that the alternative nodes form the new configuration information block chain according to the hash value and update and store the new configuration information block chain to the nodes of the nodes, wherein the block nodes except the block building nodes are alternative nodes.
As an improvement of the above solution, the method for monitoring configuration information of a power edge computing node further includes:
and when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain, and displays the hash value and the current configuration information for manual correction.
The embodiment of the invention also provides a power edge computing node configuration information monitoring system, which comprises a power edge computing node; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node is used for generating encrypted secret uplink information when the configuration information of the power edge computing node is changed;
the power edge computing node is further configured to send a configuration information uplink request including the secure uplink information to the building block node;
and the block building node is used for carrying out hash calculation on the secret uplink information, generating a new configuration information block chain according to a hash value and updating the new configuration information block chain into the block node.
The embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium includes a stored computer program, and when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the method for monitoring configuration information of a power edge computing node in any of the foregoing embodiments.
Compared with the prior art, the power edge computing node encrypts the legally changed configuration information to generate the secret uplink information, sends the configuration information uplink request containing the secret uplink information to the block building node, performs hash calculation on the secret uplink information by the block building node, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, so that the reliability and the convenience of configuration information monitoring are improved. The configuration information is updated and stored in the block node after being encrypted for the second time, so that the configuration information is difficult to tamper due to a plurality of backups while the leakage of the configuration information is avoided, and the safety is greatly improved; and all the configuration information is stored in the block nodes, so that the difficulty in checking the configuration information of the power edge computing nodes is greatly reduced, and the convenience and disaster tolerance of monitoring the configuration information of the large-scale cross-domain power edge computing nodes are improved.
Drawings
Fig. 1 is a schematic flowchart of a method for monitoring configuration information of a power edge computing node in embodiment 1 of the present invention.
Fig. 2 is a schematic structural diagram of a power edge computing node configuration information monitoring system in embodiment 2 of the present invention.
Fig. 3 is a schematic structural diagram of a power edge computing node configuration information monitoring system according to embodiment 3 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of a method for monitoring configuration information of a power edge computing node according to embodiment 1 of the present invention. The configuration information monitoring method provided in embodiment 1 of the present invention includes steps S110 to S180.
S110, when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the validity of the change of the configuration information of the power edge computing node;
s120, when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain.
It can be understood that the number of the block nodes is less than or equal to the number of the block nodes, the number of the block nodes is less than or equal to the number of the power edge calculation nodes, and the number of the block nodes can be two or more, so that the beneficial effect of the invention is not influenced;
in this embodiment, by setting the index parameters of the block nodes, the power edge calculation nodes with block chain calculation capability are selected as the block nodes and the building block nodes by using the authorized byzantine fault-tolerant algorithm.
The specific process of the power edge computing node acquiring the change of the configuration information of the power edge computing node can be that the change of the configuration information of the power edge computing node triggers a recording program, the recording program provides a 'save' button and save detection during exit, when the recording program detects that the save is finished, a save completion prompt is sent and a generation command is triggered, when the recording program detects that the save is not finished, a non-save prompt is sent, whether a save window is used or not is popped up, when the save is cancelled, the change record content is deleted and the exit is carried out, and when the save is selected, the generation command is triggered;
when the power edge computing node receives a command, tree list information is formed according to system settings, corresponding administrators and generation time before and after the configuration information of the node is changed are recorded, a configuration information file is generated, an LZW algorithm is adopted to compress the configuration information file, the compressed configuration information file is encrypted, and secret uplink information is generated, wherein the tree list information can also record corresponding node identity information.
S130, the electric power edge computing node sends an uplink configuration information request containing the secret uplink information to the building block node.
S140, the block building node performs hash calculation on the secret uplink information, generates a new configuration information block chain according to the hash value and updates the block chain into the block node.
Specifically, the building block node receives a configuration information uplink request, performs hash calculation on the secret uplink information according to the uplink request, generates a hash value, stores the hash value and forms a new configuration information block chain, calculates all backup alternative node addresses through a consistent hash algorithm, sends the hash value and the power edge node corresponding to the hash value to the alternative node, forms a new configuration information block chain according to the received hash value, updates and stores the new configuration information block chain in the node, wherein the block node other than the building block node is the alternative node.
Furthermore, the power edge computing node configuration information monitoring method further comprises configuration information proofreading, and when the power edge computing node configuration information is tampered due to the fact that the system is attacked, the tampered information can be corrected through the configuration information proofreading.
In a preferred embodiment, the configuration information verification may be performed by the power edge computing node by a system auto-verification, including steps S150 to S180.
And S150, when the configuration information is illegally changed, reading the hash value in the block chain of the configuration information and decrypting the hash value to obtain the configuration information stored in the block chain.
And S160, reading the current configuration information of the node.
S170, the configuration information stored in the block chain is checked with the current configuration information.
And S180, when the check results are not matched, correcting the current configuration information according to the stored power edge computing node configuration information.
Optionally, the configuration information may also be checked by automatic timing detection, and the power edge calculation node may read the hash value stored by the blocking node from the blocking node.
Optionally, the configuration information checking may also be performed by the block node.
In another preferred embodiment, the configuration information collation may also be: when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain according to the access request, generates Excel or displays the acquired hash value and the current configuration information through a pop-up window for manual correction.
Fig. 2 is a schematic structural diagram of a power edge computing node configuration information monitoring system according to embodiment 2 of the present invention. The power edge computing node configuration information monitoring system 20 provided in embodiment 2 of the present invention includes a power edge computing node 21, block nodes 22, and building block nodes 23, where the power edge computing node 21 includes at least one block node 22, the block nodes include at least one building block node 23, and all the block nodes form a configuration information block chain.
The power edge computing node 21 is used for judging the validity of the configuration information change when the change of the configuration information of the power edge computing node is known; the power edge computing node 21 is further configured to generate encrypted secret uplink information when the configuration information is changed legally; the power edge computing node 21 is further configured to send a configuration information uplink request including the secret uplink information to a building block node 23; the block building node 23 is used for performing hash calculation on the secret uplink information, generating a new configuration information block chain according to the hash value and updating the new configuration information block chain into the block node 22; the power edge computing node 21 is further configured to, when the change is illegal, read a hash value in the configuration information block chain, and decrypt the hash value to obtain stored power edge computing node configuration information; the power edge computing node 21 is further configured to read current configuration information of the node itself; the power edge computing node 21 is further configured to check the stored configuration information of the power edge computing node and the current configuration information; the power edge computing node 21 is further configured to, when the check result does not match, correct the current configuration information according to the stored configuration information of the power edge computing node.
The working process of the configuration information monitoring system 20 is the configuration information monitoring method described in embodiment 1, and details are not described here.
Fig. 3 is a schematic structural diagram of a power edge computing node configuration information monitoring system 30 according to an embodiment of the present invention. The configuration information monitoring system 30 of this embodiment includes: a processor 31, a memory 32, and a computer program, such as a power edge compute node configuration information monitor, stored in the memory 32 and operable on the processor. The processor 31 implements the steps in the above-described respective configuration information monitoring method embodiments when executing the computer program. Alternatively, the processor implements the functions of the nodes in the system embodiments described above when executing the computer program.
The configuration information monitoring system 30 may be a computing device such as an electric power intelligent terminal, a computer, and a cloud server. The configuration information monitoring system 30 may include, but is not limited to, a processor 31, a memory 32. It will be appreciated by those skilled in the art that the schematic diagram is merely an example of a configuration information monitoring system and is not intended to limit configuration information monitoring system 30.
The processor 31 may be a Central Processing Unit (CPU), or may be other general-purpose processor, a digital signal processor, an application specific integrated circuit, an off-the-shelf programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, and the processor 31 is the control center of the configuration information monitoring system 30, and various interfaces and lines are used to connect the various parts of the overall configuration information monitoring system 30.
The memory 32 may be used to store the computer program, and the processor 31 may implement various functions of the configuration information monitoring system 30 by executing or executing the computer program stored in the memory 32 and calling data stored in the memory 32. The memory 32 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system and the like; the storage data area may store configuration information of the power edge calculation node, and the like. Further, the memory 32 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The nodes in the configuration information monitoring system 30 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as independent products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U.S. disk, removable hard disk, magnetic diskette, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signal, telecommunications signal, and software distribution medium, etc.
The method, the system and the readable storage medium for monitoring the configuration information of the power edge computing node disclosed by the embodiment of the invention adopt the idea of the block chain, the block chain is a novel application mode integrating the technologies of distributed storage, point-to-point transmission, a common identification mechanism, an encryption algorithm and the like, and from the application perspective, the block chain is a distributed shared account book and a database and has the characteristics of decentralization, no falsification, whole-course trace retention, traceability, collective maintenance, openness and transparency and the like. By utilizing the characteristics of the block chain, a decentering, secrecy and non-tampering storage and management mode can be provided for the monitoring of the configuration information of the power edge computing node, and the safety, reliability and disaster tolerance of the monitoring of the power edge computing node are improved. Detecting whether the configuration information of the power edge computing node is changed or not by a recording program, sending a storage completion prompt and triggering a generation command when the completion of storage is detected, sending an unsaved prompt when the incomplete storage is detected by the recording program, popping up a storage window, deleting the content of a change record and quitting when the storage is cancelled, and triggering the generation command when the storage is selected, so that the problem that when the configuration information of the power edge computing node is legally changed, the change information is not stored due to misoperation, and the block node cannot record accurate configuration information can be avoided; when the power edge computing node receives a command, tree list information is formed according to system settings, corresponding administrators and generation time before and after the configuration information of the node is changed are recorded, a configuration information file is generated, the configuration information file is compressed through an LZW algorithm, the calculation amount is reduced for subsequent encryption, the compressed configuration information file is encrypted, secret uplink information is generated, the configuration information is prevented from being leaked, a building block node performs Hash calculation on the secret uplink information, the configuration information is stored by adopting shorter information, the waste of resources is reduced, and a reverse rule is difficult to find; and generating a new configuration information block chain according to the hash value and updating the new configuration information block chain into the block node so as to improve the reliability and convenience of configuration information monitoring. The configuration information is updated and stored in the block node after being encrypted for the second time, so that the configuration information is difficult to tamper due to a plurality of backups while the configuration information is prevented from being leaked, and the safety is greatly improved; and all the configuration information is stored in the block nodes, so that the difficulty in checking the configuration information of the power edge computing nodes is greatly reduced, and the convenience and disaster tolerance of monitoring the configuration information of the large-scale cross-domain power edge computing nodes are improved.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.
Claims (6)
1. A power edge computing node configuration information monitoring method is characterized by comprising the following steps:
when the power edge computing node learns that the configuration information of the power edge computing node is changed, judging the legality of the change of the configuration information of the power edge computing node;
when the change is legal, the power edge computing node generates encrypted secret uplink information; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node sends a configuration information uplink request containing the secret uplink information to the building block node;
the block building node performs hash calculation on the confidential uplink information, generates a new configuration information block chain according to a hash value and updates the new configuration information block chain into the block node;
when the change is illegal, the electric power edge computing node reads the hash value in the configuration information block chain and decrypts the hash value to obtain the stored configuration information of the electric power edge computing node;
the power edge computing node reads the current configuration information of the node;
the power edge computing node checks the saved power edge computing node configuration information with the current configuration information;
and when the checking result is not matched, the power edge computing node corrects the current configuration information according to the stored power edge computing node configuration information.
2. The method as claimed in claim 1, wherein the step of generating an encrypted private uplink message by the PE computing node when the change is valid comprises:
forming tree list information according to system settings, recording corresponding administrators and generation time before and after the configuration information of the power edge computing nodes is changed, and generating a configuration information file;
compressing the configuration information file by adopting an LZW algorithm;
and encrypting the compressed configuration information file to generate the secret uplink information.
3. The method as claimed in claim 1, wherein the block node performs hash calculation on the secured uplink information, generates a new configuration information block chain according to the hash value, and updates the new configuration information block chain into the block node, specifically:
and carrying out hash calculation on the confidential uplink information to generate a hash value, storing the hash value to form a new configuration information block chain, calculating all alternative node addresses which can be backed up by a consistent hash algorithm, and sending the hash value to the alternative nodes so that the alternative nodes form the new configuration information block chain according to the hash value and update and store the new configuration information block chain to the nodes of the nodes, wherein the block nodes except the block building nodes are alternative nodes.
4. The power edge compute node configuration information monitoring method of claim 1 further comprising:
and when a user access request is received, the electric power edge computing node acquires the hash value and the current configuration information in the configuration information block chain, and displays the hash value and the current configuration information for manual correction.
5. A power edge computing node configuration information monitoring system is characterized by comprising power edge computing nodes; the power edge computing node comprises at least one block node, the block node comprises at least one block building node, and all the block nodes form a configuration information block chain;
the power edge computing node is used for judging the validity of the change of the configuration information when the change of the configuration information is acquired;
the power edge computing node is further configured to generate encrypted private uplink information when the change is legitimate;
the power edge computing node is further configured to send a configuration information uplink request including the secure uplink information to the block building node;
the block building node is used for carrying out hash calculation on the secret uplink information, generating a new configuration information block chain according to a hash value and updating the new configuration information block chain into the block node;
the power edge computing node is further configured to, when the change is illegal, read the hash value in the configuration information block chain, and decrypt the hash value to obtain the stored configuration information of the power edge computing node;
the power edge computing node is also used for reading the current configuration information of the node per se;
the power edge computing node is further configured to check the saved configuration information of the power edge computing node and the current configuration information;
and the power edge computing node is also used for correcting the current configuration information according to the stored configuration information of the power edge computing node when the checking result is not matched.
6. A computer-readable storage medium, comprising a stored computer program, wherein the computer program when executed controls an apparatus in which the computer-readable storage medium is located to perform the power edge computing node configuration information monitoring method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011133460.3A CN112231754B (en) | 2020-10-21 | 2020-10-21 | Method, system and storage medium for monitoring configuration information of power edge computing node |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011133460.3A CN112231754B (en) | 2020-10-21 | 2020-10-21 | Method, system and storage medium for monitoring configuration information of power edge computing node |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112231754A CN112231754A (en) | 2021-01-15 |
CN112231754B true CN112231754B (en) | 2022-12-06 |
Family
ID=74108971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011133460.3A Active CN112231754B (en) | 2020-10-21 | 2020-10-21 | Method, system and storage medium for monitoring configuration information of power edge computing node |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112231754B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114661231B (en) * | 2022-02-18 | 2023-08-11 | 南京南瑞继保电气有限公司 | Storage synchronization method and device for parameter change records of power grid monitoring master station system |
CN117939572B (en) * | 2024-03-25 | 2024-05-28 | 国网江苏省电力有限公司 | Electric power Internet of things terminal access method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107104816A (en) * | 2017-03-07 | 2017-08-29 | 阿里巴巴集团控股有限公司 | A kind of information change monitoring method and device |
CN108809630A (en) * | 2018-06-19 | 2018-11-13 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of testament store method, system, equipment and computer readable storage medium |
CN109242299A (en) * | 2018-08-31 | 2019-01-18 | 深圳付贝科技有限公司 | Distribution digs mine method, digs mine machine and block catenary system |
CN111125020A (en) * | 2019-12-20 | 2020-05-08 | 西安翻译学院 | Block chain-based information security management method, system and server |
CN111382463B (en) * | 2020-04-02 | 2022-11-29 | 中国工商银行股份有限公司 | Block chain system and method based on stream data |
-
2020
- 2020-10-21 CN CN202011133460.3A patent/CN112231754B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112231754A (en) | 2021-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111949953B (en) | Identity authentication method, system and device based on block chain and computer equipment | |
CN111262701B (en) | Replay attack detection method, system, equipment and storage medium | |
CN109412812B (en) | Data security processing system, method, device and storage medium | |
US9461995B2 (en) | Terminal, network locking and network unlocking method for same, and storage medium | |
CN113569266B (en) | Host remote monitoring method based on chip level privacy calculation | |
CN112231754B (en) | Method, system and storage medium for monitoring configuration information of power edge computing node | |
CN111814132B (en) | Security authentication method and device, security authentication chip and storage medium | |
CN109447809B (en) | Video active identification method combined with block chain | |
CN107920052B (en) | Encryption method and intelligent device | |
CN113395406B (en) | Encryption authentication method and system based on power equipment fingerprint | |
CN111130798B (en) | Request authentication method and related equipment | |
CN113378119B (en) | Software authorization method, device, equipment and storage medium | |
CN111585995B (en) | Secure wind control information transmission and processing method and device, computer equipment and storage medium | |
CN108833133B (en) | Network configuration management method and device based on cloud computing network and storage medium | |
CN115859267A (en) | Method for safely starting application program, storage control chip and electronic equipment | |
CN108650261A (en) | Mobile terminal system software method for burn-recording based on remote encryption interaction | |
CN108540447B (en) | Block chain-based certificate verification method and system | |
CN111600701B (en) | Private key storage method, device and storage medium based on blockchain | |
CN110233828B (en) | Mobile office method and device based on block chain | |
CN111949996A (en) | Generation method, encryption method, system, device and medium of security private key | |
CN115567200A (en) | http interface anti-brush method, system and related device | |
CN108880785B (en) | Method, device, terminal and readable medium for detecting C + + virtual table quilt hook | |
CN108228219B (en) | Method and device for verifying BIOS validity during in-band refreshing of BIOS | |
CN110933047A (en) | Network authentication information security verification method, device, medium and terminal equipment | |
CN112926956A (en) | Block chain financial payment management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |