CN113360922A - Automatic configuration method for cloud computing platform of power system - Google Patents

Automatic configuration method for cloud computing platform of power system Download PDF

Info

Publication number
CN113360922A
CN113360922A CN202110609084.9A CN202110609084A CN113360922A CN 113360922 A CN113360922 A CN 113360922A CN 202110609084 A CN202110609084 A CN 202110609084A CN 113360922 A CN113360922 A CN 113360922A
Authority
CN
China
Prior art keywords
file
encrypted
power system
computing platform
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110609084.9A
Other languages
Chinese (zh)
Inventor
李波
李世明
曾坚永
邓大为
林玥廷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Original Assignee
Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd filed Critical Electric Power Dispatch Control Center of Guangdong Power Grid Co Ltd
Priority to CN202110609084.9A priority Critical patent/CN113360922A/en
Publication of CN113360922A publication Critical patent/CN113360922A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The application discloses an automatic configuration method of a power system cloud computing platform, which comprises the following steps: the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored; carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, and judging the accuracy of the encrypted data; uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor; and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.

Description

Automatic configuration method for cloud computing platform of power system
Technical Field
The application relates to an automatic configuration method of a computing platform, in particular to an automatic configuration method of a power system cloud computing platform.
Background
With the continuous enhancement of the functions of the power automation system, the application number is continuously expanded, the system scale is continuously enlarged, and the requirements of the system on the storage and the processing of mass data are higher and higher. Cloud computing technology has relatively mature distributed storage and mass data processing capabilities, and has begun to be applied to power automation systems. Cloud computing systems often consist of a large number of servers clustered to achieve distributed storage and parallel computing. How to enable a system builder to build a cloud computing platform consisting of a plurality of servers in a minimum time is an urgent problem to be solved. As the size of the node expands and the number of applications increases, the installation and stable operation of the system become new challenges.
The traditional automatic configuration method of the computing platform has certain defects, and all computing nodes are independent from each other and inconvenient to work in parallel, so that the automatic configuration efficiency of the computing platform is reduced. Therefore, an automatic configuration method for a cloud computing platform of a power system is provided for solving the above problems.
Content of application
An automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
Further, in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through a data line.
Furthermore, in the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
Further, in the step (2), the encrypted file is segmented so that the length of each segment is approximately the same, and the segments are labeled by natural numbers 1-n.
Further, in the step (2), random number selection is performed according to the segment numbers of the encrypted files, and samples of 40% -60% of the total sample capacity are subjected to spot check, namely 40% -60% of numbers are randomly selected from 001-n for check.
Further, in the step (2), if the decrypted encrypted file is compared with the corresponding part of the original instruction file, the encrypted file is completely deleted, the encryption processing is performed again, and then the segment checking processing is performed.
Furthermore, the original file is stored in the step (1), so that errors occur in the encryption process of the instruction file, the original file stored in the encrypted file is conveniently used for encryption again, the instruction file does not need to be uploaded again, and the working efficiency is improved.
Furthermore, the computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
Further, if one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the remaining computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
Furthermore, the decompression decoding device in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding device copies and stores the instruction files in calculation, so that the instruction files can be uploaded to the distributor conveniently when the calculation nodes are in failure, and the loss of the instruction files is avoided.
The beneficial effect of this application is: the application provides an automatic configuration method of a power system cloud computing platform, which has the functions of conveniently connecting more than two computing nodes in parallel and improving the computing efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flow chart of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
The first embodiment is as follows:
an automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
And (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
In the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
In the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
And (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 40% of the total sample capacity, namely 40% of numbers are randomly selected from 001-n for inspection.
And (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
The original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
The computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
If one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
The decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
The method is suitable for the automatic configuration method of the power system cloud computing platform with large instruction file size for transmitting and controlling the power system.
Example two:
an automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
And (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
In the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
In the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
And (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 60% of the total sample capacity, namely, 60% of numbers are randomly selected from 001-n for inspection.
And (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
The original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
The computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
If one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
The decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
The method is suitable for the automatic configuration method of the power system cloud computing platform with small instruction file space for transmitting and controlling the power system
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An automatic configuration method for a power system cloud computing platform is characterized by comprising the following steps: the automatic configuration method of the power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
2. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
3. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: in the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
4. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: in the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
5. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 40% -60% of the total sample capacity, namely 40% -60% of numbers are randomly selected from 001-n for check.
6. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
7. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
8. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
9. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: if one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
10. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
CN202110609084.9A 2021-06-01 2021-06-01 Automatic configuration method for cloud computing platform of power system Pending CN113360922A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110609084.9A CN113360922A (en) 2021-06-01 2021-06-01 Automatic configuration method for cloud computing platform of power system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110609084.9A CN113360922A (en) 2021-06-01 2021-06-01 Automatic configuration method for cloud computing platform of power system

Publications (1)

Publication Number Publication Date
CN113360922A true CN113360922A (en) 2021-09-07

Family

ID=77530768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110609084.9A Pending CN113360922A (en) 2021-06-01 2021-06-01 Automatic configuration method for cloud computing platform of power system

Country Status (1)

Country Link
CN (1) CN113360922A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697130A (en) * 2022-04-22 2022-07-01 国网安徽省电力有限公司信息通信分公司 Intelligent mobile terminal information security encryption method for power system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075322A (en) * 2010-12-06 2011-05-25 中兴通讯股份有限公司 Storage method and terminal equipment of key parameters
US20130254841A1 (en) * 2012-03-26 2013-09-26 Microsoft Corporation Secure cloud computing platform
WO2020199785A1 (en) * 2019-03-29 2020-10-08 华控清交信息科技(北京)有限公司 Processing method and computing method for private data, and applicable device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075322A (en) * 2010-12-06 2011-05-25 中兴通讯股份有限公司 Storage method and terminal equipment of key parameters
US20130254841A1 (en) * 2012-03-26 2013-09-26 Microsoft Corporation Secure cloud computing platform
WO2020199785A1 (en) * 2019-03-29 2020-10-08 华控清交信息科技(北京)有限公司 Processing method and computing method for private data, and applicable device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697130A (en) * 2022-04-22 2022-07-01 国网安徽省电力有限公司信息通信分公司 Intelligent mobile terminal information security encryption method for power system

Similar Documents

Publication Publication Date Title
US10514971B2 (en) Dispersed b-tree directory trees
US9503513B2 (en) Robust transmission of data utilizing encoded data slices
US20100257228A1 (en) Cloud computing for an industrial automation and manufacturing system
US10437673B2 (en) Internet based shared memory in a distributed computing system
US20130179413A1 (en) Compressed Distributed Storage Systems And Methods For Providing Same
US20220391098A1 (en) Optimizing Access Performance in a Distributed Storage Network
US20190266109A1 (en) Priority level adaptation in a dispersed storage network
US11811532B2 (en) Dynamically processing data in a vast data ingestion system
CN105718578A (en) Short link generation method and device
US20230004505A1 (en) Generating Messages with Priorities in a Storage Network
CN113360922A (en) Automatic configuration method for cloud computing platform of power system
US20190288967A1 (en) Lossy text source coding by word length
CN102904922A (en) Systems and methods of distributed file storage
CN111444017A (en) Multimedia data processing method, device and system, electronic equipment and storage medium
US10769016B2 (en) Storing a plurality of correlated data in a dispersed storage network
CN108960378B (en) Data downloading method, system, device and storage medium
US10496480B2 (en) Slice location identification
US20160036563A1 (en) Distributed reed-solomon codes for simple multiple access networks
US20190158595A1 (en) Predictive rebalancing according to future usage expectations
Zhou et al. Boosting Erasure-Coded Multi-Stripe Repair in Rack Architecture and Heterogeneous Clusters: Design and Analysis
CN111144495B (en) Service distribution method, device and medium
US10476961B2 (en) Changing rebuild priority for a class of data
CN104954280A (en) Data message processing method and device
US10503592B2 (en) Overcoming bottlenecks in partial and traditional rebuild operations
CN105677368B (en) A method of it promoting Operation Network communication equipment the whole network and upgrades efficiency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination