CN115276963A - Power grid security management method, system and medium based on intelligent key - Google Patents

Power grid security management method, system and medium based on intelligent key Download PDF

Info

Publication number
CN115276963A
CN115276963A CN202210661024.6A CN202210661024A CN115276963A CN 115276963 A CN115276963 A CN 115276963A CN 202210661024 A CN202210661024 A CN 202210661024A CN 115276963 A CN115276963 A CN 115276963A
Authority
CN
China
Prior art keywords
task
information
handheld terminal
field operation
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210661024.6A
Other languages
Chinese (zh)
Other versions
CN115276963B (en
Inventor
沈鑫
熊峻
谭太洋
徐飞
余恒洁
赵静
游若莎
赵毅涛
何兆磊
林聪�
孙黎敏
方瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Power Grid Co Ltd
Original Assignee
Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Power Grid Co Ltd filed Critical Yunnan Power Grid Co Ltd
Priority to CN202210661024.6A priority Critical patent/CN115276963B/en
Publication of CN115276963A publication Critical patent/CN115276963A/en
Application granted granted Critical
Publication of CN115276963B publication Critical patent/CN115276963B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2209/00Arrangements in telecontrol or telemetry systems
    • H04Q2209/60Arrangements in telecontrol or telemetry systems for transmitting utility meters data, i.e. transmission of data from the reader of the utility meter
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a power grid security management method, a system and a medium based on an intelligent key. The power grid security management method based on the intelligent key comprises the following steps: and if the handheld terminal server receives a task execution result, the handheld terminal server analyzes the task execution result to obtain a task analysis result, files the task analysis result and feeds the task analysis result back to the business application server cluster according to the interface protocol information. By the method, multiple remote interaction with the electric energy meter is not needed, the safety of key updating of the electric energy meter is greatly improved, and the key updating efficiency is improved.

Description

Power grid safety management method, system and medium based on intelligent secret key
Technical Field
The invention relates to the technical field of power grid management, in particular to a power grid safety management method based on an intelligent secret key.
Background
The key management system of the electric energy meter is developed on the basis of the construction of an electric energy metering cost control system, the key of the electric energy meter is taken as an important safety basis, and the key updating process is strictly required to be completed by connecting a detection encryption machine. Under a normal flow, before hanging, the fee-control electric energy meter is connected with a detection encryption machine through metering detection platform software to complete the issuance of a formal key of the electric energy meter, and then the field hanging is carried out. However, for historical reasons, at present, part of cost control electric energy meters are installed on the site without being installed under a secret key of a detection table of a metering center, so that remote cost control functions of remote electricity purchasing, remote switch-on and switch-off and the like of related electric energy meters cannot be realized. In order to solve the technical problem faced at present, network connection can be established between the electric energy meter and the encryption machine so as to remotely update the key of the electric energy meter, however, based on safety considerations, the encryption machine of the master station cannot support key derivation operation, the data volume required to be transmitted in the key updating process is large, one-time key updating needs to be remotely interacted with the electric energy meter for multiple times, the success rate of remote execution is low, and the line bandwidth is occupied, so that hidden dangers exist in the aspects of safety and reliability when the key updating is remotely issued. Therefore, the method in the prior art has the problem that the key of the electric energy meter cannot be safely and efficiently updated.
Disclosure of Invention
This section is for the purpose of summarizing some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. In this section, as well as in the abstract and title of the application, simplifications or omissions may be made to avoid obscuring the purpose of the section, the abstract and the title, and such simplifications or omissions are not intended to limit the scope of the invention.
The present invention has been made in view of the above and/or other problems occurring in the conventional smart key-based grid security management method.
Therefore, the problem to be solved by the present invention is that the key of the electric energy meter cannot be updated safely and efficiently in the prior art.
In order to solve the technical problems, the invention provides the following technical scheme: a power grid safety management method based on an intelligent key comprises the steps that a service application server cluster receives a service processing request, generates field operation information corresponding to the service processing request and sends the field operation information to a handheld terminal server; the handheld terminal server encrypts the field operation information through an intelligent key from an encryption machine to obtain a field operation task; the handheld terminal server sends the field operation task to a corresponding handheld terminal according to a preset distribution rule, and the handheld terminal processes the field operation task, generates a task execution result and uploads the task execution result to the handheld terminal server; after the handheld terminal server receives a task execution result from the handheld terminal, analyzing the task execution result according to the field operation information to obtain a task analysis result and filing the task analysis result; and the handheld terminal server feeds back a task analysis result to the service application server cluster according to preset interface protocol information.
As a preferred scheme of the power grid security management method based on the intelligent key, the method comprises the following steps: the process of obtaining the field operation task comprises the steps that the handheld terminal server sends a key obtaining request to the encryption machine according to the field operation information; the encryption machine generates an intelligent key corresponding to the key acquisition request and feeds the intelligent key back to the handheld terminal server; the handheld terminal server encrypts the work order in the field operation information according to the public key in the intelligent key to obtain encrypted information; and the handheld terminal server integrates the encrypted information and the public key to obtain a corresponding field operation task.
As a preferred scheme of the power grid security management method based on the intelligent key, the method comprises the following steps: the step of sending the field operation task to the corresponding handheld terminal comprises the step of determining a terminal address corresponding to the field operation task according to the distribution rule; and sending the field operation task to the handheld terminal corresponding to the terminal address according to the terminal address.
As a preferred scheme of the power grid security management method based on the intelligent key, the method comprises the following steps: the process of analyzing the task execution result to obtain a task analysis result and filing the task analysis result comprises verifying whether the instruction feedback result in the task execution result is matched or not according to the expected feedback information in the field operation information to obtain a matching analysis result; verifying the field acquisition information in the task execution result according to an information verification rule in the field operation information to obtain a verification analysis result; and combining the matching analysis result and the verification analysis result to be used as the task analysis result and filing.
As a preferred scheme of the power grid security management method based on the intelligent key, the method comprises the following steps: the process that the handheld terminal processes the field operation task, generates a task execution result and uploads the task execution result to the handheld terminal server comprises the steps that after the handheld terminal receives the field operation task, the received field operation task is decrypted according to a preset decryption rule to obtain a corresponding operation task; sending a control instruction to a corresponding electric energy meter according to the operation task and acquiring an instruction feedback result fed back by the electric energy meter according to the control instruction, wherein the control instruction comprises one or more instructions of key issuing, power failure and power restoration and infrared meter reading; acquiring information of the electric energy meter according to the operation task to obtain field acquisition information, wherein the field acquisition information comprises electric energy meter information, a geographic position and longitude and latitude; and generating a corresponding task execution result according to the instruction feedback result and the field acquisition information, and uploading the task execution result to the handheld terminal server.
As a preferred scheme of the power grid security management method based on the intelligent key, the method comprises the following steps: the step of decrypting the received field operation task according to a preset decryption rule to obtain a corresponding operation task comprises the step of generating a corresponding private key according to the decryption rule and a public key in the field operation task; and decrypting the encrypted information in the field operation task according to the private key to obtain the corresponding operation task.
Another objective of the present invention is to provide a power grid security management system based on an intelligent key, so as to solve the problem that the key of the electric energy meter cannot be safely and efficiently updated in the prior art.
In order to solve the technical problems, the invention provides the following technical scheme: a power grid safety management system based on an intelligent key comprises a handheld terminal and a server side, wherein the server side comprises a handheld terminal server, an encryption machine and a business application server cluster, a field operation information sending unit is configured in the business application server cluster, and an encryption unit, a field operation task sending unit, a task analysis result filing unit and a task analysis result feedback unit are configured in the handheld terminal server; the field operation information sending unit is used for generating field operation information corresponding to a service processing request and sending the field operation information to the handheld terminal server if the service processing request is received; the encryption unit is used for encrypting the field operation information through an intelligent key from an encryption machine to obtain a field operation task; the field operation task sending unit is used for sending the field operation task to the corresponding handheld terminal according to a preset distribution rule; the task analysis result filing unit is used for analyzing the task execution result according to the field operation information to obtain a task analysis result and filing the task analysis result if the task execution result from the handheld terminal is received; and the task analysis result feedback unit is used for feeding back a task analysis result to the service application server cluster according to preset interface protocol information.
As a preferred scheme of the intelligent key-based power grid security management system of the present invention, wherein: the handheld terminal comprises an information decryption unit, a processing unit and a processing unit, wherein the information decryption unit is used for decrypting the received field operation task according to a preset decryption rule to obtain a corresponding operation task if the field operation task is received; the instruction feedback result acquisition unit is used for sending a control instruction to the corresponding electric energy meter according to the operation task and acquiring an instruction feedback result fed back by the electric energy meter according to the control instruction, wherein the control instruction comprises one or more instructions of key issuing, power failure and power restoration and infrared meter reading; the field acquisition information acquisition unit is used for acquiring information of the electric energy meter according to the operation task to obtain field acquisition information, and the field acquisition information comprises electric energy meter information, a geographic position and longitude and latitude; and the task execution result uploading unit is used for generating a corresponding task execution result according to the instruction feedback result and the field acquisition information and uploading the corresponding task execution result to the server side.
As a preferred scheme of the intelligent key-based power grid security management system of the present invention, wherein: the handheld terminal comprises a first memory, a first processor and a first computer program stored on the first memory and executable on the first processor; the handheld terminal server comprises a second memory, a second processor and a second computer program which is stored on the second memory and can run on the second processor; the business application server cluster comprises a third memory, a third processor and a third computer program stored on the third memory and operable on the third processor; the first processor executing the first computer program, the second processor executing the second computer program, and the third processor executing the third computer program to collectively implement the smart key-based grid security management method of any of claims 1-6.
It is a further object of the present invention to provide a computer readable storage medium, wherein the computer readable storage medium stores a first computer program, a second computer program or a third computer program, which when executed by a first processor, the second computer program is executed by a second processor and the third computer program is executed by a third processor, together implement the smart key based grid security management method according to any one of claims 1 to 6.
The invention has the beneficial effects that: the utility model provides a power grid safety management method, system and medium based on intelligent secret key, can long-rangely issue the field operation task to handheld terminal, handheld terminal sends control command and carries out information acquisition according to the field operation task and obtains the field acquisition information, uploads the task execution result to the server end, can accomplish whole operations through handheld terminal, need not to carry out many times remote interaction with the electric energy meter, has improved the security of carrying out the key renewal to the electric energy meter by a wide margin, has improved key renewal efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise. Wherein:
fig. 1 is a schematic flowchart of a power grid security management method based on an intelligent key according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of a power grid security management method based on an intelligent key according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a sub-flow in step S2 of the power grid security management method based on an intelligent key according to the embodiment of the present invention;
fig. 4 is a schematic flowchart of a sub-flow in step S3 of the power grid security management method based on the smart key according to the embodiment of the present invention;
fig. 5 is a schematic flowchart of a sub-flow in step S4 of the power grid security management method based on the smart key according to the embodiment of the present invention;
fig. 6 is another schematic flowchart of the power grid security management method based on the smart key in step S3 according to the embodiment of the present invention;
fig. 7 is a schematic flowchart of a sub-process in step S33 of the power grid security management method based on the smart key according to the embodiment of the present invention;
FIG. 8 is a schematic block diagram of a smart key-based grid security management system according to an embodiment of the present invention;
FIG. 9 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention more comprehensible, embodiments accompanying figures of the present invention are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
Furthermore, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Example 1
Referring to fig. 1 to 9, for a first embodiment of the present invention, the embodiment provides a power grid security management method based on an intelligent key, where the method is applied to a power grid security management system, the power grid security management system includes a handheld terminal 100 and a server 200, the server 200 includes a handheld terminal server 201, an encryptor 202, and a service application server cluster 203, the handheld terminal 100 establishes a network connection with the handheld terminal server 201 in the server 200 to implement transmission of data information, the encryptor 202 and the service application server cluster 203 respectively establish a network connection with the handheld terminal server 201 to implement transmission of data information, the method is executed through application software installed in the handheld terminal 100, the handheld terminal server 201, and the service application server cluster 203, the service application server cluster 203 is a server cluster for performing service data processing, the encryptor 202 is a terminal device for generating an intelligent key, the handheld terminal server 201 is a server for managing the handheld terminal, and the handheld terminal server 201 can perform information interactive transmission with the handheld terminal 100. In addition, in this embodiment, only one handheld terminal 100 and the server 200 are illustrated to establish network connection, and in an actual application process, multiple handheld terminals 100 and the server 200 may establish network connection at the same time.
As shown in fig. 1, the smart key-based grid security management method includes the steps of,
s1, the service application server cluster 203 receives a service processing request, generates field operation information corresponding to the service processing request and sends the field operation information to the handheld terminal server 201.
The service application server cluster 203 can be used for processing various service data, a processing server, a GPS clock module, an interface management module and a load balancing module are configured in the service application server cluster 203, a plurality of processing servers can be combined to be used as a server cluster, the GPS clock module is used for unifying system clocks of the processing servers, the interface management module is used for managing interfaces of the processing servers, and the load balancing module is used for unifying processing flows of the processing servers so as to realize load balancing. The enterprise can initiate a business processing request through a marketing system, the business processing request comprises business expansion, measurement and other related businesses needing field operation, after receiving the business processing request, a business application server cluster 203 can generate field operation information corresponding to the business processing request, the business processing request comprises an electric energy meter identification and a business type, the electric energy meter identification is identification information uniquely corresponding to an electric energy meter, the business application server cluster 203 can generate a corresponding work order according to the business type, the work order comprises a plurality of work items, if the business type is measurement, the correspondingly generated work order comprises two work items of infrared and information acquisition, and the work item information and the electric energy meter identification are combined to obtain field operation information and the field operation information is sent to a handheld terminal server 201.
S2, the handheld terminal server 201 encrypts the field operation information through the intelligent key from the encryption machine 202 to obtain a field operation task.
The handheld terminal server 201 may obtain the smart key from the encryptor 202 and encrypt the field operation information, thereby obtaining a field operation task recognizable by the handheld terminal 100.
In one embodiment, as shown in fig. 3, step S2 includes the steps of,
s21, the handheld terminal server 201 sends a key obtaining request to the encryption machine 202 according to the field operation information. The specific handheld terminal server 201 may generate a key acquisition request according to the electric energy meter identifier in the field operation information, and send the key acquisition request to the encryption machine 202.
S22, the encryption device 202 generates an intelligent key corresponding to the key obtaining request and feeds back the intelligent key to the handheld terminal server 201. Specifically, the encryption machine 202 generates a corresponding intelligent key according to the electric energy meter identifier in the key obtaining request, where the intelligent key includes a public key and a private key, and the encryption machine 202 feeds back the generated intelligent key to the handheld terminal server 201.
For example, the encryption engine 202 may randomly generate a 16-ary character string for use as the public key, such as generating a 48-byte 16-ary character string for use as the public key. And carrying out symmetric key session negotiation processing on the public key to obtain a corresponding private key.
S23, the handheld terminal server 201 encrypts the work order in the field operation information according to the public key in the intelligent key to obtain encrypted information.
The handheld terminal server 201 may bind the smart key with the electric energy meter identifier in the field operation information, and subsequently may verify the reported information of the electric energy meter corresponding to the electric energy meter identifier based on the smart key bound with the electric energy meter identifier. The handheld terminal server 201 may encrypt the work order in the field operation information according to the public key, so as to obtain corresponding encrypted information, and the encryption process may be implemented based on a national cryptographic algorithm.
And S24, integrating the encrypted information and the public key by the handheld terminal server 201 to obtain a corresponding field operation task.
The handheld terminal server 201 integrates the encrypted information and the public key to obtain a field operation task. After receiving the field job task, the handheld terminal 100 can execute the processing of the job item in the field job task.
And S3, the handheld terminal server 201 sends the field operation tasks to the corresponding handheld terminals 100 according to preset distribution rules, and the handheld terminals 100 process the field operation tasks, generate task execution results and upload the task execution results to the handheld terminal server 201.
The handheld terminal server 201 is further configured with an allocation rule, which is a specific rule for allocating the field operation task, for example, the allocation rule is divided into a plurality of areas, each area corresponds to one or more handheld terminals 100, each area covers a plurality of electric energy meters, an area to which the electric energy meter belongs corresponding to the electric energy meter identifier of the field operation task is determined as a target area according to the allocation rule, and the field operation task is sent according to the handheld terminal 100 corresponding to the target area.
In one embodiment, as shown in fig. 4, step S30 includes the steps of,
and S31, determining a terminal address corresponding to the field operation task according to the distribution rule.
Specifically, if one handheld terminal 100 corresponds to the target area, the address information of the handheld terminal 100 is determined as the terminal address corresponding to the field operation task. If a plurality of handheld terminals 100 correspond to the target area, the address information of one handheld terminal 100 can be randomly selected and determined as the terminal address corresponding to the field operation task.
And S32, sending the field operation task to the handheld terminal 100 corresponding to the terminal address according to the terminal address.
If one terminal address corresponds to one handheld terminal 100, the field operation task can be sent to the only corresponding handheld terminal 100 according to the terminal address. The handheld terminal server 201 may further obtain feedback information of the handheld terminal 100 receiving the field operation task, and if the feedback information of the handheld terminal 100 is not received, it is determined that the transmission fails, and another terminal address may be reselected to transmit the field operation task.
As shown in fig. 6, the process of processing the field job task by the handheld terminal 100, generating a task execution result and uploading the task execution result to the handheld terminal server 201 includes the following steps:
s33, after receiving the field operation task, the handheld terminal 100 decrypts the received field operation task according to a preset decryption rule to obtain a corresponding operation task, the handheld terminal 100 can obtain the field operation task from the handheld terminal server 201 through the APN public network, the handheld terminal 100 is internally provided with the decryption rule, and the field operation task can be decrypted according to the decryption rule to obtain a specifically executable operation task;
and S34, sending a control instruction to the corresponding electric energy meter according to the operation task and obtaining an instruction feedback result fed back by the electric energy meter according to the control instruction, wherein the control instruction comprises one or more instructions of key issuing, power failure and power restoration and infrared meter reading, and the issued private key is the private key obtained in the step. The corresponding control instruction can be sent to the electric energy meter according to the operation project in the operation task, if the operation task comprises the operation project of infrared meter reading, the control instruction of infrared meter reading is correspondingly sent to the electric energy meter, and therefore instruction feedback information fed back by the electric energy meter according to the control instruction is obtained;
s35, acquiring information of the electric energy meter according to the operation task to obtain field acquisition information, wherein the field acquisition information comprises electric energy meter information, a geographic position and longitude and latitude, and the electric energy meter can be acquired according to the operation items in the operation task to obtain the field acquisition information, the field acquisition information comprises electric energy meter information such as electric energy meter running time, running state and other information, the field acquisition information also comprises the geographic position and the longitude and latitude information, the geographic position is the geographic position information of the electric energy meter, and the longitude and latitude information can be the longitude and latitude corresponding to the electric energy meter and acquired based on a global satellite positioning function;
and S36, generating a corresponding task execution result according to the instruction feedback result and the field acquisition information and uploading the task execution result to the handheld terminal server 201, generating a corresponding task execution result according to the instruction feedback result and the field acquisition information, and uploading the generated task execution result to the handheld terminal server 201 according to the network address of the handheld terminal server 201, wherein the handheld terminal 100 can upload the task execution result to the handheld terminal server 201 in the server side by adopting GPRS (general packet radio service) or USB (universal serial bus) and other modes.
In step S33, the step of decrypting the received field job task according to a preset decryption rule to obtain a corresponding job task includes the following steps,
and S331, generating a corresponding private key according to the decryption rule and the public key in the field operation task.
The decryption rule includes a symmetric key session negotiation rule that is the same as that in the encryption apparatus 202, the obtained public key is processed through the symmetric key session negotiation to obtain a corresponding private key, and the same public key is processed based on the same symmetric key session negotiation to obtain the same private key, that is, the private key obtained by the handheld terminal 100 is the same as the private key obtained by the encryption apparatus 202.
S332, decrypting the encrypted information in the field operation task according to the private key to obtain the corresponding operation task.
The encrypted information in the field operation task can be decrypted according to the private key, namely the encrypted information is subjected to the information reduction processing process, and the corresponding operation task can be obtained after decryption.
And S4, after the handheld terminal server 201 receives the task execution result from the handheld terminal 100, analyzing the task execution result according to the field operation information to obtain a task analysis result and archiving the task analysis result.
The handheld terminal 100 receives the field operation task and can execute the task, and the obtained task execution result is fed back to the handheld terminal server 201, the handheld terminal server 201 analyzes the received task execution result, specifically, the task execution result can be analyzed according to the field operation information corresponding to the task execution result to obtain a task analysis result, and the handheld terminal server 201 can store and archive the obtained task analysis result.
In one embodiment, as shown in fig. 5, step S140 includes the following steps:
s41, verifying whether the instruction feedback results in the task execution results are matched according to expected feedback information in the field operation information to obtain a matching analysis result;
s42, verifying the field acquisition information in the task execution result according to an information verification rule in the field operation information to obtain a verification analysis result;
and S43, combining the matching analysis result and the verification analysis result to be used as the task analysis result and filing the task analysis result.
The on-site operation information comprises expected feedback information and an information verification rule corresponding to an operation project, whether the instruction feedback results in the task execution results are matched or not can be verified according to the expected feedback information, a matching analysis result is obtained, the expected feedback information comprises information which is correctly fed back after the handheld terminal 100 sends corresponding control instructions, the expected feedback information can comprise one or more codes, whether the expected feedback information is matched with a state code in the instruction feedback result or not can be judged, and therefore whether the instruction feedback result is matched with the corresponding expected feedback information or not can be verified, and a corresponding matching analysis result can be obtained. The field acquisition information in the task execution result can be verified according to the information verification rule to obtain a verification analysis result, specifically, each item of acquisition information in the field acquisition information needs to meet a specific information format, the information verification rule comprises a standard format (such as data character length, data decimal number and the like) corresponding to each item of information, and whether the information format of each item of acquisition information in the field acquisition information is matched with the standard format in the information verification rule can be verified, so that a corresponding verification analysis result is obtained. And combining the obtained matching analysis result with the verification analysis result, and filing and storing the combined matching analysis result and the verification analysis result as a task analysis result corresponding to the task execution result.
And S5, the handheld terminal server 201 feeds back a task analysis result to the service application server cluster 203 according to preset interface protocol information.
The service application server cluster 203 comprises a plurality of processing servers, the handheld terminal server 201 comprises corresponding interface protocol information, corresponding processing interfaces can be allocated for the task analysis results according to the interface protocol information, one processing server corresponds to one or more processing interfaces, and the task analysis results are fed back to the corresponding processing server in the service application server cluster 203 through the allocated processing interfaces.
To sum up, the service application server cluster 203 generates field operation information corresponding to the service processing request and sends the field operation information to the handheld terminal server 201, the handheld terminal server 201 encrypts the field operation information according to the intelligent key to obtain a field operation task and sends the field operation task to the handheld terminal 100, and if the handheld terminal server 201 receives a task execution result, the field operation task is analyzed to obtain a task analysis result, and the task analysis result is filed and fed back to the service application server cluster 203 according to the interface protocol information. By the method, the field operation task can be remotely issued to the handheld terminal 100, the handheld terminal 100 sends the control instruction according to the field operation task and acquires information to obtain field acquisition information, the task execution result is uploaded to the server side, all operations can be completed through the handheld terminal 100 without performing multiple remote interactions with the electric energy meter, the safety of key updating on the electric energy meter is greatly improved, and the key updating efficiency is improved
Example 2
Referring to fig. 1 to 9, for a second embodiment of the present invention, the second embodiment provides a power grid security management system based on an intelligent key, specifically, the system includes a handheld terminal 100 and a server 200, where the server 200 includes a handheld terminal server 201, an encryption machine 202, and a business application server cluster 203, a field operation information sending unit 203a is configured in the business application server cluster 203, and an encryption unit 201a, a field operation task sending unit 201b, a task analysis result filing unit 201c, and a task analysis result feedback unit 201d are configured in the handheld terminal server 201.
The field operation information sending unit 204 is configured to, if a service processing request is received, generate field operation information corresponding to the service processing request and send the field operation information to the handheld terminal server 201; the encryption unit 201a is configured to encrypt the field operation information by using an intelligent key from the encryption machine 202 to obtain a field operation task; the field operation task sending unit 201b is configured to send the field operation task to the corresponding handheld terminal 100 according to a preset distribution rule; the task analysis result filing unit 201c is configured to, if a task execution result from the handheld terminal 100 is received, analyze the task execution result according to the field operation information to obtain a task analysis result, and file the task analysis result; the task analysis result feedback unit 201d is configured to feed back a task analysis result to the service application server cluster 203 according to preset interface protocol information.
Further, the handheld terminal 100 includes an information decryption unit 101, an instruction feedback result acquisition unit 102, a field acquisition information acquisition unit 103, and a task execution result uploading unit 104, where the information decryption unit 101 is configured to decrypt, if a field operation task is received, the received field operation task according to a preset decryption rule to obtain a corresponding operation task; the instruction feedback result acquisition unit 102 is configured to send a control instruction to a corresponding electric energy meter according to the job task and acquire an instruction feedback result fed back by the electric energy meter according to the control instruction, where the control instruction includes one or more instructions of key issuing, power outage and infrared meter reading; the field acquisition information acquisition unit 103 is configured to acquire information of the electric energy meter according to the operation task to obtain field acquisition information, where the field acquisition information includes information of the electric energy meter, a geographic position, and longitude and latitude; the task execution result uploading unit 104 is configured to generate a corresponding task execution result according to the instruction feedback result and the field acquisition information, and upload the task execution result to the server 200.
In the power grid security management system based on the intelligent key provided in this embodiment, the service application server cluster 203 generates field operation information corresponding to the service processing request and sends the field operation information to the handheld terminal server 201, the handheld terminal server 201 encrypts the field operation information according to the intelligent key to obtain a field operation task and sends the field operation task to the handheld terminal 100, and if the handheld terminal server 201 receives a task execution result, the field operation task is analyzed to obtain a task analysis result, and the task analysis result is filed and fed back to the service application server cluster 203 according to the interface protocol information. By the method, the field operation task can be remotely issued to the handheld terminal 100, the handheld terminal 100 sends the control instruction according to the field operation task and acquires information to obtain field acquisition information, the task execution result is uploaded to the server side, all operations can be completed through the handheld terminal 100, multiple remote interactions with the electric energy meter are not needed, the safety of key updating of the electric energy meter is greatly improved, and the key updating efficiency is improved.
The above-described smart key-based grid security management method may be implemented in the form of a computer program that may be run on a computer device as shown in fig. 9. The handheld terminal 100 comprises a first memory, a first processor and a first computer program stored on the first memory and executable on the first processor; the hand-held terminal server 201 comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor; the business application server cluster 203 comprises a third memory, a third processor and a third computer program stored on the third memory and executable on the third processor; the first processor executes the first computer program, the second processor executes the second computer program, and the third processor executes the third computer program to collectively implement the smart key-based grid security management method in the above embodiment.
Referring to fig. 9, fig. 9 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device may be the handheld terminal 100, the handheld terminal server 201, the service application server cluster 203, or the encryption machine 202, which is used for executing the intelligent key-based power grid security management method to realize sending the control instruction to the electric energy meter and performing information acquisition on the electric energy meter.
Referring to fig. 9, the computer device includes a processor, a memory, and a network interface connected through a system bus, wherein the memory may include a storage medium and an internal memory.
The storage medium may store an operating system and a computer program. The computer program, when executed, may cause a processor to perform a smart key-based grid security management method, wherein the storage medium may be a volatile storage medium or a non-volatile storage medium.
The processor is used to provide computing and control capabilities to support the operation of the entire computer device.
The internal memory provides an environment for execution of a computer program in a storage medium, which when executed by a processor, causes the processor to perform a smart key-based grid security management method.
The network interface is used for network communication, such as transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 9 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing devices to which aspects of the present invention may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor is configured to run a computer program stored in the memory to implement the corresponding functions in the foregoing smart key-based grid security management method.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 9 does not constitute a limitation on the specific construction of the computer device, and in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 9, and are not described herein again.
It should be understood that in the embodiment of the present invention, the Processor may be a Central Processing Unit (CPU), and the Processor may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a volatile or non-volatile computer readable storage medium. The computer-readable storage medium stores a first computer program, a second computer program, or a third computer program, which collectively implement the smart key-based power grid security management method in the above embodiment when executed by the first processor, the second computer program by the second processor, and the third computer program by the third processor.
It should be noted that the above-mentioned embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (10)

1. A power grid security management method based on an intelligent key is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
the method comprises the steps that a service application server cluster (203) receives a service processing request, generates field operation information corresponding to the service processing request and sends the field operation information to a handheld terminal server (201);
the handheld terminal server (201) encrypts the field operation information through an intelligent key from an encryption machine (202) to obtain a field operation task;
the handheld terminal server (201) sends the field operation tasks to corresponding handheld terminals (100) according to preset distribution rules, the handheld terminals (100) process the field operation tasks, generate task execution results and upload the task execution results to the handheld terminal server (201);
after the handheld terminal server (201) receives a task execution result from the handheld terminal (100), analyzing the task execution result according to the field operation information to obtain a task analysis result and archiving the task analysis result;
and the handheld terminal server (201) feeds back a task analysis result to the service application server cluster (203) according to preset interface protocol information.
2. The smart key based grid security management method of claim 1, wherein: the process of obtaining the on-site job task includes,
the handheld terminal server (201) sends a key acquisition request to the encryption machine (202) according to the field operation information;
the encryption machine (202) generates an intelligent key corresponding to the key acquisition request and feeds the intelligent key back to the handheld terminal server (201);
the handheld terminal server (201) encrypts the work order in the field operation information according to the public key in the intelligent key to obtain encrypted information;
and the handheld terminal server (201) integrates the encrypted information and the public key to obtain a corresponding field operation task.
3. The smart key based grid security management method according to claim 1 or 2, wherein: sending the field work task to the corresponding handheld terminal (100) comprises,
determining a terminal address corresponding to the field operation task according to the distribution rule;
and sending the field operation task to the handheld terminal (100) corresponding to the terminal address according to the terminal address.
4. The smart key based grid security management method of claim 3, wherein: the process of analyzing the task execution result to obtain a task analysis result and archiving the task analysis result comprises the following steps,
verifying whether the instruction feedback results in the task execution results are matched or not according to expected feedback information in the field operation information to obtain a matching analysis result;
verifying the field acquisition information in the task execution result according to an information verification rule in the field operation information to obtain a verification analysis result;
and combining the matching analysis result and the verification analysis result to be used as the task analysis result and filing.
5. The smart key based grid security management method of claim 4, wherein: the process that the handheld terminal (100) processes the field operation task, generates a task execution result and uploads the task execution result to the handheld terminal server (201) comprises the following steps,
after receiving the field operation task, the handheld terminal (100) decrypts the received field operation task according to a preset decryption rule to obtain a corresponding operation task;
sending a control instruction to a corresponding electric energy meter according to the operation task and acquiring an instruction feedback result fed back by the electric energy meter according to the control instruction, wherein the control instruction comprises one or more instructions of key issuing, power failure and power restoration and infrared meter reading;
acquiring information of the electric energy meter according to the operation task to obtain field acquisition information, wherein the field acquisition information comprises electric energy meter information, a geographic position and longitude and latitude;
and generating a corresponding task execution result according to the instruction feedback result and the field acquisition information, and uploading the task execution result to the handheld terminal server (201).
6. The smart key based grid security management method of claim 5, wherein: the operation tasks obtained by decrypting the received field operation tasks according to the preset decryption rules comprise corresponding operation tasks,
generating a corresponding private key according to the decryption rule and a public key in the field operation task;
and decrypting the encrypted information in the field operation task according to the private key to obtain the corresponding operation task.
7. A power grid security management system based on intelligent secret keys is characterized in that: the system comprises a handheld terminal (100) and a server (200), wherein the server (200) comprises a handheld terminal server (201), an encryption machine (202) and a business application server cluster (203), a field operation information sending unit (203 a) is configured in the business application server cluster (203), and an encryption unit (201 a), a field operation task sending unit (201 b), a task analysis result filing unit (201 c) and a task analysis result feedback unit (201 d) are configured in the handheld terminal server (201);
the field operation information sending unit (204) is used for generating field operation information corresponding to a service processing request and sending the field operation information to the handheld terminal server (201) if the service processing request is received;
the encryption unit (201 a) is used for encrypting the field operation information through an intelligent key from an encryption machine (202) to obtain a field operation task;
the field operation task sending unit (201 b) is used for sending the field operation task to the corresponding handheld terminal (100) according to a preset distribution rule;
the task analysis result filing unit (201 c) is used for analyzing the task execution result according to the field operation information to obtain a task analysis result and filing the task analysis result if the task execution result from the handheld terminal (100) is received;
the task analysis result feedback unit (201 d) is configured to feed back a task analysis result to the service application server cluster (203) according to preset interface protocol information.
8. The smart key based grid security management system of claim 7, wherein: the hand-held terminal (100) comprises,
the information decryption unit (101) is used for decrypting the received field operation task according to a preset decryption rule to obtain a corresponding operation task if the field operation task is received;
the instruction feedback result acquisition unit (102) is used for sending a control instruction to the corresponding electric energy meter according to the operation task and acquiring an instruction feedback result fed back by the electric energy meter according to the control instruction, wherein the control instruction comprises one or more instructions of key issuing, power failure and power restoration and infrared meter reading;
the field acquisition information acquisition unit (103) is used for acquiring information of the electric energy meter according to the operation task to obtain field acquisition information, and the field acquisition information comprises electric energy meter information, geographic position and longitude and latitude;
and the task execution result uploading unit (104) is used for generating a corresponding task execution result according to the instruction feedback result and the field acquisition information and uploading the task execution result to the server (200).
9. The smart key based grid security management system of claim 8, wherein: the handheld terminal (100) comprises a first memory, a first processor and a first computer program stored on the first memory and executable on the first processor;
the hand-held terminal server (201) comprises a second memory, a second processor and a second computer program stored on the second memory and executable on the second processor;
the business application server cluster (203) comprises a third memory, a third processor, and a third computer program stored on the third memory and executable on the third processor;
the first processor executing the first computer program, the second processor executing the second computer program, and the third processor executing the third computer program to collectively implement the smart key-based grid security management method of any of claims 1-6.
10. A computer-readable storage medium characterized by: the computer-readable storage medium stores a first computer program, a second computer program, or a third computer program that, when executed by a first processor, the second computer program executed by a second processor, and the third computer program executed by a third processor, collectively implement the smart key-based grid security management method of any of claims 1 to 6.
CN202210661024.6A 2022-06-13 2022-06-13 Intelligent key-based power grid security management method, system and medium Active CN115276963B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210661024.6A CN115276963B (en) 2022-06-13 2022-06-13 Intelligent key-based power grid security management method, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210661024.6A CN115276963B (en) 2022-06-13 2022-06-13 Intelligent key-based power grid security management method, system and medium

Publications (2)

Publication Number Publication Date
CN115276963A true CN115276963A (en) 2022-11-01
CN115276963B CN115276963B (en) 2024-06-14

Family

ID=83759250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210661024.6A Active CN115276963B (en) 2022-06-13 2022-06-13 Intelligent key-based power grid security management method, system and medium

Country Status (1)

Country Link
CN (1) CN115276963B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009553A (en) * 2006-12-30 2007-08-01 中兴通讯股份有限公司 Secret key safety method and system for realizing multi-network integration mobile multi-media broadcasting system
CN104301319A (en) * 2014-10-17 2015-01-21 云南电网公司电力科学研究院 Intelligent ammeter encryption management device and data encryption protection method
CN107249002A (en) * 2017-07-20 2017-10-13 云南电网有限责任公司电力科学研究院 A kind of method, system and device for improving intelligent electric energy meter security
WO2019056957A1 (en) * 2017-09-19 2019-03-28 阿里巴巴集团控股有限公司 Data processing and identity authentication methods and systems, and terminal
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
US20200344072A1 (en) * 2018-06-06 2020-10-29 Tencent Technology (Shenzhen) Company Limited Key management method, apparatus, and system, storage medium, and computer device
CN112861148A (en) * 2021-01-28 2021-05-28 北京深思数盾科技股份有限公司 Data processing method, server, client and encryption machine
CN114239078A (en) * 2021-12-13 2022-03-25 广东电网有限责任公司广州供电局 Power grid data auditing method and device, power grid system and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009553A (en) * 2006-12-30 2007-08-01 中兴通讯股份有限公司 Secret key safety method and system for realizing multi-network integration mobile multi-media broadcasting system
CN104301319A (en) * 2014-10-17 2015-01-21 云南电网公司电力科学研究院 Intelligent ammeter encryption management device and data encryption protection method
CN107249002A (en) * 2017-07-20 2017-10-13 云南电网有限责任公司电力科学研究院 A kind of method, system and device for improving intelligent electric energy meter security
WO2019056957A1 (en) * 2017-09-19 2019-03-28 阿里巴巴集团控股有限公司 Data processing and identity authentication methods and systems, and terminal
US20200344072A1 (en) * 2018-06-06 2020-10-29 Tencent Technology (Shenzhen) Company Limited Key management method, apparatus, and system, storage medium, and computer device
CN110691064A (en) * 2018-09-27 2020-01-14 国家电网有限公司 Safety access protection and detection system for field operation terminal
CN112861148A (en) * 2021-01-28 2021-05-28 北京深思数盾科技股份有限公司 Data processing method, server, client and encryption machine
CN114239078A (en) * 2021-12-13 2022-03-25 广东电网有限责任公司广州供电局 Power grid data auditing method and device, power grid system and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RAMU KUCHIPUDI等: "An efficient hybrid dynamic key distribution in Wireless Sensor Networks with reduced memory overhead", 《2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT)》, 24 November 2016 (2016-11-24) *
唐菁: "基于传感网络的智能电表现场服务终端设计与实现", 《中国优秀硕士学位论文全文数据库》, 15 March 2016 (2016-03-15) *

Also Published As

Publication number Publication date
CN115276963B (en) 2024-06-14

Similar Documents

Publication Publication Date Title
CN111818032B (en) Data processing method and device based on cloud platform and computer program
CN103714637B (en) A kind of transmission security key sending method and system, operating terminal
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
US8959659B2 (en) Software authorization system and method
CN103595718A (en) POS terminal and method, system and service platform for activating same
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
CN109886692B (en) Data transmission method, device, medium and electronic equipment based on block chain
CN109274500B (en) Secret key downloading method, client, password equipment and terminal equipment
CN101925910B (en) License authentication system and authentication method
CN111427860B (en) Distributed storage system and data processing method thereof
CN115114658B (en) Verifiable data transaction method, device, equipment and medium based on blockchain
CN112822177B (en) Data transmission method, device, equipment and storage medium
CN113472722A (en) Data transmission method, storage medium, electronic device and automatic ticket selling and checking system
CN111865897A (en) Cloud service management method and device
CN113346999B (en) Splitting encryption-based brain central system
EP1681648B1 (en) Communication device and digital signature generation method
CN112464270A (en) Bidding file encryption and decryption method, equipment and storage medium
CN111010283B (en) Method and apparatus for generating information
CN115276963B (en) Intelligent key-based power grid security management method, system and medium
CN112181983A (en) Data processing method, device, equipment and medium
CN108932619B (en) Terminal offline charging service method and system
CN110868397B (en) Method and system for exchanging multipoint data of enterprise in different places
EP3086583B1 (en) Wireless terminal network locking method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant