CN116760868B - Automatic judging and detecting method and system for intelligent distribution transformer - Google Patents

Automatic judging and detecting method and system for intelligent distribution transformer Download PDF

Info

Publication number
CN116760868B
CN116760868B CN202311029419.5A CN202311029419A CN116760868B CN 116760868 B CN116760868 B CN 116760868B CN 202311029419 A CN202311029419 A CN 202311029419A CN 116760868 B CN116760868 B CN 116760868B
Authority
CN
China
Prior art keywords
detection
server
quick
task
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311029419.5A
Other languages
Chinese (zh)
Other versions
CN116760868A (en
Inventor
张思聪
戴建卓
陶加贵
何泽家
成义新
韩飞
赵恒�
陈昱彤
宋思齐
许建明
厉苗
李成钢
储昭杰
毛丹辰
杨卫星
丁一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
State Grid Jiangsu Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center, State Grid Jiangsu Electric Power Co Ltd, Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Jiangsu Electric Power Co ltd Innovation And Innovation Center
Priority to CN202311029419.5A priority Critical patent/CN116760868B/en
Publication of CN116760868A publication Critical patent/CN116760868A/en
Application granted granted Critical
Publication of CN116760868B publication Critical patent/CN116760868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an automatic judging and detecting method and system for an intelligent distribution transformer, wherein the method comprises the following steps: the server generates a detection task according to the detection requirement and sends the detection task to the mobile terminal; after receiving and displaying the detection task, the mobile terminal sends the detection task to a quick detection device; the quick detection device executes a corresponding detection task according to the received detection task information and collects detection data, and the quick detection device sends the detection data to the server through the mobile terminal; after receiving the detection data, the server processes the detection data and automatically judges the detection result by using a preset transformer detection data model; and according to the judging result, the server automatically generates a distribution transformer detection report. The method of the invention realizes the on-line control of the whole transformer field detection process, and improves the efficiency and quality of detection work.

Description

Automatic judging and detecting method and system for intelligent distribution transformer
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an automatic judging and detecting method and system for an intelligent distribution transformer.
Background
Distribution transformers, which are one of the important devices in power systems, are tasked with the transmission and distribution of electrical energy. Periodic inspection and maintenance of distribution transformers is necessary to ensure reliable operation of the power system. However, the conventional on-site transformer detection method has a plurality of problems such as complicated operation, low automation degree, inconvenient data management and the like. These problems not only affect the efficiency of the inspection work, but may also lead to inaccuracy of the inspection result, thereby affecting the stable operation of the power system.
Along with the development of technology, intelligent technology is widely applied in various fields. The intelligent technology can improve the efficiency and quality in the production process through means of automatic control, data analysis and the like. In the field of distribution transformer detection, the application of intelligent technology is particularly important. However, most of the transformer detection instruments in the current market cannot realize automatic test flow control, automatic generation of detection reports and detection data docking of an intranet, and meanwhile cannot realize a blind detection function. These problems limit the improvement of the digitization and intellectualization level of the distribution transformer detection service.
And some mobile distribution transformer detection devices can carry out test work of equipment in an information extranet environment, but information security risks still exist. Furthermore, field inspectors often need to receive tasks through mobile terminals and then manually perform various test tasks, a process that is time consuming and prone to error. After the detection is finished, the detection data is usually required to be manually uploaded to a quality supervision platform, and the process is not convenient and can easily cause omission or tampering of the data. The patent CN106597158A discloses a comprehensive detection device for a distribution transformer, which comprises: the detection module is connected to the integrated controller through the integrated wiring module, so that automatic testing of the distribution transformer is realized, and the central controller is used for analyzing and storing test data. Although integrated control and management can be performed to perform unified data management and diagnosis analysis and improve the reliability and technical management level of transformer operation, the method still cannot realize automatic test flow control, automatic generation of detection reports and detection data docking intranet, and meanwhile has the problem of information security risk. Therefore, how to apply the intelligent technology to the detection of the distribution transformer, realize the control of an automatic test flow, automatically generate a detection report, automatically and safely collect detection data to a material quality supervision platform, and have a blind detection function becomes a problem to be solved urgently.
The existing intelligent detection method often lacks sufficient consideration for information security, and can cause detection data leakage or tampering. Therefore, the intelligent rapid detection device for the mobile distribution transformer, which can safely develop equipment test work in an information extranet environment, has the capability of enabling a wireless VPN special line of an operator to be connected to an information intranet, and meanwhile, has the capability of issuing detection tasks and receiving the tasks in real time by means of a material quality supervision platform, and is particularly important.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the automatic judging and detecting method and the system for the intelligent distribution transformer, which can ensure the transmission safety of detection task data and ensure that only a quick detection device and a server can access and read detection data at the same time, thereby meeting the authority requirements of different devices.
In a first aspect, the present invention provides a method for automatically determining and detecting an intelligent distribution transformer, the method comprising:
the server generates a detection task according to the detection requirement and sends the detection task to the mobile terminal;
after receiving and displaying the detection task, the mobile terminal sends the detection task to a quick detection device;
the quick detection device executes a corresponding detection task according to the received detection task information and collects detection data;
the quick checking device generates a first shared key K1 for encrypting the detection data by using a key algorithm, and sends the encrypted detection data to the server through the mobile terminal;
after receiving the detection data, the server generates a second shared key K2 for decrypting the detection data by using a key algorithm, and judges the detection result of the decrypted detection data by using a preset transformer detection data model;
and according to the detection result, the server automatically generates a transformer detection report.
The quick checking device and the server both generate a corresponding first shared secret key K1 and a corresponding second shared secret key K2 through a Diffie-Hellman algorithm.
The transformer detection data model is constructed by using a machine learning or deep learning method.
The mobile terminal displays a task ID, a detection item, a start time and an end time, and is used for displaying detailed information of the detection task;
and displaying the receiving condition of the detection data, and indicating whether the mobile terminal has received the detection data of the corresponding detection task sent by the quick detection device.
When the server generates a detection task according to the detection requirement, the method further comprises the following steps:
the method comprises the steps that a server generates a global parameter set which comprises a plurality of pairs of global parameters g and p, wherein p in each pair of global parameters g and p is a large prime number, g is a generator of p, when the server needs to issue a detection task, the server selects one pair of global parameters g and p according to the ID of a quick detection device executing the detection task, and generates a first temporary private key a and a corresponding server public key A based on the selected pair of global parameters g and p.
The server sends detection task information, a server public key A, selected global parameters g and p and a quick detection device ID to the mobile terminal;
and after the mobile terminal receives the detection task information, displaying the detection task information to a user, and forwarding the detection task information, the server public key A, the selected global parameters g and p and the quick detection device ID to a quick detection device corresponding to the quick detection device ID.
The fast checking device generates a second temporary private key B and a corresponding fast checking device public key B based on global parameters g and p, obtains a first shared key K1 according to the second temporary private key B and a server public key A, simultaneously executes detection according to the detection task, encrypts detection data by using the first shared key K1 after the detection is completed, sends the encrypted detection data and the fast checking device public key B to the server through the mobile terminal, obtains a second shared key K2 by the first temporary private key a and the fast checking device public key B after the server receives the encrypted detection data, and decrypts the detection data by using the second shared key K2.
Wherein the method further comprises:
an RSA encryption algorithm is used for communication security between the server and the mobile terminal.
The server generates an RSA key pair, wherein the RSA key pair comprises a public key and a private key, the server holds the private key for signature detection tasks, and the server sends the RSA public key to the mobile terminal.
The quick detection device combines the detection data encrypted by using the first shared key K1 and the corresponding detection task information into a complete data packet and sends the complete data packet to the mobile terminal, and the mobile terminal encrypts the complete data packet by using an RSA public key of a server and sends the encrypted complete data packet to the server.
The invention provides an automatic judging and detecting system of an intelligent distribution transformer, which uses the automatic judging and detecting method of the intelligent distribution transformer and comprises a server, a mobile terminal and a quick detecting device which are connected in sequence in a communication way;
the server is used for generating a detection task according to the detection requirement, sending the detection task to the mobile terminal through the VPN, generating a second shared key K2 for decrypting the detection data by using a key algorithm after receiving the detection data, judging a detection result of the decrypted detection data by using a preset transformer detection data model, and generating a transformer detection report according to the detection result;
the mobile terminal is used for receiving and displaying the detection task, then sending the detection task to the quick detection device, and receiving the encrypted detection data and sending the encrypted detection data to the server;
the quick detection device is used for executing corresponding detection tasks according to the received detection tasks, collecting detection data, generating a first shared key K1 for encrypting the detection data by using a key algorithm, and sending the encrypted detection data to the mobile terminal.
In a third aspect, the present invention also provides a computer readable medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the steps of the above-described automatic decision detection method.
By the method, the terminal can access the detection item information and mark locally while ensuring the security of detection task data transmission, and still can not access the encrypted detection data. Only the quick checking device and the server can access and read the detection data, thereby meeting the authority requirements of different devices.
The quick detection device of the mobile distribution transformer can develop equipment test work in an information extranet environment, and is accessed into an information intranet through a wireless VPN special line of an operator. Depending on a quality supervision platform, the device can receive and execute the detection task in real time, and ensure the smooth proceeding of the detection task. After the test is finished, the detection data is not displayed on the terminal, but is automatically collected to the material quality supervision platform in real time through the system background. The transformer detection data model of the material quality supervision platform is used for automatically judging the detection result and intelligently generating a distribution transformer detection report, so that the on-line management and control of the whole transformer field detection process are realized, and the efficiency and quality of detection work are improved.
The intelligent rapid detection device for the mobile distribution transformer can automatically receive detection tasks in a blind detection mode, intelligently develop detection tests and finish automatic collection of detection data to a material quality supervision platform. The method of the invention further strengthens the quality control of the high-energy-efficiency distribution transformer material to the goods, improves the fine management and professional application level of the network-access material quality data, constructs the network-access material quality control service chain by data means, and greatly improves the digitization and intelligent level of the distribution field detection service.
Drawings
The above, as well as additional purposes, features, and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description when read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar or corresponding parts and in which:
fig. 1 is a flowchart showing an automatic determination detection method of an intelligent distribution transformer according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating secure communications of a server, a terminal, and a quick check device based on DH keys and RSA encrypted communications in accordance with an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating an automatic decision detection system for an intelligent distribution transformer according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plurality" generally includes at least two.
It should be understood that although the terms first, second, third, etc. may be used to describe … … in embodiments of the present invention, these … … should not be limited to these terms. These terms are only used to distinguish … …. For example, the first … … may also be referred to as the second … …, and similarly the second … … may also be referred to as the first … …, without departing from the scope of embodiments of the present invention.
It should be understood that the term "and/or" as used herein is merely one relationship describing the association of the associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a product or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such product or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a commodity or device comprising such element.
As shown in fig. 1, in order to implement the intelligent automatic determination and detection process of the distribution transformer, the following method may be adopted:
the quality supervision platform (server) generates detection tasks according to detection requirements, including detection items, test parameters and other information, wherein the detection requirements indicate that the items and the parameters need to be detected or tested. And the server sends the detection task to the mobile terminal through the wireless VPN special line of the operator. And after receiving the detection task, the mobile terminal acquires detection task information. The mobile terminal sends the detection task to an intelligent quick detection device (hereinafter referred to as a quick detection device) of the mobile distribution transformer. The quick detection device executes a corresponding detection task according to the received detection task information and collects detection data, wherein the detection data is related data obtained after the quick detection device detects according to the detection task. And the quick detection device sends the detection data to the server through the mobile terminal. After receiving the detection data, the server processes the detection data and automatically judges the detection result by using a preset transformer detection data model. And automatically generating a distribution transformer detection report by the quality supervision platform according to the judgment result, wherein the distribution transformer detection report comprises information such as detection items, test parameters, judgment results and the like. The generated detection report can be checked, analyzed and decided by related personnel so as to realize the on-line management and control of the whole process of the field detection of the transformer. Through the above process, the automatic judging and detecting process of intelligent quick detection of the movable distribution transformer is realized, and the safe transmission of detection data and the accuracy of detection results are realized.
In one embodiment, to verify the legitimacy of the mobile terminal and ensure secure transmission of the detection data, digital certificates may be issued for the mobile terminal, which digital certificates should be issued by a trusted Certificate Authority (CA). When the VPN connection is established, the validity of the mobile terminal is verified through client certificate authentication. Only mobile terminals that hold valid digital certificates can successfully establish VPN connections and transmit data.
In one embodiment, a transformer detection data model is constructed using a machine learning or deep learning method. For example, modeling may be performed using a Support Vector Machine (SVM), random forest, neural network, and the like. In this process, the model needs to be trained, validated and tested to ensure accuracy and stability of the model.
And judging whether the transformer is qualified or not by taking a random forest model as an example and taking the characteristics of empty load loss, empty load current and the like.
The output of the random forest model is a predictive classification label (for classification problems) or a predictive value (for regression problems). In the detection of the distribution transformer, whether the transformer is qualified or not is judged to be a classification problem according to the characteristics of no-load loss, no-load current and the like, so that the output of the random forest model is a label for representing classification results. These labels are encoded as 0 and 1 (category 0 and category 1), representing failed and failed, respectively. When a random forest model is used to predict a test set, it will generate a predictive label for each sample. For example, if there are 5 test samples, the output of the random forest model may be as follows: [0, 1, 1, 0, 1], which means that the first and fourth samples are predicted to be failed, and the second, third and fifth samples are predicted to be failed. Alternatively, the random forest model may also output a predictive probability. For example, a random forest model may output the following probabilities: [ [0.7, 0.3], [0.4, 0.6], [0.35, 0.65], [0.8, 0.2], [0.45, 0.55] ], which means that the first sample has a probability of 70% of being failed (class 0) and a probability of 30% of being failed (class 1); the second sample had a 40% probability of failed and a 60% probability of failed; and so on. And obtaining a final prediction label according to the prediction probability.
In one embodiment, the second shared key K2 of the server and the first shared key K1 of the quick checking device are generated using a Diffie-Hellman (DH) algorithm, respectively. In particular, the method comprises the steps of,
as shown in fig. 1, the secure communication process of the server, the terminal and the quick checking device based on the DH key is as follows.
Step S1, the server selects global parameters (g, p): the server dynamically selects a pair of global parameters (g, p) based on the ID of the quick check device.
Step S2, the server generates a temporary DH key: the Server generates a pair of temporary DH public-private keys (server_dh_pub=a, server_dh_priv=a) and calculates the public key a.
Step S3, the server sends the global parameter and the public key: the server transmits the global parameters (g, p), the public key a, the detection task and the fast detection device ID to the terminal (external network) through the wireless VPN private line of the operator.
Step S4, the terminal forwards the global parameter, the public key and the detection task: the terminal forwards the received global parameters (g, p), the public key A, the detection task and the quick detection device ID to the quick detection device.
Step S5, the quick checking device generates a temporary DH key: after receiving the global parameters (g, p), the quick checking device generates a pair of temporary DH public-private keys (dh_pub=b, dh_priv=b) and calculates the public key B.
Step S6, the quick checking device sends the public key B: the quick checking device sends the public key B to the terminal, and the terminal forwards the public key B to the server.
Step S7, DH key exchange: the server and the quick checking device exchange the secret key according to DH algorithm. The Server calculates the shared key K using its own server_dh_priv (a) and dh_pub (B) of the fast checking device. Meanwhile, the fast check device calculates the shared key K using its own dh_priv (b) and server_dh_pub (a) of the Server. Eventually, both get the same shared key K.
In one embodiment, the server generates a detection task and a transformer detection report, specifically including:
step S10, the server sends the detection task to the quick detection device through the terminal.
And S11, displaying the details of the current detection task on an interface by the terminal, and forwarding the detection task to the quick detection device by the terminal.
Step S12, the quick detection device receives and executes detection tasks: the quick detection device receives the detection task, detects according to the detection task, encrypts detection data in the data packet by using the first shared key K1, does not encrypt detection task information in the data packet, and then sends the data packet to the terminal.
Step S13, the terminal forwards the encryption detection data: and the terminal forwards the received encrypted detection data to the server, and simultaneously displays the receiving condition of the detection data of the current detection task on an interface. Table 1 is an exemplary list of detection tasks displayed by the terminal.
Table 1 detection task list displayed by terminal
In table 1, the task ID, the detection item, the start time, and the end time are used to show detailed information of the detection task. And detecting the receiving condition of the data, and indicating whether the terminal has received the detection data of the corresponding detection task sent by the quick detection device.
Step S14, the server decrypts the detection data: the server decrypts the received encrypted detection data using the second shared key K2. After decryption, the server can acquire the original detection data and generate a distribution transformer detection report according to the result.
In the invention, the shared secret key K generated by using DH algorithm can ensure the communication safety between the server and the quick checking device, simplify the secret key management and improve the flexibility and expandability of the system.
In one embodiment, the process of generating and exchanging the first shared key K1 and the second shared key K2 includes the steps of:
step p1, in the initialization stage, the server generates a global parameter set including a plurality of pairs g and p. In each pair of g and p, p is a large prime number, and g is a generator of p.
And p2, the server generates a temporary key, and when the server needs to issue a detection task, the server firstly selects a pair g and p according to the ID of the quick detection device executing the task. The server then generates a first temporary private key (a) for each task and calculates a corresponding server public key a=ga mod p. Where a is an integer, 1< a < p-1, randomly generated by the server for each task.
In this embodiment, a pair g, p may be selected by calculating the hash value of the quick-check device ID modulo the size of the global parameter set. The server then generates a first temporary private key (a) for each task and calculates the corresponding public key a=ga mod p. Assume that there is one global parameter set, comprising three pairs g, p: g1, p1, g2, p2, g3, p3. When a quick check device ID is received, e.g., id= "device123", a hash function (e.g., SHA-256) is first used to calculate the hash value of the ID. For example, the calculation result is hash_value. The hash value is then converted to an integer. The hash value may be considered as a large integer or an integer may be extracted from the hash value in some way, such as by computing a modulo operation. Taking modulo calculation as an example, the size of the global parameter set is modulo this integer. The global parameter g, p set is of size 3, so index = integer value% 3 is calculated. Finally, a pair of global parameters g and p is selected according to the calculated index value index. For example, g1, p1 is selected if index=0, g2, p2 is selected if index=1, and g3, p3 is selected if index=2. The method enables different quick detection devices to use different global parameters g and p, so that encryption complexity and security are improved.
And p3, task issuing and key exchange, wherein the server sends detection task information, a server public key A, selected global parameters g and p and a quick detection device ID to the terminal. And after the mobile terminal receives the detection task information, displaying the detection task information to a user, and forwarding the detection task information, the server public key A, the selected global parameters g and p and the selected global parameters to a quick detection device corresponding to the quick detection device ID.
And p4, the quick checking device generates a temporary secret key, generates a second temporary private key (B) for the current task after receiving the task information, the server public key A and the selected global parameters g and p, calculates a corresponding quick checking device public key B=gb mod p, and then sends the quick checking device public key B to the terminal. And b is an integer which is randomly generated by the quick detection device for the current task, and 1< b < p-1.
In step p5, the first shared key K1 is calculated, and the fast checking device calculates the shared key k1=a≡mod p using the server public key a and its own private key b. Likewise, the server calculates a second shared key k2=b≡a mod p using the fast check device public key B and its own first temporary private key a.
And step p6, encrypting and decrypting the data, and after the fast checking device performs detection according to the task, encrypting the detection data by using the first shared key K1. The encrypted detection data is sent to the server through the terminal, and after the server receives the encrypted data, the detection data is decrypted by using the second shared key K2.
In the above process, the server generates the first temporary private key a and the corresponding server public key a, and transmits the task information, the server public key a, the global parameters g, p and the quick checking device ID to the terminal. The terminal forwards the task information, the server public key A, the global parameters g and p and the quick checking device ID to the quick checking device. The fast checking device generates a second temporary private key B and a corresponding fast checking device public key B, and then sends the fast checking device public key B to the terminal. And the terminal sends the public key B of the quick checking device to the server. In this way, the server and the quick checking device can calculate the same shared key K (first shared key K1 and second shared key K2) using the received public key (server public key a and quick checking device public key B) and their own private keys (first temporary private key a and second temporary private key B), respectively. In this process, the terminal plays an intermediary role, but the terminal cannot calculate the shared key K because there is no information of the first temporary private key a or the second temporary private key b in the terminal. The method ensures that the terminal cannot check and modify the detection data, and ensures the accuracy and safety of the detection data in the blind detection process.
In one embodiment, the RSA encryption algorithm is also used for communication security between the server and the terminal.
As shown in fig. 2, the secure communication procedure of the server, the terminal, and the quick check device based on DH key and RSA encrypted communication is as follows.
Step k1: the server (intranet) generates an RSA key pair comprising a public key and a private key. The server holds a private key for signature detection tasks. The server sends the RSA public key to the terminal.
Step k2: the server selects the global parameter (g, p) and generates a first temporary private key (a) and a corresponding server public key a, and the server determines the detection task.
Step k3: the server signs the detection task by using an RSA private key, and then sends the signed detection task, the server public key A and the global parameters (g, p) to the terminal (external network) through a wireless VPN private line of an operator.
Step k4: the terminal uses the RSA public key of the server to verify the signature of the detection task and display the detection task information passing the verification. The terminal forwards the verified detection task, the server public key A and the global parameters (g, p) to the quick detection device.
And step k5, the quick checking device receives the detection task, the server public key A and the global parameters (g, p) and generates a second temporary private key (B) and a corresponding quick checking device public key B. The first shared Key dh_key1 is calculated using the server public Key a and the second temporary private Key b.
And step k6, the quick detection device detects according to the detection task and encrypts detection data by using DH_Key1.
And step k7, the quick checking device combines the detection data encrypted by using the DH_Key1 and the corresponding detection task information into a complete data packet, and sends the whole data packet to the terminal.
Illustratively, the data packet structure of the fast check device combination is:
the data packet includes a data packet header, a data packet body, and detection data (encrypted using dh_key1), where the data packet header includes a data packet type, a detection item, quick-check device information, detection task information, and other attribute information (e.g., a time stamp, a data packet length, etc.).
And step k8, after receiving the data packet, the terminal obtains encrypted DH_Key1 encryption detection data and corresponding detection task information. The terminal displays the received detection task information.
Step k9: the terminal encrypts the data packet by using the RSA public Key of the server, and then sends the encrypted data packet (the original data packet of the quick checking device contains DH_Key1 encrypted detection data and corresponding detection task information) to the server.
And step k10, the server decrypts the detection task information by using the RSA private key to acquire detection task content. The server calculates a second shared secret Key DH_Key2 by using the quick checking device public Key B and the first temporary private Key a, decrypts the detection data by using the DH_Key2, and obtains the original detection data.
In the whole process, an RSA private key of the server is used for signing detection tasks and decrypting encrypted data packets received from the terminal; the RSA public key of the server is used to verify the detection task signature and encrypt the data packets sent to the server. Thus, the safety and confidentiality of the intelligent quick-checking full link of the mobile distribution transformer are ensured.
By the method disclosed by the invention, the terminal can access the detection project information and locally mark the detection project information while ensuring the security of the detection task data transmission, but still can not access the encrypted detection data, and only the quick detection device and the server can access and read the detection data, so that the permission requirements of different devices are met.
As shown in fig. 3, the invention provides an automatic judging and detecting system of an intelligent distribution transformer, which comprises a server, a mobile terminal and a quick detecting device which are sequentially connected in a communication way;
the server is used for generating a detection task according to the detection requirement, sending the detection task to the mobile terminal through the VPN, generating a second shared key K2 for decrypting the detection data by using a Diffie-Hellman algorithm after receiving the detection data, judging a detection result of the decrypted detection data by using a preset transformer detection data model, and generating a transformer detection report according to the detection result;
the mobile terminal is used for receiving and displaying the detection task, then sending the detection task to the quick detection device, and receiving the encrypted detection data and sending the encrypted detection data to the server;
the quick detection device is used for executing corresponding detection tasks according to the received detection tasks, collecting detection data, generating a first shared key K1 for encrypting the detection data by using a Diffie-Hellman algorithm, and sending the encrypted detection data to the mobile terminal.
The present invention provides a computer readable medium having stored thereon a computer program, wherein the computer program when executed by a processor performs the steps of the above-described automatic decision detection method.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
The foregoing description of the preferred embodiments of the present invention has been presented for purposes of clarity and understanding, and is not intended to limit the invention to the particular embodiments disclosed, but is intended to cover all modifications, alternatives, and improvements within the spirit and scope of the invention as outlined by the appended claims.

Claims (10)

1. An automatic judging and detecting method for an intelligent distribution transformer, which is characterized by comprising the following steps:
the server generates a detection task according to the detection requirement and sends the detection task to the mobile terminal;
after receiving and displaying the detection task, the mobile terminal sends the detection task to a quick detection device;
the quick detection device executes a corresponding detection task according to the received detection task and collects detection data;
the quick checking device generates a first shared key K1 for encrypting the detection data by using a key algorithm, and sends the encrypted detection data to the server through the mobile terminal;
after receiving the detection data, the server generates a second shared key K2 for decrypting the detection data by using a key algorithm, and judges the detection result of the decrypted detection data by using a preset transformer detection data model;
and generating a transformer detection report by the server according to the detection result.
2. The automatic decision detection method of an intelligent distribution transformer according to claim 1, wherein the transformer detection data model is constructed by using a machine learning or deep learning method.
3. An automatic decision detection method for an intelligent distribution transformer as recited in claim 1, wherein,
the mobile terminal displays a task ID, a detection item, a start time and an end time, and is used for displaying detailed information of the detection task;
and displaying the receiving condition of the detection data, and indicating whether the mobile terminal receives the detection data of the corresponding detection task sent by the quick detection device.
4. The automatic decision detection method of intelligent distribution transformer according to claim 1, wherein when the server generates the detection task according to the detection requirement, further comprising:
the method comprises the steps that a server generates a global parameter set which comprises a plurality of pairs of global parameters g and p, wherein p in each pair of global parameters g and p is a large prime number, g is a generator of p, when the server needs to issue a detection task, the server selects one pair of global parameters g and p according to the ID of a quick detection device executing the detection task, and generates a first temporary private key a and a corresponding server public key A based on the selected pair of global parameters g and p.
5. An automatic decision detection method for an intelligent distribution transformer as recited in claim 4, wherein,
the server sends detection task information, a server public key A, selected global parameters g and p and a quick detection device ID to the mobile terminal;
and after the mobile terminal receives the detection task information, displaying the detection task information to a user, and forwarding the detection task information, the server public key A, the selected global parameters g and p and the quick detection device ID to a quick detection device corresponding to the quick detection device ID.
6. An automatic decision detection method for an intelligent distribution transformer as recited in claim 5, wherein,
the quick checking device generates a second temporary private key B and a corresponding quick checking device public key B based on global parameters g and p, obtains a first shared key K1 according to the second temporary private key B and a server public key A, simultaneously executes detection according to the detection task, encrypts detection data by using the first shared key K1 after detection is completed, sends the encrypted detection data and the quick checking device public key B to the server through the mobile terminal, obtains a second shared key K2 by the first temporary private key a and the quick checking device public key B after the server receives the encrypted detection data, and decrypts the detection data by using the second shared key K2.
7. The automatic decision detection method of an intelligent distribution transformer according to claim 1, wherein the method further comprises:
an RSA encryption algorithm is used for communication security between the server and the mobile terminal.
8. An automatic decision detection method for an intelligent distribution transformer as recited in claim 7, wherein,
the server generates an RSA key pair, wherein the RSA key pair comprises a public key and a private key, the server holds the private key for signature detection tasks, and the server sends the RSA public key to the mobile terminal.
9. An automatic decision detection method for an intelligent distribution transformer as recited in claim 8, wherein,
the quick detection device combines the detection data encrypted by using the first shared key K1 and the corresponding detection task information into a complete data packet and sends the complete data packet to the mobile terminal, and the mobile terminal encrypts the complete data packet by using an RSA public key of a server and sends the encrypted complete data packet to the server.
10. An automatic judging and detecting system of an intelligent distribution transformer, characterized in that an automatic judging and detecting method of an intelligent distribution transformer according to any one of claims 1-9 is used, and the automatic judging and detecting system comprises a server, a mobile terminal and a quick detecting device which are connected in sequence in communication;
the server is used for generating a detection task according to the detection requirement, sending the detection task to the mobile terminal, generating a second shared key K2 for decrypting the detection data by using a key algorithm after receiving the detection data, judging a detection result of the decrypted detection data by using a preset transformer detection data model, and generating a transformer detection report according to the detection result;
the mobile terminal is used for receiving and displaying the detection task, then sending the detection task to the quick detection device, and receiving the encrypted detection data and sending the encrypted detection data to the server;
the quick detection device is used for executing corresponding detection tasks according to the received detection tasks, collecting detection data, generating a first shared key K1 for encrypting the detection data by using a key algorithm, and sending the encrypted detection data to the mobile terminal.
CN202311029419.5A 2023-08-16 2023-08-16 Automatic judging and detecting method and system for intelligent distribution transformer Active CN116760868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311029419.5A CN116760868B (en) 2023-08-16 2023-08-16 Automatic judging and detecting method and system for intelligent distribution transformer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311029419.5A CN116760868B (en) 2023-08-16 2023-08-16 Automatic judging and detecting method and system for intelligent distribution transformer

Publications (2)

Publication Number Publication Date
CN116760868A CN116760868A (en) 2023-09-15
CN116760868B true CN116760868B (en) 2023-10-20

Family

ID=87951789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311029419.5A Active CN116760868B (en) 2023-08-16 2023-08-16 Automatic judging and detecting method and system for intelligent distribution transformer

Country Status (1)

Country Link
CN (1) CN116760868B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116990625B (en) * 2023-09-27 2023-12-08 国网江苏省电力有限公司电力科学研究院 Function switching system and method of intelligent quick-checking device of distribution transformer

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106597158A (en) * 2016-12-12 2017-04-26 上海欧秒电力监测设备有限公司 Distribution transformer integrated detection device
JP2017085250A (en) * 2015-10-23 2017-05-18 株式会社東芝 Plant security device and plant security system
CN110147329A (en) * 2019-05-24 2019-08-20 武汉瓯越网视有限公司 A kind of method, apparatus and terminal of dynamic detection simulator
CN111917796A (en) * 2020-08-12 2020-11-10 杨银平 Power grid equipment communication method
CN113141355A (en) * 2021-04-13 2021-07-20 长沙理工大学 Electricity consumption encrypted data anomaly detection method and system based on full homomorphism
CN114338113A (en) * 2021-12-09 2022-04-12 安天科技集团股份有限公司 Data encryption and decryption method and device, electronic equipment and storage medium
CN114630319A (en) * 2022-03-16 2022-06-14 黄文孝 Power transmission and transformation monitoring data safety management system and method for smart power grid
CN116405536A (en) * 2023-03-21 2023-07-07 奇安信网神信息技术(北京)股份有限公司 Data processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130262873A1 (en) * 2012-03-30 2013-10-03 Cgi Federal Inc. Method and system for authenticating remote users

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017085250A (en) * 2015-10-23 2017-05-18 株式会社東芝 Plant security device and plant security system
CN106597158A (en) * 2016-12-12 2017-04-26 上海欧秒电力监测设备有限公司 Distribution transformer integrated detection device
CN110147329A (en) * 2019-05-24 2019-08-20 武汉瓯越网视有限公司 A kind of method, apparatus and terminal of dynamic detection simulator
CN111917796A (en) * 2020-08-12 2020-11-10 杨银平 Power grid equipment communication method
CN113141355A (en) * 2021-04-13 2021-07-20 长沙理工大学 Electricity consumption encrypted data anomaly detection method and system based on full homomorphism
CN114338113A (en) * 2021-12-09 2022-04-12 安天科技集团股份有限公司 Data encryption and decryption method and device, electronic equipment and storage medium
CN114630319A (en) * 2022-03-16 2022-06-14 黄文孝 Power transmission and transformation monitoring data safety management system and method for smart power grid
CN116405536A (en) * 2023-03-21 2023-07-07 奇安信网神信息技术(北京)股份有限公司 Data processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"光伏电站设备运维平台的设计与实现";左世强;《中国优秀硕士学位论文全文数据库(电子期刊)工程科技Ⅱ辑》;全文 *

Also Published As

Publication number Publication date
CN116760868A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
CN110555029B (en) Ticket management method, device and storage medium based on block chain
US10608827B1 (en) Systems and methods for computer digital certificate management and analysis
CN106464698B (en) Wireless mesh network is protected via trust chain
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN116760868B (en) Automatic judging and detecting method and system for intelligent distribution transformer
Curty et al. Comment on “Arbitrated quantum-signature scheme”
CN106055936B (en) Executable program data packet encrypting/decrypting method and device
KR20190077765A (en) Method of storing data using block-chain and Cloud System using thereof
US20090300349A1 (en) Validation server, validation method, and program
CN109347917A (en) Block chain data common recognition processing method, system, storage medium and electronic equipment
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN116757447B (en) Test task allocation method and system of intelligent quick-checking device
CN114172663B (en) Business right determining method and device based on block chain, storage medium and electronic equipment
CN114244534A (en) Data storage method, device, equipment and storage medium
CN113946877A (en) Data security calculation method, system, computer equipment, storage medium and terminal
CN112367680A (en) External communication test method and device based on intelligent electric meter and computer equipment
CN110825776B (en) Air quality detection report processing method and device, computing equipment and storage medium
CN114584374B (en) Big data privacy sharing safety protection system and method based on blockchain
CN104168117A (en) Voice digital signature method
CN113518071B (en) Robot sensor information security enhancing device and method
US11349670B1 (en) Automated hash validation
CN110232570A (en) A kind of information monitoring method and device
CN114567469B (en) Application password type detection method and platform based on B/S mode
CN110287254A (en) A kind of data trade method, apparatus and computer equipment based on alliance&#39;s chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant