CN117650891A - Distribution data acquisition method and device - Google Patents

Distribution data acquisition method and device Download PDF

Info

Publication number
CN117650891A
CN117650891A CN202311751950.3A CN202311751950A CN117650891A CN 117650891 A CN117650891 A CN 117650891A CN 202311751950 A CN202311751950 A CN 202311751950A CN 117650891 A CN117650891 A CN 117650891A
Authority
CN
China
Prior art keywords
data
key
acquisition terminal
encryption level
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311751950.3A
Other languages
Chinese (zh)
Inventor
郭玉凡
郭玉婉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Baoli Electrical Equipment Manufacturing Co ltd
Original Assignee
Hebei Baoli Electrical Equipment Manufacturing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Baoli Electrical Equipment Manufacturing Co ltd filed Critical Hebei Baoli Electrical Equipment Manufacturing Co ltd
Priority to CN202311751950.3A priority Critical patent/CN117650891A/en
Publication of CN117650891A publication Critical patent/CN117650891A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosure provides a power distribution data acquisition method and device, and belongs to the field of data processing. The method comprises the following steps: generating a first key in response to receiving first data uploaded by the data acquisition terminal; the first data are data with the lowest encryption level and highest transmission priority selected randomly from target batch data by the data acquisition terminal, and the target batch data are batch data which are required to be transmitted currently by the data acquisition terminal; in response to receiving second data uploaded by the data acquisition terminal, converting the first key based on an encryption level corresponding to the second data to obtain a second key, and decrypting the second data; the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level. The method and the device can improve the reliability of data transmission in the data acquisition process.

Description

Distribution data acquisition method and device
Technical Field
The disclosure belongs to the field of data processing, and more particularly relates to a power distribution data acquisition method and device.
Background
With the increasing requirements of equipment safety and management, the real-time monitoring needs for various operating conditions are urgent, and the data acquisition is the most important link, so that the reliability of data transmission is particularly important. At present, encryption is mainly adopted to transmit data, but a secret key may be leaked in the transmission process and cause production accidents, so that a data encryption method is needed to improve the reliability of data transmission.
Disclosure of Invention
The disclosure aims to provide a power distribution data acquisition method and device for improving reliability of data transmission.
In a first aspect of an embodiment of the present disclosure, a method for collecting power distribution data is provided, including:
generating a first key based on first data uploaded by a data acquisition terminal in response to receiving the first data;
the first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are data with the lowest encryption level and the highest transmission priority in target batch data, and the target batch data are batch data which are required to be transmitted currently by the data acquisition terminal;
in response to receiving second data uploaded by the data acquisition terminal, converting the first key based on an encryption level corresponding to the second data to obtain a second key, and decrypting the second data based on the second key;
the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
A second aspect of an embodiment of the present disclosure provides a power distribution data acquisition device, including:
the first key generation module is used for responding to the received first data uploaded by the data acquisition terminal and generating a first key based on the first data; the first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are data with the lowest encryption level and the highest transmission priority in target batch data, and the target batch data are batch data which are required to be transmitted currently by the data acquisition terminal;
the second key generation module is used for responding to the received second data uploaded by the data acquisition terminal, transforming the first key based on the encryption level corresponding to the second data to obtain a second key, and decrypting the second data based on the second key; the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
In a third aspect of the disclosed embodiments, an electronic device is provided, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the power distribution data collection method described above when the computer program is executed.
In a fourth aspect of the disclosed embodiments, a computer readable storage medium is provided, which stores a computer program, which when executed by a processor, implements the steps of the power distribution data collection method described above.
The power distribution data acquisition method and device provided by the embodiment of the disclosure have the beneficial effects that:
firstly, the method and the device for transmitting data in batches (first data are transmitted and second data are transmitted again) can ensure that all data are transmitted, and the phenomenon that some data cannot be transmitted all the time is avoided.
Second, embodiments of the present disclosure generate a first key with the transmitted first data, which is also random because the first data is randomly selected. The second key is generated based on the encryption level to which the first key and the second data correspond, and thus the second key is also randomly generated. Because the first key and the second key are randomly generated, the fixed key used in the related technology is not easy to crack, and the reliability of data transmission is ensured.
Thirdly, the first data in the embodiment of the present disclosure is selected from the data with the lowest encryption level and the highest transmission level, for example, the data with voltage, current, power, etc., and the influence on the data transmission after the data is leaked is smaller, so that the reliability in the data transmission process is ensured by selecting the data as the first data for transmission.
Fourth, the first key in the embodiment of the present disclosure may not be transmitted along with the first data, and may decrypt the first data at the monitoring terminal, and the second key may also be transmitted along with the second data, and may decrypt the second data at the monitoring terminal, so that occurrence of key leakage in a transmission process is avoided, and reliability in a data transmission process is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are required for the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort for a person of ordinary skill in the art.
Fig. 1 is a schematic flow chart of a power distribution data collection method according to an embodiment of the disclosure;
fig. 2 is a block diagram of a power distribution data acquisition device according to an embodiment of the present disclosure;
fig. 3 is a schematic block diagram of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system configurations, techniques, etc. in order to provide a thorough understanding of the disclosed embodiments. However, it will be apparent to one skilled in the art that the present disclosure may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present disclosure with unnecessary detail.
For the purposes of promoting an understanding of the principles and advantages of the disclosure, reference will now be made to the embodiments illustrated in the drawings.
Referring to fig. 1, fig. 1 is a flowchart of a power distribution data collection method according to an embodiment of the disclosure, where the method includes:
s101: and generating a first key based on the first data in response to receiving the first data uploaded by the data acquisition terminal.
The first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are the data with the lowest encryption level and the highest transmission priority in the target batch data, and the target batch data are the batch data which are currently required to be transmitted by the data acquisition terminal.
In this embodiment, the data acquisition terminal may be an intelligent power distribution cabinet in the power distribution system, and the intelligent power distribution cabinet monitors electrical parameters in the covered field in real time, where the electrical parameters may be voltage, current, power, temperature, frequency, and the like, and these electrical parameters are numerous and need to be transmitted according to the level of transmission priority. The transmission priority is used to describe the priority at which data is transmitted, the higher the transmission priority, the earlier the transmission, and the lower the transmission priority, the later the transmission. For example, voltage and current data are common and important in life, and therefore transmission priority is high. The tightness of the power distribution cabinet and the overhaul data of the equipment are not important, so that the transmission priority is low.
At present, data of a data acquisition terminal are transmitted in a wireless communication mode, the distance between a transmission path between an intelligent power distribution cabinet and a monitoring terminal in actual production is long, the data are easy to intercept and leak, the intelligent power distribution cabinet has the risk of being damaged by lawless persons, and therefore the transmitted batch data are required to be encrypted. The voltage and the current in the batch data are common in daily life, and the leakage does not cause great loss, so that the encryption level is the lowest.
The execution subject of the embodiment of the invention can be a monitoring terminal, and the first data received by the monitoring terminal is the data with the lowest encryption level and highest transmission priority selected from the target batch data by the data acquisition terminal. In order to improve the reliability of data transmission, the data needs to be encrypted during transmission, and a direct transmission key is not safe and easy to leak, so that the first key can be generated on the basis of the received first data.
S102: and responding to the second data uploaded by the data acquisition terminal, converting the first key based on the encryption level corresponding to the second data to obtain a second key, and decrypting the second data based on the second key.
The second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
In this embodiment, the encryption level indicates the importance level of the batch data that needs to be transmitted by the data acquisition terminal currently, and may be divided into four encryption levels: a first encryption level, a second encryption level, a third encryption level, and a fourth encryption level, wherein the fourth encryption level represents the lowest encryption level. The first data may be data without encryption having the highest transmission priority and the lowest encryption level among the four transmission priorities; the second data may be encrypted data other than the first data in the target lot, for example, the first data is current data, and the second data is encrypted data other than current data transmitted by the data acquisition terminal.
In this embodiment, after uploading the first data to the monitoring terminal, the data acquisition terminal may generate a first key based on the first data, generate a second key corresponding to other unencrypted data based on the first key and an encryption level corresponding to other unencrypted data, encrypt other unencrypted data based on the second key to obtain second data, and upload the second data. The unencrypted data is data except the first data in the target batch data. The method for generating the first key and the second key by the data acquisition terminal is consistent with the monitoring terminal, and this embodiment will not be described in detail.
In this embodiment, the second key of the data acquisition terminal is related to the first key and the encryption level corresponding to the second data, and is obtained by transforming the first key based on the encryption level corresponding to the second data; the second key of the monitoring terminal is also related to the encryption level corresponding to the first key and the second data, and is also obtained by transforming the first key on the basis of the encryption level corresponding to the second data. The second key of the data acquisition terminal encrypts the data, and the second key of the monitoring terminal decrypts the second data.
The encrypted data is the data that has been encrypted, and the second data is the encrypted data.
From the above, the beneficial effects of the embodiments of the present disclosure are:
firstly, the method and the device for transmitting data in batches (first data are transmitted and second data are transmitted again) can ensure that all data are transmitted, and the phenomenon that some data cannot be transmitted all the time is avoided.
Second, embodiments of the present disclosure generate a first key with the transmitted first data, which is also random because the first data is randomly selected. The second key is generated based on the encryption level to which the first key and the second data correspond, and thus the second key is also randomly generated. Because the first key and the second key are randomly generated, the fixed key used in the related technology is not easy to crack, and the reliability of data transmission is ensured.
Thirdly, the first data in the embodiment of the present disclosure is selected from the data with the lowest encryption level and the highest transmission level, for example, the data with voltage, current, power, etc., and the influence on the data transmission after the data is leaked is smaller, so that the reliability in the data transmission process is ensured by selecting the data as the first data for transmission.
Fourth, the first key in the embodiment of the present disclosure may not be transmitted along with the first data, and may decrypt the first data at the monitoring terminal, and the second key may also be transmitted along with the second data, and may decrypt the second data at the monitoring terminal, so that occurrence of key leakage in a transmission process is avoided, and reliability in a data transmission process is improved.
In one embodiment of the present disclosure, generating a first key based on first data includes:
responding to the first data as text data, converting the first n data in the first data into corresponding codes, and generating a first key based on the codes corresponding to the first n data;
responding to the first data as numerical data, performing numerical conversion on the first m data in the first data, and generating a first key based on the first m data after numerical conversion;
in response to the first data being audio type data, dividing the first data into p segments equally, inserting preset noise data between every two adjacent segments, extracting audio feature vectors of the first data after the noise data are inserted, and determining the audio feature vectors as a first key;
and responding to the first data as image type data, extracting pixel characteristics of the first image in the first data to obtain a pixel characteristic vector, and determining the pixel characteristic vector as a first key.
In this embodiment, the first key may be generated according to first data, and the first data may have four types: text type data, numerical type data, audio type data, and video type data.
When the first data are text data, each data in the first data corresponds to one code, codes corresponding to all texts are stored in a code table, codes corresponding to the first n data in the first data are found in the code table, and the codes are arranged according to the arrangement sequence corresponding to the first n data to obtain a first secret key. n is a preset value.
For example, each code in the code table is a five-digit number, n is 2, the first data is "good wiring of the switch in the distribution box", "match" corresponds to code "03000", "electric" corresponds to code "00765", and the first key is "0300000765".
When the first data is numerical data, the first m data of the first data can be selected, numerical conversion is performed on the first m data, and the numerical conversion can be addition operation and multiplication operation. For example, when the numerical value is converted into an addition operation, the specific implementation of the addition operation may be as follows: each of the first m data is added with a number "1" to obtain the first m converted data, and the first m converted data is the first key. m is a preset value. For example, when m is 3 and the first data is "0.5,0.2,0.3,0.4,0.3", the first key is "1.5,1.2,1.3".
When the first data is audio type data, the first data can be divided into p sections equally, preset noise data are inserted between every two adjacent sections, a convolutional neural network method is adopted to extract one-dimensional audio feature vectors of the first data after the noise data are inserted, and the one-dimensional audio feature vectors are first keys. p is a preset value. For example, the first data may be sound data of operation of equipment in the power distribution cabinet, sound data of whistling of cars around the power distribution cabinet, and the like.
When the first data is image data, for example, picture data, a first image in the first data may be selected, and a HOG algorithm is used to extract a pixel feature of the first image, so as to obtain a pixel feature vector, where the pixel feature vector is the first key. For example, the first data may be an image of a data acquisition device captured by a surveillance camera within the power distribution cabinet.
In one embodiment of the present disclosure, transforming the first key based on the encryption level corresponding to the second data to obtain the second key includes:
determining at least one key store corresponding to the encryption level of the second data;
and selecting at least one key from each key bank according to a preset insertion rule corresponding to the encryption level, and inserting the at least one key into the first key to obtain a second key.
In this embodiment, the keystore is an essential part for generating the second key, and there may be four keystores, an uppercase, a lowercase, a numerical library, and a special character library. The preset inserting rules are set according to the encryption levels, and different encryption levels correspond to different preset inserting rules. For example, the preset inserting rule of the first encryption level may be a trailing edge of a first data of the first key to insert a key selected from the keystore, the preset inserting rule of the second encryption level may be a trailing edge of a last data of the first key to insert a key selected from the keystore, the preset inserting rule of the third encryption level may be a trailing edge of a first q data of the first key to insert a key selected from the keystore, and the preset inserting rule of the fourth encryption level may be a leading edge of a last ten data of the first key to insert a key selected from the keystore. q is a preset value.
In one embodiment of the present disclosure, the number of kinds of keystores corresponding to an encryption level is positively correlated with the encryption level.
In this embodiment, the number of types of keystores corresponding to the encryption level is positively correlated with the encryption level, that is, the higher the encryption level is, the more the corresponding keystores are. For example:
the first encryption level may correspond to a capital letter library, a lowercase letter library, a numeric library, and a special character library; the second encryption level may correspond to a uppercase letter library, a lowercase letter library, and a digital library; the third encryption level may correspond to a uppercase and lowercase; the fourth encryption level may correspond to a uppercase.
In one embodiment of the present disclosure, the power distribution data collection method further includes:
counting the calling frequency of various third data, wherein the third data is decrypted second data;
determining transmission levels corresponding to various third data according to the calling frequency of the third data and the preset real-time level of the third data;
and transmitting transmission levels corresponding to various third data to the data acquisition terminal so that the data acquisition terminal performs data transmission according to the transmitted transmission levels.
In this embodiment, the calling frequency indicates the probability of using various types of third data, and the calling frequency may be update frequency, delete frequency, modify frequency, and the like. The preset real-time level of the third data is a pre-defined level before batch data transmission, the transmission priority of the third data with high real-time and calling frequency is highest, the transmission priority of the third data with low real-time and calling frequency is low, the transmission priority of the third data with high real-time and calling frequency is low, and the transmission priority of the third data with low real-time and calling frequency is lowest.
The data acquisition terminal transmits according to the transmission levels corresponding to various third data, and the monitoring terminal feeds back the transmission levels of the third data transmitted each time to the data acquisition terminal, so that the first secret key and the second secret key generated in each data transmission process are different, and the reliability in the data acquisition process can be effectively improved.
In one embodiment of the present disclosure, converting the first n data of the first data into a corresponding code includes:
and converting the first n data into corresponding codes based on a preset code table, wherein the code table comprises the corresponding relation between the data and the codes.
In this embodiment, the encoding table includes all text-type data and the codes corresponding to each text-type data, and the first n data in the first data may be converted into the corresponding codes by referring to the encoding table.
In one embodiment of the present disclosure, determining the pixel feature vector as a first key includes:
a first column feature vector of the pixel feature vector is extracted, and the first column feature vector is determined as a first key.
In this embodiment, the pixel feature vector is a two-dimensional feature vector, and the direct operation is relatively complex, so that the first column feature vector of the pixel feature vector can be extracted and used as the first key.
Corresponding to the power distribution data acquisition method of the above embodiment, fig. 2 is a block diagram of a power distribution data acquisition device according to an embodiment of the present disclosure. For ease of illustration, only portions relevant to embodiments of the present disclosure are shown. Referring to fig. 2, the power distribution data acquisition device 20 includes: a first key generation module 21 and a second key generation module 22.
Wherein, the first key generation module 21 is configured to generate a first key based on the first data in response to receiving the first data uploaded by the data acquisition terminal; the first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are the data with the lowest encryption level and the highest transmission priority in the target batch data, and the target batch data are the batch data which are currently required to be transmitted by the data acquisition terminal.
The second key generating module 22 is configured to, in response to receiving the second data uploaded by the data acquisition terminal, transform the first key based on an encryption level corresponding to the second data to obtain a second key, and decrypt the second data based on the second key; the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
In one embodiment of the present disclosure, the first key generation module 21 is specifically configured to:
responding to the first data as text data, converting the first n data in the first data into corresponding codes, and generating a first key based on the codes corresponding to the first n data;
responding to the first data as numerical data, performing numerical conversion on the first m data in the first data, and generating a first key based on the first m data after numerical conversion;
in response to the first data being audio type data, dividing the first data into p segments equally, inserting preset noise data between every two adjacent segments, extracting audio feature vectors of the first data after the noise data are inserted, and determining the audio feature vectors as a first key;
and responding to the first data as image type data, extracting pixel characteristics of the first image in the first data to obtain a pixel characteristic vector, and determining the pixel characteristic vector as a first key.
In one embodiment of the present disclosure, the second key generation module 22 is specifically configured to:
determining at least one key store corresponding to the encryption level of the second data;
and selecting at least one key from each key bank according to a preset insertion rule corresponding to the encryption level, and inserting the at least one key into the first key to obtain a second key.
In one implementation of the present disclosure, the number of kinds of keystores corresponding to an encryption level is positively correlated with the encryption level.
In one implementation of the present disclosure, the second key generation module 22 is further configured to:
counting the calling frequency of various third data, wherein the third data is decrypted second data;
determining transmission levels corresponding to various third data according to the calling frequency of the third data and the preset real-time level of the third data;
and transmitting transmission levels corresponding to various third data to the data acquisition terminal so that the data acquisition terminal performs data transmission according to the transmitted transmission levels.
In one implementation of the present disclosure, the first key generation module 21 is specifically configured to:
and converting the first n data into corresponding codes based on a preset code table, wherein the code table comprises the corresponding relation between the data and the codes.
In one implementation of the present disclosure, the second key generation module 21 is specifically configured to:
a first column feature vector of the pixel feature vector is extracted, and the first column feature vector is determined as a first key.
Referring to fig. 3, fig. 3 is a schematic block diagram of an electronic device according to an embodiment of the disclosure. The electronic device 300 in the present embodiment as shown in fig. 3 may include: one or more processors 301, one or more input devices 302, one or more output devices 303, and one or more memories 304. The processor 301, the input device 302, the output device 303, and the memory 304 communicate with each other via a communication bus 305. The memory 304 is used to store a computer program comprising program instructions. The processor 301 is configured to execute program instructions stored in the memory 304. Wherein the processor 301 is configured to invoke program instructions to perform the functions of the modules in the various device embodiments described above, such as the functions of the modules 21-22 shown in fig. 2.
It should be appreciated that in the disclosed embodiments, the processor 301 may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 302 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output device 303 may include a display (LCD, etc.), a speaker, etc.
The memory 304 may include read only memory and random access memory and provides instructions and data to the processor 301. A portion of memory 304 may also include non-volatile random access memory. For example, the memory 304 may also store information of device type.
In a specific implementation, the processor 301, the input device 302, and the output device 303 described in the embodiments of the present disclosure may perform the implementation described in the first embodiment and the second embodiment of the power distribution data collection method provided in the embodiments of the present disclosure, and may also perform the implementation of the electronic device described in the embodiments of the present disclosure, which is not described herein again.
In another embodiment of the disclosure, a computer readable storage medium is provided, where the computer readable storage medium stores a computer program, where the computer program includes program instructions, where the program instructions, when executed by a processor, implement all or part of the procedures in the method embodiments described above, or may be implemented by instructing related hardware by the computer program, where the computer program may be stored in a computer readable storage medium, where the computer program, when executed by the processor, implements the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the jurisdiction's jurisdiction and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the jurisdiction and the patent practice.
The computer readable storage medium may be an internal storage unit of the electronic device of any of the foregoing embodiments, such as a hard disk or a memory of the electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device. Further, the computer-readable storage medium may also include both internal storage units and external storage devices of the electronic device. The computer-readable storage medium is used to store a computer program and other programs and data required for the electronic device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the electronic device and unit described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
In several embodiments provided in the present application, it should be understood that the disclosed electronic device and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via some interfaces or units, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purposes of the embodiments of the present disclosure.
In addition, each functional unit in each embodiment of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a specific embodiment of the present disclosure, but the protection scope of the present disclosure is not limited thereto, and any equivalent modifications or substitutions will be apparent to those skilled in the art within the scope of the present disclosure, and these modifications or substitutions should be covered in the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. A method of collecting power distribution data, comprising:
generating a first key based on first data uploaded by a data acquisition terminal in response to receiving the first data;
the first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are data with the lowest encryption level and the highest transmission priority in target batch data, and the target batch data are batch data which are required to be transmitted currently by the data acquisition terminal;
in response to receiving second data uploaded by the data acquisition terminal, converting the first key based on an encryption level corresponding to the second data to obtain a second key, and decrypting the second data based on the second key;
the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
2. The method of power distribution data collection of claim 1, wherein said generating a first key based on said first data comprises:
converting the first n data in the first data into corresponding codes in response to the first data being text data, and generating a first key based on the codes corresponding to the first n data;
responding to the first data as numerical data, performing numerical conversion on the first m data in the first data, and generating a first key based on the first m data after numerical conversion;
in response to the first data being audio type data, dividing the first data into p segments equally, inserting preset noise data between every two adjacent segments, extracting audio feature vectors of the first data after the noise data are inserted, and determining the audio feature vectors as a first key;
and responding to the first data as image type data, extracting pixel characteristics of a first image in the first data to obtain a pixel characteristic vector, and determining the pixel characteristic vector as a first key.
3. The method for collecting power distribution data according to claim 1, wherein said transforming the first key based on the encryption level corresponding to the second data to obtain a second key comprises:
determining at least one key store corresponding to the encryption level of the second data;
and selecting at least one key from each key bank according to a preset insertion rule corresponding to the encryption level, and inserting the at least one key into the first key to obtain a second key.
4. The method of collecting power distribution data as claimed in claim 3,
the number of kinds of key store corresponding to the encryption level is positively correlated with the encryption level.
5. The method of power distribution data collection of claim 1, further comprising:
counting the calling frequency of various third data, wherein the third data is decrypted second data;
determining transmission levels corresponding to various third data according to the calling frequency of the third data and the preset real-time level of the third data;
and transmitting transmission levels corresponding to various types of third data to the data acquisition terminal so that the data acquisition terminal performs data transmission according to the transmitted transmission levels.
6. The method of claim 2, wherein said converting the first n of said first data into a corresponding code comprises:
and converting the first n data into corresponding codes based on a preset code table, wherein the code table comprises the corresponding relation between the data and the codes.
7. The method of power distribution data collection of claim 2, wherein said determining said pixel feature vector as a first key comprises:
and extracting a first column of feature vectors of the pixel feature vectors, and determining the first column of feature vectors as a first key.
8. A power distribution data acquisition device, comprising:
the first key generation module is used for responding to the received first data uploaded by the data acquisition terminal and generating a first key based on the first data; the first data are randomly selected from target priority data by the data acquisition terminal, the target priority data are data with the lowest encryption level and the highest transmission priority in target batch data, and the target batch data are batch data which are required to be transmitted currently by the data acquisition terminal;
the second key generation module is used for responding to the received second data uploaded by the data acquisition terminal, transforming the first key based on the encryption level corresponding to the second data to obtain a second key, and decrypting the second data based on the second key; the second data is encrypted data except the first data in the target batch data, and the encrypted data is data obtained by the data acquisition terminal through data encryption based on the first data and the encryption level.
9. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 7.
CN202311751950.3A 2023-12-19 2023-12-19 Distribution data acquisition method and device Pending CN117650891A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311751950.3A CN117650891A (en) 2023-12-19 2023-12-19 Distribution data acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311751950.3A CN117650891A (en) 2023-12-19 2023-12-19 Distribution data acquisition method and device

Publications (1)

Publication Number Publication Date
CN117650891A true CN117650891A (en) 2024-03-05

Family

ID=90043299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311751950.3A Pending CN117650891A (en) 2023-12-19 2023-12-19 Distribution data acquisition method and device

Country Status (1)

Country Link
CN (1) CN117650891A (en)

Similar Documents

Publication Publication Date Title
CN107707347B (en) User key backup method and device and user key importing method and device
CN111461952B (en) Image encryption method, computer device, and computer-readable storage medium
CN1068486C (en) A method for point-to-point communications within secure communication systems
CN110598429B (en) Data encryption storage and reading method, terminal equipment and storage medium
CN114640523B (en) Computer data security encryption method and system
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN110659899B (en) Offline payment method, device and equipment
CN213426286U (en) Encryption camera based on quantum random number chip and video processing system
US11829476B2 (en) Computing device and model parameters security protection method
CN111177748A (en) Fingerprint storage encryption method, device and system
CN114357418A (en) Encryption authentication method, system, terminal device, server and storage medium
CN117640256A (en) Data encryption method, recommendation device and storage medium of wireless network card
CN116756750A (en) Medical sensitive data acquisition desensitization method
CN108933655A (en) A kind of computer network authentication system
CN117650891A (en) Distribution data acquisition method and device
CN115909560A (en) Data encryption method, data decryption method and door lock system
CN113645025A (en) Data encryption storage method, storage device, user equipment and storage medium
CN113660725B (en) Positioning anti-cheating method, device and system, computer equipment and storage medium
CN115632777A (en) Data processing method and electronic equipment
CN113672954A (en) Feature extraction method and device and electronic equipment
CN107959670B (en) Dynamic password generation method and device, terminal equipment and storage medium
CN111640441A (en) Audio signal analysis method, service providing method, electronic device, server, and storage medium
CN111506913A (en) Audio encryption method and device, storage medium and electronic device
CN116455892B (en) File transmission method, file transmission device and terminal equipment
CN115102713B (en) Industrial network encryption system and encryption method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination