[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116247804A - Cable on-line monitoring system for safety data access - Google Patents

Cable on-line monitoring system for safety data access Download PDF

Info

Publication number
CN116247804A
CN116247804A CN202211559432.7A CN202211559432A CN116247804A CN 116247804 A CN116247804 A CN 116247804A CN 202211559432 A CN202211559432 A CN 202211559432A CN 116247804 A CN116247804 A CN 116247804A
Authority
CN
China
Prior art keywords
verification
access
node
monitoring
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211559432.7A
Other languages
Chinese (zh)
Inventor
王骞能
黄应敏
胡超强
邹科敏
陈喜东
邵源鹏
高伟光
许翠珊
杨航
梁志豪
徐兆良
游仿群
徐加健
徐秋燕
陆松记
杨展鹏
丁明
吴仕良
卢广业
王利江
陈雪儿
李梓铧
黄梓维
邓春晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Panyu Cable Group Co Ltd
Original Assignee
Guangzhou Panyu Cable Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Panyu Cable Group Co Ltd filed Critical Guangzhou Panyu Cable Group Co Ltd
Priority to CN202211559432.7A priority Critical patent/CN116247804A/en
Publication of CN116247804A publication Critical patent/CN116247804A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/08Locating faults in cables, transmission lines, or networks
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01DMEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
    • G01D21/00Measuring or testing not otherwise provided for
    • G01D21/02Measuring two or more variables by means not covered by a single other subclass
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00001Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the display of information or by user interaction, e.g. supervisory control and data acquisition systems [SCADA] or graphical user interfaces [GUI]
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00016Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the invention discloses a cable online monitoring system for safety data access, which comprises: the instruction acquisition module acquires a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node; the verification mode determining module is used for determining corresponding access verification modes based on the request access instruction, and each access verification mode comprises function verification and security verification; and the verification module is used for verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node. According to the scheme, the problem that data security and applicability of the monitoring node cannot be guaranteed in the automatic access process of the monitoring node in the prior art is solved, the system configuration process of the monitoring node is optimized, and the operation efficiency of the whole cable monitoring system is improved.

Description

Cable on-line monitoring system for safety data access
Technical Field
The embodiment of the application relates to the technical field of cable monitoring, in particular to a cable online monitoring system for safety data access.
Background
With the popularization of cables and the development of system intellectualization, cable monitoring through a system platform becomes a main mode for monitoring the operation condition of the cable at present. Illustratively, the system platform monitors the data and discovers cable faults in time after receiving the data by implanting sensors in the cable to collect related data parameters.
In the related art, when a plurality of monitoring nodes access a system platform, the degree of intellectualization is relatively low, and most operators perform manual configuration, so that aiming at the condition that the monitoring nodes are automatically accessed, how to ensure the reliable operation of the accessed monitoring nodes and the safety of the system platform data are the problems to be solved urgently at present.
Disclosure of Invention
The embodiment of the invention provides a cable online monitoring system for safety data access, which solves the problems that in the prior art, the data safety and the applicability of a monitoring node cannot be ensured in the automatic access process of the monitoring node, optimizes the system configuration process of the monitoring node, and improves the operation efficiency of the whole cable monitoring system.
In a first aspect, an embodiment of the present invention provides an online cable monitoring system for secure data access, including:
the instruction acquisition module is configured to acquire a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node;
the verification mode determining module is configured to determine a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and the verification module is configured to verify the monitoring node based on the determined access verification mode, determine the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmit monitoring data with the monitoring node.
Further, the verification manner determining module is configured to:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
Further, the verification manner determining module is configured to:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
Further, the verification module is configured to:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
In a second aspect, an embodiment of the present invention further provides a method for online monitoring a cable for accessing secure data, including:
acquiring a request access instruction of a monitoring node through a set open interface, wherein the request access instruction records the node type, data parameters and function authority of the monitoring node;
determining a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node.
Further, the determining the corresponding access verification mode based on the request access instruction includes:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
Further, the determining, according to the node type and the data parameter in the request access instruction, an access verification manner satisfying the verification level includes:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
Further, the verifying the monitoring node based on the determined access verification mode includes:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
In a third aspect, an embodiment of the present invention further provides an online cable monitoring device for secure data access, where the device includes:
one or more processors;
storage means for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the cable online monitoring method for secure data access according to the embodiment of the present invention.
In a fourth aspect, embodiments of the present invention further provide a storage medium storing computer-executable instructions that, when executed by a computer processor, are configured to perform the cable online monitoring method for secure data access according to the embodiments of the present invention.
In the embodiment of the invention, the cable online monitoring of the safety data access comprises the following steps: the instruction acquisition module acquires a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node; the verification mode determining module is used for determining corresponding access verification modes based on the request access instruction, and each access verification mode comprises function verification and security verification; and the verification module is used for verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node. According to the scheme, the problem that data security and applicability of the monitoring node cannot be guaranteed in the automatic access process of the monitoring node in the prior art is solved, the system configuration process of the monitoring node is optimized, and the operation efficiency of the whole cable monitoring system is improved.
Drawings
Fig. 1 is a block diagram of a cable on-line monitoring system with secure data access according to an embodiment of the present invention;
fig. 2 is a flowchart of a cable online monitoring method for secure data access according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a cable online monitoring device with secure data access according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the drawings and examples. It should be understood that the particular embodiments described herein are illustrative only and are not limiting of embodiments of the invention. It should be further noted that, for convenience of description, only some, but not all of the structures related to the embodiments of the present invention are shown in the drawings.
Fig. 1 is a block diagram of a module structure of a cable online monitoring system for secure data access according to an embodiment of the present invention, as shown in fig. 1, where the system specifically includes:
the instruction acquisition module 101 is configured to acquire a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node;
a verification mode determining module 102 configured to determine a corresponding access verification mode based on the request access instruction, where each access verification mode includes a function verification and a security verification;
and the verification module 103 is configured to verify the monitoring node based on the determined access verification mode, determine the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmit monitoring data with the monitoring node.
The use scene of the technical scheme is that the intervention verification mode of the monitoring node is determined through the related information of the monitoring node so as to realize the automatic access of the monitoring node. Based on the above usage scenario, it may be understood that the execution body of the technical solution may be the cable online monitoring system with the secure data access, or may be an intelligent device integrated with the system, such as a mobile phone, a tablet computer, a notebook computer, etc., which is not limited herein.
In one embodiment, the open interface may be a standardized interface of a general definition, and may be mutually docked in case both dockees conform to the definition of the interface standard. The monitoring node may be a communication endpoint for collecting monitoring data. The request access instruction may be a request connection instruction sent by the monitoring node to a monitoring system. The node type of the monitoring node may be a role type of the monitoring node, and may specifically be determined according to the role of the monitoring node. The data parameter of the monitoring node may be monitoring parameter data, such as temperature data, humidity data, etc., collected by the monitoring node. The function authority of the monitoring node can be the limit of the monitoring node on the right of the acquired data in aspects of modification, use and the like. For example, the functional rights may include read-only, modified, added, deleted, etc.
In one embodiment, the instruction obtaining module 101 obtains, through a preset standardized interface, a connection request instruction sent by the monitoring node to the monitoring system. The request connection instruction comprises information such as action type of the monitoring node, parameter data collected by the monitoring node, function authority of the monitoring node and the like.
In one embodiment, the access verification manner may be a preset verification rule when the monitoring node accesses the monitoring system. It can be understood that, according to the node type, the data parameter and the function authority of the monitoring node, the verification rule corresponding to the monitoring node is different. The function verification may be to verify the function of the monitoring node. The security verification may be verification of the security of the data transmission of the monitoring node.
In one embodiment, the verification manner determining module 102 is configured to determine a verification rule when the monitoring node is connected to the monitoring system according to the node type, the data parameter, the function authority and other information of the monitoring node in the request access instruction. Specifically, the verification rule includes functional verification and security verification of the monitoring node.
In one possible embodiment, the verification manner determining module 102 is configured to:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
The verification level may be a strict level of the verification manner, and it is understood that the higher the verification level is, the stricter the corresponding verification manner is.
In one embodiment, the verification manner determining module 102 is configured to determine a verification level of the monitoring node according to the function authority in the request instruction. Wherein the functional rights include read-only, modified, added, deleted, etc. It will be appreciated that the higher the functional rights, the higher the corresponding authentication level. The verification manner determining module 102 is configured to determine, according to the node type and the data parameter in the access request instruction, a verification rule that meets the verification level.
The function authority of the monitoring node a is read-only, and the monitoring node a corresponds to a second verification level; the function authority of the monitoring node b is modified, and the monitoring node b corresponds to a first verification level. Wherein the first security level is higher than the second security level. The verification manner determining module 102 is configured to determine, according to the node type and the data parameter of the monitoring node a, a verification rule satisfying a second verification level, and determine, according to the node type and the data parameter of the monitoring node b, a verification rule satisfying a first verification level.
As can be seen from the above, determining a verification level according to the function authority in the request access instruction; and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction. Different levels of verification modes and corresponding verification modes are determined for the monitoring nodes with different functional authorities, and the monitoring nodes can be verified in a targeted manner, so that the verification modes of the monitoring nodes are more flexible.
In one possible embodiment, the verification manner determining module 102 is configured to:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
The first verification method may be a verification method corresponding to a node type and a data parameter of the monitoring node. The node type comprises an acquisition reporting node and a control node. The acquisition reporting node may be a monitoring node for reporting the acquired parameter data. The control node may be a monitoring node for controlling other child nodes to turn on or wake-up period adjustment.
The verification process flow may be a verification of the data interaction procedure. The interactive process includes interactive data and interactive links. The interactive data may be collected parameter data, and the interactive link may be a transmission path of the data.
In one embodiment, the authentication mode determining module 102 is configured to determine a first authentication mode corresponding to the monitoring node according to the node type and the data parameter in the access request instruction, and select an interaction processing procedure of a corresponding authentication level as the access authentication mode based on the first authentication mode. The interactive processing process comprises the processing process of interactive data and interactive links.
It can be appreciated that the reporting node and the control node correspond to different verification modes. For example, when the monitoring node is a reporting node, the first verification manner may be to verify the entry recorded by the reporting system, for example, data information such as temperature, humidity, and tension value; the specific report content can be known according to the data parameters. When the monitoring node is a control node, the corresponding first verification mode can be to verify the control instruction needing to be interacted, and the control instruction system has authority to provide; the interactive content of the specific control instruction can be known according to the data parameters, for example, the interactive content can specifically be the control of the opening of other child nodes, the adjustment of the wake-up period, and the like.
And different verification levels correspond to different verification processes, and the different verification processes are mainly reflected in different requirements on data and link security in the data interaction verification process. For example, aiming at the monitoring node with the modified and added function authority, the interaction data is required to be encrypted, and correspondingly, the interaction link is required to be a safety link; aiming at the monitoring node with the deleted function authority, the interactive data is required to be encrypted, and the interactive link is optional; and aiming at the monitoring node with the read-only function authority, the interactive data is not required to be encrypted, and the interactive link is optional.
And carrying out access verification on the monitoring node according to the interaction processing process. Illustratively, the monitoring node a is a reporting node, the data parameter includes temperature data, and the verification mode determining module 102 determines that the first verification mode is to verify the temperature data. The function authority of the monitoring node a is modified, the parameter data transmitted by the monitoring node a is determined to be encrypted data, and the transmission link is a safety link and is determined to be a verification rule of the monitoring node a.
As can be seen from the above, the first verification manner is determined according to the node type and the data parameter in the request access instruction, where the node type includes a collection reporting node and a control node; and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link. And determining a first verification mode according to the node type and the data parameters of the monitoring nodes, determining a verification flow of a verification level corresponding to the first verification mode according to the functional authority of the monitoring nodes, and determining a corresponding verification mode according to the multi-dimensional association information of the monitoring nodes, so that the adaptation degree of different monitoring nodes and the corresponding access verification modes is improved, and the access verification modes of all the monitoring nodes are more reasonable.
In one embodiment, the monitoring node verifying success may be understood as that the monitoring node meets a preset verification rule when accessing the monitoring system. The accessible node may be a verified monitoring node that is allowed to access the monitoring system. The monitoring data may be parameter data collected by the monitoring node.
In one embodiment, the verification module 103 is configured to verify the monitoring node according to a preset verification rule when the monitoring node accesses the monitoring system, and if the monitoring node meets the verification rule when the monitoring node accesses the monitoring system, determine the monitoring node as an accessible node and access the monitoring node to the monitoring system, where the monitoring node uploads the collected parameter data to the monitoring system. The verification module 103 is configured to verify a monitoring node a according to a preset verification rule, determine that the monitoring node a meets the verification rule, determine the monitoring node a as an interventional node, and access the interventional node to the monitoring system for transmission of collected parameter data.
In a possible embodiment, the verification module 103 is configured to:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
In one embodiment, the verification module 103 determines a requirement for the interactive link in the data interaction process according to the determined access verification manner, and establishes a communication connection with the monitoring node based on the requirement. The verification module 103 determines whether to encrypt the data according to the determined requirement of the access verification mode on the interaction data, and completes data transmission interaction.
For example, if it is determined that the interaction link corresponding to the monitoring node a is a secure link according to the access verification manner, the verification module 103 establishes a secure interaction link with the monitoring node. And according to the verification mode, determining that the interaction data corresponding to the monitoring node a is encrypted data, and encrypting the interaction data to complete data transmission interaction.
From the above, it can be seen that, based on the interactive link establishment procedure of the determined access verification manner, a communication connection with the monitoring node is established; based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction. And based on the determined access verification mode, the data transmission interaction of the monitoring node is completed according to the corresponding mode, and the overall cable operation efficiency is improved on the basis of ensuring the data security.
As can be seen from the above, the cable on-line monitoring system for secure data access includes: the instruction acquisition module acquires a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node; the verification mode determining module is used for determining corresponding access verification modes based on the request access instruction, and each access verification mode comprises function verification and security verification; and the verification module is used for verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node. According to the scheme, the problem that data security and applicability of the monitoring node cannot be guaranteed in the automatic access process of the monitoring node in the prior art is solved, the system configuration process of the monitoring node is optimized, and the operation efficiency of the whole cable monitoring system is improved.
Fig. 2 is a flowchart of a cable online monitoring method for secure data access according to an embodiment of the present invention. As shown in fig. 2, the method specifically includes the following steps:
acquiring a request access instruction of a monitoring node through a set open interface, wherein the request access instruction records the node type, data parameters and function authority of the monitoring node;
determining a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node.
As can be seen from the above, the cable on-line monitoring system for secure data access includes: the instruction acquisition module acquires a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node; the verification mode determining module is used for determining corresponding access verification modes based on the request access instruction, and each access verification mode comprises function verification and security verification; and the verification module is used for verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node. According to the scheme, the problem that data security and applicability of the monitoring node cannot be guaranteed in the automatic access process of the monitoring node in the prior art is solved, the system configuration process of the monitoring node is optimized, and the operation efficiency of the whole cable monitoring system is improved.
In one possible embodiment, the determining the corresponding access authentication mode based on the request access instruction includes:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
As can be seen from the above, determining a verification level according to the function authority in the request access instruction; and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction. Different levels of verification modes and corresponding verification modes are determined for the monitoring nodes with different functional authorities, and the monitoring nodes can be verified in a targeted manner, so that the verification modes of the monitoring nodes are more flexible.
In one possible embodiment, the determining the access authentication manner that meets the authentication level according to the node type and the data parameter in the access request instruction includes:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
As can be seen from the above, the first verification method is determined according to the node type and the data parameter in the request access instruction, where the node type includes a collection reporting node and a control node; and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link. And determining a first verification mode according to the node type and the data parameters of the monitoring nodes, determining a verification flow of a verification level corresponding to the first verification mode according to the functional authority of the monitoring nodes, and determining a corresponding verification mode according to the multi-dimensional association information of the monitoring nodes, so that the adaptation degree of different monitoring nodes and the corresponding access verification modes is improved, and the access verification modes of all the monitoring nodes are more reasonable.
In one possible embodiment, the verifying the monitoring node based on the determined access verification manner includes:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
From the above, it can be seen that, based on the interactive link establishment procedure of the determined access verification manner, a communication connection with the monitoring node is established; based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction. And based on the determined access verification mode, the data transmission interaction of the monitoring node is completed according to the corresponding mode, and the overall cable operation efficiency is improved on the basis of ensuring the data security.
Fig. 3 is a schematic structural diagram of a cable online monitoring device with secure data access according to an embodiment of the present invention, where, as shown in fig. 3, the device includes a processor 301, a memory 302, an input device 303, and an output device 304; the number of processors 301 in the device may be one or more, one processor 301 being taken as an example in fig. 3; the processor 301, memory 302, input device 303 and output device 304 in the apparatus may be connected by a bus or other means, in fig. 3 by way of example. The memory 302 is used as a computer readable storage medium for storing software programs, computer executable programs and modules, such as program instructions/modules corresponding to the cable online monitoring method for secure data access in the embodiment of the present invention. The processor 301 executes various functional applications of the device and data processing, namely, the cable online monitoring method for realizing the above-mentioned secure data access, by running software programs, instructions and modules stored in the memory 302. The input means 303 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the device. The output device 304 may include a display device such as a display screen.
The embodiment of the invention also provides a storage medium containing computer executable instructions, which when executed by a computer processor, are used for executing a cable online monitoring method for secure data access, the method comprising: acquiring a request access instruction of a monitoring node through a set open interface, wherein the request access instruction records the node type, data parameters and function authority of the monitoring node;
determining a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node.
It should be noted that, in the embodiment of the cable online monitoring system device for secure data access, each unit and module included in the cable online monitoring system device are only divided according to the functional logic, but not limited to the above division, so long as the corresponding functions can be realized; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the embodiments of the present invention.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the embodiments of the present invention are not limited to the particular embodiments described herein, but are capable of numerous obvious changes, rearrangements and substitutions without departing from the scope of the embodiments of the present invention. Therefore, while the embodiments of the present invention have been described in connection with the above embodiments, the embodiments of the present invention are not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.

Claims (10)

1. The cable on-line monitoring system of safety data access, characterized by comprising:
the instruction acquisition module is configured to acquire a request access instruction of the monitoring node through a set open interface, wherein the request access instruction records the node type, the data parameter and the function authority of the monitoring node;
the verification mode determining module is configured to determine a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and the verification module is configured to verify the monitoring node based on the determined access verification mode, determine the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmit monitoring data with the monitoring node.
2. The secure data access cable online monitoring system of claim 1, wherein the verification manner determination module is configured to:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
3. The cable online monitoring system for secure data access of claim 2, wherein the verification manner determination module is configured to:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
4. The secure data access cable online monitoring system of claim 3, wherein the verification module is configured to:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
5. The cable online monitoring method for the secure data access is characterized by comprising the following steps of:
acquiring a request access instruction of a monitoring node through a set open interface, wherein the request access instruction records the node type, data parameters and function authority of the monitoring node;
determining a corresponding access verification mode based on the request access instruction, wherein each access verification mode comprises function verification and security verification;
and verifying the monitoring node based on the determined access verification mode, determining the monitoring node as an accessible node under the condition that the monitoring node is successfully verified, and transmitting monitoring data with the monitoring node.
6. The method for online monitoring of a cable for secure data access according to claim 5, wherein the determining a corresponding access authentication mode based on the request access instruction comprises:
determining a verification level according to the function authority in the request access instruction;
and determining an access verification mode meeting the verification level according to the node type and the data parameters in the request access instruction.
7. The method for online monitoring of a cable for secure data access according to claim 6, wherein determining an access authentication manner satisfying the authentication level according to a node type and a data parameter in the request access command comprises:
determining a first verification mode according to node types and data parameters in the request access instruction, wherein the node types comprise acquisition reporting nodes and control nodes;
and selecting a verification processing flow corresponding to the verification level from the first verification modes as an access verification mode, wherein the verification processing flow comprises a process of processing the interactive data and the interactive link.
8. The method for online monitoring of a cable for secure data access according to claim 7, wherein the verifying the monitoring node based on the determined access verification method comprises:
establishing communication connection with the monitoring node based on the interactive link establishment process of the determined access verification mode;
based on the determined interactive data processing flow of the access verification mode, the transmission data is processed in an encrypted or unencrypted mode and then is subjected to data transmission interaction.
9. A cable on-line monitoring device for secure data access, the device comprising: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the cable on-line monitoring method of secure data access as claimed in any one of claims 5 to 8.
10. A storage medium storing computer executable instructions which when executed by a computer processor are for performing the cable online monitoring method of secure data access of any of claims 5-8.
CN202211559432.7A 2022-12-06 2022-12-06 Cable on-line monitoring system for safety data access Pending CN116247804A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211559432.7A CN116247804A (en) 2022-12-06 2022-12-06 Cable on-line monitoring system for safety data access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211559432.7A CN116247804A (en) 2022-12-06 2022-12-06 Cable on-line monitoring system for safety data access

Publications (1)

Publication Number Publication Date
CN116247804A true CN116247804A (en) 2023-06-09

Family

ID=86624911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211559432.7A Pending CN116247804A (en) 2022-12-06 2022-12-06 Cable on-line monitoring system for safety data access

Country Status (1)

Country Link
CN (1) CN116247804A (en)

Similar Documents

Publication Publication Date Title
EP1826700A1 (en) Security and authentication of information processing apparatus
CN106412024B (en) A kind of page acquisition methods and device
CN108958787B (en) Block chain system upgrading method, device, equipment and storage medium
CN112783518A (en) Vehicle-mounted application containerization isolation framework system based on IPFS and implementation method
KR20220116136A (en) Systems and methods for providing iot security service using hardware security module
US20120117380A1 (en) Method for Granting Authorization to Access a Computer-Based Object in an Automation System, Computer Program, and Automation System
CN110417849A (en) Intrusive industrial equipment edge computing system
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
US20190089681A1 (en) Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle
CN106341234A (en) Authorization method and device
CN109818742A (en) A kind of apparatus debugging method, device and storage medium
CN112291222A (en) Electric power edge calculation safety protection system and method
CN115002168A (en) Safety detection method for vehicle remote control and vehicle-mounted system
CN112862487A (en) Digital certificate authentication method, equipment and storage medium
CN113285945B (en) Communication security monitoring method, device, equipment and storage medium
CN116247804A (en) Cable on-line monitoring system for safety data access
CN115515012A (en) Key burning method and device, electronic equipment board card and storage medium
CN113377658A (en) Vehicle controller debugging method and device
CN114095496A (en) Terminal application processing method, edge cloud application server, system, and medium
CN113672993B (en) Data processing method, system, equipment and computer readable storage medium
CN113704785B (en) Safety protection detection method and device for smart home data
CN112417403B (en) Automatic system authentication and authorization processing method based on GitLab API
CN113297595A (en) Method and device for processing right-offering, storage medium and electronic equipment
CN115150120B (en) Data sharing method, terminal and system
CN117640164A (en) Back door behavior detection method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination