CN115499470B - Storage management method and device for intelligent ammeter data - Google Patents

Storage management method and device for intelligent ammeter data Download PDF

Info

Publication number
CN115499470B
CN115499470B CN202211132383.9A CN202211132383A CN115499470B CN 115499470 B CN115499470 B CN 115499470B CN 202211132383 A CN202211132383 A CN 202211132383A CN 115499470 B CN115499470 B CN 115499470B
Authority
CN
China
Prior art keywords
monitoring data
plmn
data
key
eas
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211132383.9A
Other languages
Chinese (zh)
Other versions
CN115499470A (en
Inventor
刘涛
李泽伟
林明光
孙丙功
黄振横
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Risesun Science and Technology Co Ltd
Original Assignee
Zhejiang Risesun Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Risesun Science and Technology Co Ltd filed Critical Zhejiang Risesun Science and Technology Co Ltd
Priority to CN202211132383.9A priority Critical patent/CN115499470B/en
Publication of CN115499470A publication Critical patent/CN115499470A/en
Application granted granted Critical
Publication of CN115499470B publication Critical patent/CN115499470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a storage management method and device for intelligent ammeter data, which are used for solving the technical problem that the data storage capacity of an EAS is limited. The method is applied to the EAS, and a first PLMN and a second PLMN are deployed in an edge service area where the EAS is located, in the method, since an operator network is also deployed in the edge service area where the EAS is located, such as the first PLMN and the second PLMN, the EAS can store obtained related data, such as first monitoring data and second monitoring data, into a first UDM network element in the first PLMN and a second UDM network element in the second PLMN respectively, that is, the data storage capacity of an edge application scene is improved by multiplexing the capacity of the operator network, so that storage limitation caused by the capacity of the EAS is avoided.

Description

Storage management method and device for intelligent ammeter data
Technical Field
The present disclosure relates to the field of communications, and in particular, to a method and an apparatus for storing and managing data of an intelligent ammeter.
Background
The architecture enabling the edge application is an architecture of an application layer in the fifth generation mobile communication system (5th generation,5G) for using the deployed edge application by enabling a User Equipment (UE). Therefore, the user can access the nearby edge application to achieve the purpose of optimizing the resource access process of the user, such as reducing the network transmission delay between the user and the computing resource and improving the user experience. For example, edge application servers (edge application server, EAS) may be deployed near internet of things devices, such as smart meters, to enable low-latency collection of internet of things device data, such as smart meter monitoring data.
Typically, EAS may store the acquired data locally, but limited by the capabilities of the EAS, the amount of data stored locally is limited.
Disclosure of Invention
The embodiment of the application provides a storage management method and device for data of an intelligent ammeter, which are used for solving the technical problem that the data storage capacity of an EAS is limited.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, a method for storing and managing data of a smart meter is provided, where the method is applied to EAS, and a first PLMN and a second PLMN are deployed in an edge service area where the EAS is located, and the method includes: the EAS acquires monitoring data of the intelligent ammeter from the UE associated with the EAS; the method comprises the steps that an EAS determines first monitoring data and second monitoring data according to monitoring data of the intelligent electric meter, wherein the first monitoring data are associated with the monitoring data of the intelligent electric meter, and the second monitoring data are associated with the monitoring data of the intelligent electric meter; the EAS stores the first monitoring data in a first UDM network element within the first PLMN, and the EAS stores the second monitoring data in a second UDM network element within the second PLMN.
Based on the method of the first aspect, as the operator network, such as the first PLMN and the second PLMN, is also deployed in the edge service area where the EAS is located, the EAS may store the obtained relevant data, such as the first monitoring data and the second monitoring data, in the first UDM network element in the first PLMN and the second UDM network element in the second PLMN, respectively, that is, the data storage capability of the edge application scenario is improved by multiplexing the capability of the operator network, so as to avoid the limitation of storage caused by the capability of the EAS.
In addition, the operator network is used as granularity for distributed storage, so that the situation that all data are leaked by one operator network can be avoided, and the data storage risk is further reduced; and moreover, the data storage load of the operator network can be reduced, and excessive occupation of resources of the operator network due to data storage of the EAS is avoided.
In one possible design, the EAS determines first monitoring data and second monitoring data based on monitoring data of the smart meter, including: the EAS obtains first monitoring data through a first mapping on the monitoring data of the intelligent ammeter, and obtains second monitoring data through a second mapping on the monitoring data of the intelligent ammeter. It can be understood that the original data in the plaintext, that is, the monitoring data of the smart meter, can be prevented from being directly exposed to the network of the operator through mapping, so that the data security is improved.
Optionally, the EAS obtains the first monitoring data from the monitoring data of the smart meter through a first mapping, including: the method comprises the steps that the EAS obtains at least part of first data in monitoring data of the intelligent ammeter; the EAS maps at least part of the first data to a vector space to obtain first vector data, wherein the first vector data comprises a multi-dimensional first vector; and the EAS performs dimensionality reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data. That is, the data amount can be reduced by the dimension reduction in the case of preserving the original data structure of the first monitoring data, so that the storage efficiency can be improved.
Optionally, the EAS obtains second monitoring data from the second mapping the monitoring data of the smart meter, including: the EAS acquires at least part of second data in the monitoring data of the intelligent ammeter; the EAS maps at least part of the second data to a vector space to obtain third vector data, wherein the third vector data comprises a multidimensional third vector; and the EAS performs dimensionality reduction compression on the third vector data to obtain fourth vector data, wherein the second vector data is second monitoring data. That is, the data amount can be reduced by the dimension reduction in the case of preserving the original data structure of the first monitoring data, so that the storage efficiency can be improved.
It will be appreciated that the EAS may acquire the first monitoring data and the second monitoring data in any possible manner, for example, the first monitoring data and the second monitoring data may be selected arbitrarily from monitoring data of the smart meter by the EAS, so long as the data combined by the first monitoring data and the second monitoring data includes meter monitoring data, which is not limited.
In one possible design, the EAS stores first monitoring data of the meter monitoring data in a first UDM network element within a first PLMN, comprising: the EAS encrypts the first monitoring data by using a first key to obtain encrypted first monitoring data, wherein the first key is related to a first PLMN or a second PLMN; the EAS stores the encrypted first monitoring data in the first UDM network element to further enhance data security.
Optionally, the first key associating the first PLMN or the second PLMN means: the first key is a key deduced based on a master authentication key of the UE in the first PLMN, or the first key is a key deduced based on a master authentication key of the UE in the second PLMN, that is, the data encryption is realized by multiplexing an existing key of the operator network, so as to reduce the realization difficulty and support the current protocol. It will be appreciated that since the EAS belongs to a third party application and not to a network element within the first PLMN, the EAS has the ability to encrypt the first data using the master authentication key of the UE in the second PLMN and store it to the first PLMN.
In one possible design, the EAS stores a second one of the meter monitoring data in a second UDM network element within a second PLMN, comprising: the EAS encrypts the second monitoring data by using a second key to obtain encrypted second monitoring data, wherein the second key is related to the first PLMN or the second PLMN; the EAS stores the encrypted second monitoring data in the second UDM network element to further enhance data security.
Optionally, the second key associating the first PLMN or the second PLMN means: the second key is a key deduced based on a master authentication key of the UE in the first PLMN, or the second key is a key deduced based on a master authentication key of the UE in the second PLMN, that is, the data encryption is implemented by multiplexing an existing key of the operator network, so as to reduce implementation difficulty and support the current protocol. It will be appreciated that since the EAS belongs to a third party application and not to a network element within the second PLMN, the EAS is also capable of encrypting the second data using the master authentication key of the UE in the first PLMN and storing it to the second PLMN.
Further, the first PLMN is an HPLMN of the UE, and the second PLMN is a VPLMN of the UE; alternatively, the second PLMN is an HPLMN of the UE, and the first PLMN is a VPLMN of the UE, without limitation.
In a second aspect, a first PLMN and a second PLMN are disposed in an edge service area where a device for storing and managing smart meter data is located, where the device includes: the device comprises a receiving and transmitting module and a processing module, wherein the receiving and transmitting module is used for acquiring monitoring data of the intelligent ammeter from UE (user equipment) associated with the device; the processing module is used for determining first monitoring data and second monitoring data according to the monitoring data of the intelligent electric meter, wherein the first monitoring data are associated with the monitoring data of the intelligent electric meter, and the second monitoring data are associated with the monitoring data of the intelligent electric meter; and the transceiver module is used for storing the first monitoring data in a first UDM network element in the first PLMN and storing the second monitoring data in a second UDM network element in the second PLMN.
In one possible design, the processing module is configured to obtain the first monitoring data from the monitoring data of the smart meter through a first mapping, and obtain the second monitoring data from the monitoring data of the smart meter through a second mapping.
Optionally, the processing module is configured to obtain at least part of first data in the monitoring data of the smart meter; mapping at least part of the first data to a vector space to obtain first vector data, wherein the first vector data comprises a multi-dimensional first vector; and performing dimension reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data.
Optionally, the processing module is configured to obtain at least part of second data in the monitoring data of the smart meter; mapping at least part of the second data to a vector space to obtain third vector data, wherein the third vector data comprises a multidimensional third vector; and performing dimension reduction compression on the third vector data to obtain fourth vector data, wherein the second vector data is second monitoring data.
In a possible design, the processing module is configured to encrypt the first monitoring data using a first key to obtain encrypted first monitoring data, where the first key is associated with the first PLMN or the second PLMN; the processing module is further configured to store the encrypted first monitoring data in the first UDM network element.
Optionally, the first key associating the first PLMN or the second PLMN means: the first key is a key derived based on a master authentication key of the UE in the first PLMN, or the first key is a key derived based on a master authentication key of the UE in the second PLMN.
In a possible design, the processing module is configured to encrypt the second monitoring data using a second key to obtain encrypted second monitoring data, where the second key is associated with the first PLMN or the second PLMN; and the processing module is also used for storing the encrypted second monitoring data in the second UDM network element.
Optionally, the second key associating the first PLMN or the second PLMN means: the second key is a key derived based on a master authentication key of the UE in the first PLMN, or the second key is a key derived based on a master authentication key of the UE in the second PLMN.
Further, the first PLMN is an HPLMN of the UE, and the second PLMN is a VPLMN of the UE; alternatively, the second PLMN is an HPLMN of the UE, and the first PLMN is a VPLMN of the UE, without limitation.
Alternatively, the transceiver module may include a transmitting module and a receiving module. The sending module is used for realizing the sending function of the device according to the second aspect, and the receiving module is used for realizing the receiving function of the device according to the second aspect.
Optionally, the apparatus according to the second aspect may further include a storage module, where the storage module stores a program or instructions. The program or instructions, when executed by the processing module, enable the apparatus to perform the method of the first aspect.
The apparatus of the second aspect may be a network device, or may be a chip (system) or other parts or components that may be disposed in the network device, or may be an apparatus including the network device, which is not limited in this application.
Further, the technical effects of the apparatus according to the second aspect may refer to the technical effects of the method according to the first aspect, which are not described herein.
In a third aspect, there is provided an apparatus comprising: a processor and a memory; the memory is for storing a computer program which, when executed by the processor, causes the apparatus to perform the method of the first aspect.
In one possible design, the device according to the third aspect may further comprise a transceiver. The transceiver may be a transceiver circuit or an interface circuit. The transceiver may be for use in a device according to the third aspect to communicate with other devices.
In this application, the apparatus of the third aspect may be a network device, or a chip (system) or other part or component that may be disposed in the network device, or an apparatus that includes the network device.
In addition, the technical effects of the apparatus described in the third aspect may refer to the technical effects of the method described in the first aspect, which are not described herein.
In a fourth aspect, there is provided a computer-readable storage medium comprising: computer programs or instructions; the computer program or instructions, when run on a computer, cause the computer to perform the method of the first aspect.
In a fifth aspect, there is provided a computer program product comprising a computer program or instructions which, when run on a computer, cause the computer to perform the method of the first aspect.
Drawings
Fig. 1 is a schematic architecture diagram of a 5G network according to an embodiment of the present application;
fig. 2 is a schematic architecture diagram of a communication system according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of a method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a device according to an embodiment of the present application.
Detailed Description
The technical solution of the embodiments of the present application may be applied to various communication systems, such as a wireless fidelity (wireless fidelity, wiFi) system, a vehicle-to-object (vehicle to everything, V2X) communication system, an inter-device (D2D) communication system, a vehicle networking communication system, a 4th generation (4th generation,4G) mobile communication system, such as a long term evolution (long term evolution, LTE) system, a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, a fifth generation (5th generation,5G) mobile communication system, such as a new radio, NR) system, and future communication systems, such as a sixth generation (6th generation,6G) mobile communication system, and the like.
The present application will present various aspects, embodiments, or features about a system that may include multiple devices, components, modules, etc. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, combinations of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary," "for example," and the like are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
In the embodiment of the present application, "information", "signal", "message", "channel", and "signaling" may be used in a mixed manner, and it should be noted that the meaning of the expression is matched when the distinction is not emphasized. "of", "corresponding" and "corresponding" are sometimes used in combination, and it should be noted that the meanings to be expressed are matched when the distinction is not emphasized. Furthermore, references to "/" herein may be used to indicate a relationship of "or".
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
Fig. 1 is a schematic diagram of a 5GS non-roaming architecture. As shown in fig. 1, 5GS includes: access Networks (ANs) and Core Networks (CNs), may further include: and (5) a terminal.
The terminal may be a terminal having a transceiver function, or a chip system that may be provided in the terminal. The terminal may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit (subscriber unit), a subscriber station, a Mobile Station (MS), a remote station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user device. The terminals in embodiments of the present application may be mobile phones (mobile phones), cellular phones (cellular phones), smart phones (smart phones), tablet computers (pads), wireless data cards, personal digital assistants (personal digital assistant, PDAs), wireless modems (modems), handheld devices (handsets), laptop computers (lap computers), machine type communication (machine type communication, MTC) terminals, computers with wireless transceiving functions, virtual Reality (VR) terminals, augmented reality (augmented reality, AR) terminals, wireless terminals in industrial control (industrial control), wireless terminals in unmanned aerial vehicle (self driving), wireless terminals in smart grid (smart grid), wireless terminals in transportation security (transportation safety), wireless terminals in smart city (smart city), wireless terminals in smart home (smart home), roadside units with functions, RSU, etc. The terminal of the present application may also be an in-vehicle module, an in-vehicle component, an in-vehicle chip, or an in-vehicle unit built into a vehicle as one or more components or units.
The AN is used for realizing the function related to access, providing the network access function for authorized users in a specific area, and determining transmission links with different qualities according to the level of the users, the service requirements and the like so as to transmit user data. The AN forwards control signals and user data between the terminal and the CN. The AN may include: an access network device, which may also be referred to as a radio access network device (radio access network, RAN) device. The CN is mainly responsible for maintaining subscription data of the mobile network and providing session management, mobility management, policy management, security authentication and other functions for the terminal. The CN mainly comprises the following network elements: user plane function (user plane function, UPF) network elements, authentication service function (authentication server function, AUSF) network elements, access and mobility management function (access and mobility management function, AMF) network elements, session management function (session management function, SMF) network elements, network slice selection function (network slice selection function, NSSF) network elements, network opening function (network exposure function, NEF) network elements, network function warehousing function (NF repository function, NRF) network elements, policy control function (policy control function, PCF) network elements, unified data management (unified data management, UDM) network elements, unified data storage (unified data repository, UDR), and application function (application function, AF).
As shown in fig. 1, a UE accesses a 5G network through RAN equipment, and the UE communicates with an AMF network element through an N1 interface (abbreviated as N1); the RAN network element communicates with the AMF network element through an N2 interface (N2 for short); the RAN network element communicates with the UPF network element through an N3 interface, namely N3; the SMF communicates with a UPF network element through an N4 interface (abbreviated as N4), and the UPF network element accesses a Data Network (DN) through an N6 interface (abbreviated as N6). In addition, the control plane functions of the AUSF network element, the AMF network element, the SMF network element, the NSSF network element, the NEF network element, the NRF network element, the PCF network element, the UDM network element, the UDR network element, or the AF shown in fig. 1 use a service interface to perform interaction. For example, the server interface provided by the AUSF network element is Nausf; the AMF network element provides a service interface as Namf; the SMF network element provides a serving interface as Nsmf; the NSSF provides a service interface for the outside as Nnssf; the network element of NEF provides a service interface for the outside as Nnef; the service interface externally provided by the NRF network element is Nnrf; the service interface externally provided by the PCF network element is an Npcf; the service interface externally provided by the UDM network element is Nudm; the server interface externally provided by the UDR network element is Nudr; the service interface provided by the AF is Naf.
The RAN device may be a device that provides access to the terminal. For example, the RAN device may include: the next generation mobile communication system, such as a 6G access network device, such as a 6G base station, or in the next generation mobile communication system, the network device may have other nomenclature, which is covered by the protection scope of the embodiments of the present application, which is not limited in any way. Alternatively, the RAN device may also include a 5G, such as a gNB in a New Radio (NR) system, or one or a group (including multiple antenna panels) of base stations in the 5G, or may also be a network node, such as a baseband unit (building base band unit, BBU), or a Centralized Unit (CU) or a Distributed Unit (DU), an RSU with a base station function, or a wired access gateway, or a core network element of the 5G, which forms a gNB, a transmission point (transmission and reception point, TRP or transmission point, TP), or a transmission measurement function (transmission measurement function, TMF). Alternatively, the RAN device may also include an Access Point (AP) in a wireless fidelity (wireless fidelity, wiFi) system, a wireless relay node, a wireless backhaul node, various forms of macro base stations, micro base stations (also referred to as small stations), relay stations, access points, wearable devices, vehicle devices, and so on.
The UPF network element is mainly responsible for user data processing (forwarding, receiving, charging, etc.). For example, the UPF network element may receive user data from a Data Network (DN), which is forwarded to the terminal through the access network device. The UPF network element may also receive user data from the terminal through the access network device and forward the user data to the DN. DN network elements refer to the operator network that provides data transmission services for subscribers. Such as the internet protocol (internet protocol, IP) Multimedia Services (IMS), the internet, etc. The DN may be an external network of the operator or a network controlled by the operator, and is configured to provide service to the terminal device.
The AUSF network element is mainly used for executing security authentication of the terminal.
The AMF network element is mainly used for mobility management in a mobile network. Such as user location updates, user registration networks, user handoffs, etc.
The SMF network element is mainly used for session management in a mobile network. Such as session establishment, modification, release. Specific functions are for example assigning internet protocol (internet protocol, IP) addresses to users, selecting UPF network elements providing packet forwarding functions, etc.
The PCF network element mainly supports providing a unified policy framework to control network behavior, provides policy rules for a control layer network function, and is responsible for acquiring user subscription information related to policy decision. The PCF network element may provide policies, such as quality of service (quality of service, qoS) policies, slice selection policies, etc., to the AMF network element, SMF network element.
The NSSF network element is mainly used to select network slices for the terminal.
The NEF network element is mainly used for supporting the opening of capabilities and events.
The UDM network element is mainly used for storing subscriber data, such as subscription data, authentication/authorization data, etc.
The UDR network element is mainly used for storing structured data, and the stored content includes subscription data and policy data, externally exposed structured data and application related data.
AF mainly supports interactions with CN to provide services, such as influencing data routing decisions, policy control functions or providing some services of third parties to the network side. One specific implementation of AF may be EAS.
To facilitate understanding of the embodiments of the present application, a communication system suitable for the embodiments of the present application will be described in detail first with reference to the communication system shown in fig. 2 as an example. Fig. 2 is a schematic diagram of a communication system to which the method according to the embodiment of the present application is applicable.
As shown in fig. 2, the communication system may be applied to the above-described 5GS shown in fig. 1, and mainly includes: EAS and UDM network elements. EAS belongs to a third party service, i.e., EAS does not belong to the carrier network. EAS may use edge applications deployed in the edge service area of the carrier network, or the area where EAS is deployed may become the edge service area, i.e., the edge service area of EAS. The UDM network element may comprise a plurality of UDM network elements located within an edge service area of the EAS. The plurality of UDM network elements may each belong to a different operator network. For example, UDM network element 1 belongs to PLMN1 and UDM network element 2 belongs to PLMN2.
It will be readily appreciated that the interaction between EAS and UDM network elements will be specifically described below by way of a method embodiment in connection with fig. 3. As shown in fig. 3, the method is applied to EAS, where a first public land mobile network (public land mobile network, PLMN), i.e. a first operator network, and a second PLMN, i.e. a second operator network, are deployed in an edge service area where the EAS is located. The method comprises the following steps:
s301, the EAS acquires monitoring data of the intelligent ammeter from the EAS-related UE.
The EAS may acquire the monitoring data of the smart meter from the UE in any possible manner, such as a periodic or event triggered manner. The UE may be considered as a control terminal of the smart meters for controlling the smart meters. Optionally, the first PLMN is a home public land mobile network (home public land mobile network, HPLMN) of the UE and the second PLMN is a visited public land mobile network (visited public land mobile network, VPLMN) of the UE; alternatively, the second PLMN is an HPLMN of the UE, and the first PLMN is a VPLMN of the UE, without limitation.
S302, determining first monitoring data and second monitoring data by the EAS according to the monitoring data of the intelligent ammeter.
The first monitoring data are associated with the monitoring data of the intelligent electric meter, and the second monitoring data are associated with the monitoring data of the intelligent electric meter.
In one possible design, the EAS may obtain the first monitoring data from the monitoring data of the smart meter via a first mapping, and the EAS may obtain the second monitoring data from the monitoring data of the smart meter via a second mapping. It can be understood that the original data in the plaintext, that is, the monitoring data of the smart meter, can be prevented from being directly exposed to the network of the operator through mapping, so that the data security is improved.
For example, the EAS may acquire at least a portion of the first data in the monitoring data of the smart meter; the EAS maps at least part of the first data to a vector space to obtain first vector data, wherein the first vector data comprises a multi-dimensional first vector; and the EAS performs dimensionality reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data. That is, the data amount can be reduced by the dimension reduction in the case of preserving the original data structure of the first monitoring data, so that the storage efficiency can be improved.
For another example, the EAS may obtain at least a portion of the second data in the monitoring data of the smart meter; the EAS maps at least part of the second data to a vector space to obtain third vector data, wherein the third vector data comprises a multidimensional third vector; and the EAS performs dimensionality reduction compression on the third vector data to obtain fourth vector data, wherein the second vector data is second monitoring data. That is, the data amount can be reduced by the dimension reduction in the case of preserving the original data structure of the first monitoring data, so that the storage efficiency can be improved.
It will be appreciated that the EAS may acquire the first monitoring data and the second monitoring data in any possible manner, for example, the first monitoring data and the second monitoring data may be selected arbitrarily from monitoring data of the smart meter by the EAS, so long as the data combined by the first monitoring data and the second monitoring data includes meter monitoring data, which is not limited.
S303, EAS stores the first monitoring data in a first UDM network element in the first PLMN, and EAS stores the second monitoring data in a second UDM network element in the second PLMN.
The EAS may encrypt the first monitoring data using a first key to obtain encrypted first monitoring data, where the first key is associated with the first PLMN or the second PLMN; the EAS stores the encrypted first monitoring data in the first UDM network element to further enhance data security. Optionally, the first key associating the first PLMN or the second PLMN means: the first key is a key deduced based on a master authentication key of the UE in the first PLMN, or the first key is a key deduced based on a master authentication key of the UE in the second PLMN, that is, the data encryption is realized by multiplexing an existing key of the operator network, so as to reduce the realization difficulty and support the current protocol. It will be appreciated that since the EAS belongs to a third party application and not to a network element within the first PLMN, the EAS has the ability to encrypt the first data using the master authentication key of the UE in the second PLMN and store it to the first PLMN.
Alternatively, the EAS may further encrypt the second monitoring data using a second key to obtain encrypted second monitoring data, where the second key is associated with the first PLMN or the second PLMN; the EAS stores the encrypted second monitoring data in the second UDM network element to further enhance data security. Optionally, the second key associating the first PLMN or the second PLMN means: the second key is a key deduced based on a master authentication key of the UE in the first PLMN, or the second key is a key deduced based on a master authentication key of the UE in the second PLMN, that is, the data encryption is implemented by multiplexing an existing key of the operator network, so as to reduce implementation difficulty and support the current protocol. It will be appreciated that since the EAS belongs to a third party application and not to a network element within the second PLMN, the EAS is also capable of encrypting the second data using the master authentication key of the UE in the first PLMN and storing it to the second PLMN.
In summary, since the operator network, such as the first PLMN and the second PLMN, is also disposed in the edge service area where the EAS is located, the EAS may store the obtained related data, such as the first monitoring data and the second monitoring data, into the first UDM network element in the first PLMN and the second UDM network element in the second PLMN, respectively, that is, the data storage capability of the edge application scenario is improved by multiplexing the capability of the operator network, so as to avoid the limitation of storage caused by the capability of the EAS. In addition, the operator network is used as granularity for distributed storage, so that the situation that all data are leaked by one operator network can be avoided, and the data storage risk is further reduced; and moreover, the data storage load of the operator network can be reduced, and excessive occupation of resources of the operator network due to data storage of the EAS is avoided.
The method provided in the embodiment of the present application is described in detail above in connection with fig. 3. The following describes in detail the apparatus for performing the method provided in the embodiments of the present application with reference to fig. 4 and 5.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present application. As shown in fig. 4, the apparatus 400 includes: a transceiver module 401 and a processing module 402. For ease of illustration, fig. 4 shows only the main components of the device.
A transceiver module 401, configured to obtain monitoring data of the smart meter from the UE associated with the device; the processing module 402 is configured to determine first monitoring data and second monitoring data according to monitoring data of the smart meter, where the first monitoring data is associated with monitoring data of the smart meter, and the second monitoring data is associated with monitoring data of the smart meter; a transceiver module 401 for storing first monitoring data in a first UDM network element in a first PLMN and second monitoring data in a second UDM network element in a second PLMN.
In a possible design, the processing module 402 is configured to obtain the first monitoring data from the monitoring data of the smart meter through a first mapping, and obtain the second monitoring data from the monitoring data of the smart meter through a second mapping.
Optionally, the processing module 402 is configured to obtain at least part of the first data in the monitoring data of the smart meter; mapping at least part of the first data to a vector space to obtain first vector data, wherein the first vector data comprises a multi-dimensional first vector; and performing dimension reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data.
Optionally, the processing module 402 is configured to obtain at least part of second data in the monitoring data of the smart meter; mapping at least part of the second data to a vector space to obtain third vector data, wherein the third vector data comprises a multidimensional third vector; and performing dimension reduction compression on the third vector data to obtain fourth vector data, wherein the second vector data is second monitoring data.
In a possible design, the processing module 402 is configured to encrypt the first monitoring data with a first key to obtain encrypted first monitoring data, where the first key is associated with the first PLMN or the second PLMN; the processing module 402 is further configured to store the encrypted first monitoring data in the first UDM network element.
Optionally, the first key associating the first PLMN or the second PLMN means: the first key is a key derived based on a master authentication key of the UE in the first PLMN, or the first key is a key derived based on a master authentication key of the UE in the second PLMN.
In a possible design, the processing module 402 is configured to encrypt the second monitoring data with a second key to obtain encrypted second monitoring data, where the second key is associated with the first PLMN or the second PLMN; the processing module 402 is further configured to store the encrypted second monitoring data in the second UDM network element.
Optionally, the second key associating the first PLMN or the second PLMN means: the second key is a key derived based on a master authentication key of the UE in the first PLMN, or the second key is a key derived based on a master authentication key of the UE in the second PLMN.
Further, the first PLMN is an HPLMN of the UE, and the second PLMN is a VPLMN of the UE; alternatively, the second PLMN is an HPLMN of the UE, and the first PLMN is a VPLMN of the UE, without limitation.
Alternatively, the transceiver module 401 may include a transmitting module (not shown in fig. 4) and a receiving module (not shown in fig. 4). The transmitting module is configured to implement a transmitting function of the apparatus 300, and the receiving module is configured to implement a receiving function of the apparatus 400.
Optionally, the apparatus 400 may further comprise a storage module (not shown in fig. 4) storing a program or instructions. The processing module 402, when executing the program or instructions, enables the apparatus 400 to perform the methods described above.
The apparatus 300 may be a network device, a chip (system) or other parts or components that may be disposed in the network device, or an apparatus including the network device, which is not limited in this application.
In addition, the technical effects of the apparatus 400 may refer to the technical effects of the method shown in fig. 3, which are not described herein.
Fig. 5 is a schematic structural diagram of a second embodiment of the device. The apparatus may be a network device, or may be a chip (system) or other part or component that may be provided in the network device. As shown in fig. 5, apparatus 500 may include a processor 501. Optionally, the apparatus 500 may further comprise a memory 502 and/or a transceiver 503. Wherein the processor 501 is coupled to the memory 502 and the transceiver 503, such as may be connected by a communication bus.
The various components of the apparatus 500 are described in detail below in conjunction with fig. 5:
the processor 501 is a control center of the apparatus 500, and may be one processor or a generic name of a plurality of processing elements. For example, processor 501 is one or more central processing units (central processing unit, CPU), but may also be an integrated circuit (application specific integrated circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present application, such as: one or more microprocessors (digital signal processor, DSPs), or one or more field programmable gate arrays (field programmable gate array, FPGAs).
Alternatively, the processor 501 may perform various functions of the apparatus 500, such as performing the method shown in fig. 2 described above, by running or executing a software program stored in the memory 502 and invoking data stored in the memory 502.
In a particular implementation, processor 501 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 5, as an embodiment.
In a specific implementation, the apparatus 1200 may also include a plurality of processors, such as the processor 501 and the processor 505 shown in fig. 5, as an embodiment. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 502 is configured to store a software program for executing the solution of the present application, and the processor 501 controls the execution of the software program, and the specific implementation may refer to the above method embodiment, which is not described herein again.
Alternatively, memory 502 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that may store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that may store information and instructions, but may also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (compact disc read-only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 502 may be integrated with the processor 501 or may exist separately and be coupled to the processor 501 through an interface circuit (not shown in fig. 5) of the apparatus 500, which is not specifically limited in this embodiment of the present application.
A transceiver 503 for communication with other devices. For example, the apparatus 500 is a terminal, and the transceiver 503 may be configured to communicate with a network device or with another terminal device. For another example, the apparatus 500 is a network device and the transceiver 503 may be configured to communicate with a terminal or another network device.
Alternatively, the transceiver 503 may include a receiver and a transmitter (not separately shown in fig. 5). The receiver is used for realizing the receiving function, and the transmitter is used for realizing the transmitting function.
Alternatively, the transceiver 503 may be integrated with the processor 501, or may exist separately, and be coupled to the processor 501 through an interface circuit (not shown in fig. 5) of the apparatus 500, which is not specifically limited in this embodiment of the present application.
It should be noted that the structure of the apparatus 500 shown in fig. 5 is not limited to the apparatus, and an actual apparatus may include more or less components than those shown, or may be combined with some components, or may be different in arrangement of components.
In addition, the technical effects of the apparatus 500 may refer to the technical effects of the method described in the above method embodiments, which are not described herein.
It should be appreciated that the processor in embodiments of the present application may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example but not limitation, many forms of random access memory (random access memory, RAM) are available, such as Static RAM (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions described in accordance with the embodiments of the present application are all or partially produced. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In addition, the character "/" herein generally indicates that the associated object is an "or" relationship, but may also indicate an "and/or" relationship, and may be understood by referring to the context.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. The utility model provides a storage management method of smart electric meter data, characterized in that, the method is applied to the EAS, and the edge service area that EAS is located disposes first PLMN and second PLMN, and the method includes:
the EAS acquires monitoring data of a smart meter from the EAS-associated UE;
the EAS determines first monitoring data and second monitoring data according to the monitoring data of the intelligent electric meter, wherein the first monitoring data is associated with the monitoring data of the intelligent electric meter, and the second monitoring data is associated with the monitoring data of the intelligent electric meter;
the EAS storing the first monitoring data in a first UDM network element within the first PLMN, and the EAS storing the second monitoring data in a second UDM network element within the second PLMN;
Wherein, the EAS determines first monitoring data and second monitoring data according to the monitoring data of the smart meter, including:
the EAS obtains the first monitoring data through a first mapping from the monitoring data of the intelligent ammeter, and obtains the second monitoring data through a second mapping from the monitoring data of the intelligent ammeter;
the EAS obtains the first monitoring data from the monitoring data of the smart meter through a first mapping, including:
the EAS acquires at least part of first data in the monitoring data of the smart meter;
the EAS maps at least a portion of the first data to a vector space to obtain first vector data, wherein the first vector data includes a multi-dimensional first vector;
the EAS performs dimensionality reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data;
and the EAS obtaining the second monitoring data from the monitoring data of the smart meter through a second mapping, including:
the EAS acquires at least part of second data in the monitoring data of the smart meter;
the EAS maps at least a portion of the second data to a vector space to obtain third vector data, wherein the third vector data includes a third vector of multiple dimensions;
And the EAS performs dimensionality reduction compression on the third vector data to obtain fourth vector data, wherein the fourth vector data is the second monitoring data.
2. The method of claim 1, wherein the EAS stores the first monitoring data in a first UDM network element within the first PLMN, comprising:
the EAS encrypts the first monitoring data using a first key to obtain encrypted first monitoring data, wherein the first key is associated with the first PLMN or the second PLMN;
the EAS storing the encrypted first monitoring data at the first UDM network element;
wherein the first key associated with the first PLMN or the second PLMN means: the first key is a key derived based on a master authentication key of the UE in the first PLMN or the first key is a key derived based on a master authentication key of the UE in the second PLMN.
3. The method of claim 1, wherein the EAS stores the second monitoring data in a second UDM network element within the second PLMN, comprising:
the EAS encrypts the second monitoring data using a second key to obtain encrypted second monitoring data, wherein the second key is associated with a first PLMN or the second PLMN;
The EAS storing the encrypted second monitoring data at the second UDM network element;
wherein the second key associated with the first PLMN or the second PLMN means: the second key is a key derived based on a master authentication key of the UE in the first PLMN, or the second key is a key derived based on a master authentication key of the UE in the second PLMN.
4. The method of claim 1, wherein the first PLMN is an HPLMN of the UE and the second PLMN is a VPLMN of the UE; alternatively, the second PLMN is an HPLMN of the UE and the first PLMN is a VPLMN of the UE.
5. The utility model provides a storage management device of smart electric meter data which characterized in that, the marginal service area that the device was located disposes first PLMN and second PLMN, the device includes: a transceiver module and a processing module, wherein,
the receiving and transmitting module is used for acquiring monitoring data of the intelligent ammeter from the UE associated with the device;
the processing module is used for determining first monitoring data and second monitoring data according to the monitoring data of the intelligent electric meter, wherein the first monitoring data are associated with the monitoring data of the intelligent electric meter, and the second monitoring data are associated with the monitoring data of the intelligent electric meter;
The transceiver module is configured to store the first monitoring data in a first UDM network element in the first PLMN, and store the second monitoring data in a second UDM network element in the second PLMN;
the processing module is used for obtaining first monitoring data through a first mapping of the monitoring data of the intelligent electric meter and obtaining second monitoring data through a second mapping of the monitoring data of the intelligent electric meter;
the processing module is used for acquiring at least part of first data in the monitoring data of the intelligent ammeter; mapping at least part of the first data to a vector space to obtain first vector data, wherein the first vector data comprises a multi-dimensional first vector; performing dimension reduction compression on the first vector data to obtain second vector data, wherein the second vector data is the first monitoring data;
the processing module is used for acquiring at least part of second data in the monitoring data of the intelligent ammeter; mapping at least part of the second data to a vector space to obtain third vector data, wherein the third vector data comprises a multidimensional third vector; and performing dimension reduction compression on the third vector data to obtain fourth vector data, wherein the fourth vector data is the second monitoring data.
6. The apparatus of claim 5, wherein the processing module is configured to encrypt the first monitoring data using a first key to obtain the encrypted first monitoring data, wherein the first key is associated with the first PLMN or the second PLMN; the receiving and transmitting module is used for storing the encrypted first monitoring data in the first UDM network element; wherein the first key associated with the first PLMN or the second PLMN means: the first key is a key derived based on a master authentication key of the UE in the first PLMN or the first key is a key derived based on a master authentication key of the UE in the second PLMN.
7. The apparatus of claim 5, wherein the processing module is configured to encrypt the second monitoring data using a second key to obtain the encrypted second monitoring data, wherein the second key is associated with a first PLMN or the second PLMN; the transceiver module is configured to store the encrypted second monitoring data in the second UDM network element, where the second key is associated with the first PLMN or the second PLMN refers to: the second key is a key derived based on a master authentication key of the UE in the first PLMN, or the second key is a key derived based on a master authentication key of the UE in the second PLMN.
8. The apparatus of claim 5, wherein the first PLMN is an HPLMN of the UE and the second PLMN is a VPLMN of the UE; alternatively, the second PLMN is an HPLMN of the UE and the first PLMN is a VPLMN of the UE.
CN202211132383.9A 2022-09-17 2022-09-17 Storage management method and device for intelligent ammeter data Active CN115499470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211132383.9A CN115499470B (en) 2022-09-17 2022-09-17 Storage management method and device for intelligent ammeter data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211132383.9A CN115499470B (en) 2022-09-17 2022-09-17 Storage management method and device for intelligent ammeter data

Publications (2)

Publication Number Publication Date
CN115499470A CN115499470A (en) 2022-12-20
CN115499470B true CN115499470B (en) 2023-08-04

Family

ID=84467713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211132383.9A Active CN115499470B (en) 2022-09-17 2022-09-17 Storage management method and device for intelligent ammeter data

Country Status (1)

Country Link
CN (1) CN115499470B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730499A (en) * 2018-07-16 2020-01-24 华为技术有限公司 MEC information acquisition method and device
CN113795014A (en) * 2021-08-05 2021-12-14 华为技术有限公司 Method and device for discovering edge application server
CN113840293A (en) * 2021-08-18 2021-12-24 华为技术有限公司 Method and device for acquiring edge service
CN113938910A (en) * 2020-07-13 2022-01-14 华为技术有限公司 Communication method and device
CN114982285A (en) * 2020-01-13 2022-08-30 高通股份有限公司 System and method for prioritized mobility for access edge servers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10986602B2 (en) * 2018-02-09 2021-04-20 Intel Corporation Technologies to authorize user equipment use of local area data network features and control the size of local area data network information in access and mobility management function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730499A (en) * 2018-07-16 2020-01-24 华为技术有限公司 MEC information acquisition method and device
CN114982285A (en) * 2020-01-13 2022-08-30 高通股份有限公司 System and method for prioritized mobility for access edge servers
CN113938910A (en) * 2020-07-13 2022-01-14 华为技术有限公司 Communication method and device
CN113795014A (en) * 2021-08-05 2021-12-14 华为技术有限公司 Method and device for discovering edge application server
CN113840293A (en) * 2021-08-18 2021-12-24 华为技术有限公司 Method and device for acquiring edge service

Also Published As

Publication number Publication date
CN115499470A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN114584969B (en) Information processing method and device based on associated encryption
US20220225463A1 (en) Communications method, apparatus, and system
CN115499470B (en) Storage management method and device for intelligent ammeter data
CN115706997A (en) Authorization verification method and device
CN115567899B (en) Error analysis method and device for intelligent ammeter
CN113473553A (en) Communication method and communication device
CN117221884B (en) Base station system information management method and system
CN116887009B (en) End cloud integrated video structuring method and system based on 5G network
CN114640988B (en) Information processing method and device based on implicit indication encryption
CN115499788B (en) Distributed node-based risk area determination method and device
CN115320428B (en) Charging control method and device for electric automobile charging pile
CN117439819B (en) PDU cabinet safety monitoring method
CN117528462B (en) Industrial Internet of things data transmission method realized by multi-network networking
CN116561810B (en) Storage management big data processing method and device based on hybrid cloud platform
CN116528234B (en) Virtual machine security and credibility verification method and device
CN117202287B (en) Order distribution management method and device based on big data analysis
CN117478431B (en) Industrial Internet of things control method based on trusted network
CN117336167A (en) Network distribution method and system for Internet of things equipment
CN117715040B (en) Distribution network communication method and device of DPLC modules
CN116996985A (en) Communication method and device based on edge network
CN116980218A (en) Building equipment life cycle control SaaS system and method
CN118102330A (en) Control method and system for VOC waste gas pollution treatment equipment
CN117768965A (en) High-performance connection and transmission method of bonding silver wire equipment
CN117041957A (en) Comprehensive energy scheduling method and system based on virtual power plant
CN117062015A (en) Data connection distribution method and device using Beidou positioning and short message system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant