CN115766124A - Network encryption machine concurrent communication method, system, electronic equipment and storage medium - Google Patents

Network encryption machine concurrent communication method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN115766124A
CN115766124A CN202211353909.6A CN202211353909A CN115766124A CN 115766124 A CN115766124 A CN 115766124A CN 202211353909 A CN202211353909 A CN 202211353909A CN 115766124 A CN115766124 A CN 115766124A
Authority
CN
China
Prior art keywords
information
configuration
network
terminal equipment
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211353909.6A
Other languages
Chinese (zh)
Inventor
吕燕顺
陈卫刚
万勤
吴胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Clou Electronics Co Ltd
Original Assignee
Shenzhen Clou Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Clou Electronics Co Ltd filed Critical Shenzhen Clou Electronics Co Ltd
Priority to CN202211353909.6A priority Critical patent/CN115766124A/en
Publication of CN115766124A publication Critical patent/CN115766124A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The application discloses a network encryption machine concurrent communication method, a system, electronic equipment and a storage medium, and relates to the technical field of communication, wherein a client side is internally provided with preset encryption libraries which are in one-to-one correspondence with a plurality of terminal equipment, communication data of the client side and different terminal equipment are transmitted to the network encryption machine through the corresponding preset encryption libraries for encryption, so that the client side can realize the function of simultaneously operating the plurality of terminal equipment for encrypted communication at one time, and the result information of each operation is stored, so that the different terminal equipment can smoothly complete the target operations such as respective configuration requirements and the like, the problem of communication failure caused by data loss during concurrent communication is solved, the client side can concurrently and synchronously or asynchronously use the network encryption machine, the efficiency is effectively improved in the mass communication production or test of the terminal equipment, and the cost is saved.

Description

Network encryption machine concurrent communication method, system, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a concurrent communication method and system for a network encryptor, an electronic device, and a storage medium.
Background
The electric meter is applied to various places of daily life of people, such as living places, office areas, commercial entertainment areas and the like, various data in the electric meter are closely related to enterprises or individuals, and serious consequences are brought if lawless persons such as network hackers steal or tamper the conditions of the electric meter, such as information of electric quantity, demand, metering precision, control of the switching state of the electric meter and the like.
At present, a network encryption machine for communication of electric meter terminal equipment is designed by national power grids, southern power grids or power grid administrative units in various regions, and is used for preventing invasion of lawbreakers. When an authorized user uses the client to communicate with the terminal equipment, the authorized user can interact with the network encryption machine only through the encryption library provided by the network encryption machine manufacturer so as to encrypt related communication data in the interaction process. However, currently, the encryption library provided by each network encryption machine manufacturer can only obtain data once at the same time, and when a client communicates with a plurality of terminal devices, each terminal device can only be sequentially encrypted in order, so that the execution efficiency is low. If concurrent communication is performed on a plurality of terminal devices, alternate execution among different execution steps of different terminal devices can occur in the communication process, data interaction is wrong, data loss of part of the terminal devices is caused, and therefore communication encryption fails.
Content of application
The present application is directed to solving at least one of the problems in the prior art. Therefore, the embodiment of the application provides a concurrent communication method, a concurrent communication system, an electronic device and a storage medium for a network encryption device, which can enable a client to perform concurrent synchronous or asynchronous encrypted communication with a plurality of terminal devices.
In a first aspect, an embodiment of the present application provides a method for concurrent communication by a network encryptor, including:
acquiring equipment information of more than one terminal equipment, wherein the terminal equipment corresponds to a preset encryption library one by one, and the preset encryption library is in communication connection with the network encryption machine;
acquiring operation information of each terminal device, wherein the operation information comprises: the device number and the current counter value;
sending the equipment information and the operation information of each terminal equipment to the corresponding preset encryption library;
receiving a first configuration parameter of each terminal device generated by the preset encryption library according to the device information and the current counter value;
if the connection with the terminal equipment is successful, the first configuration parameter is sent to the terminal equipment based on the equipment number;
receiving an analysis message generated by the terminal equipment according to the first configuration parameter;
and acquiring configuration parameters according to configuration requirements based on the analysis message, and sending the configuration parameters to the terminal equipment so that the terminal equipment can realize the configuration requirements by using the configuration parameters.
In some embodiments of the present application, before obtaining the device information of more than one terminal device, the method includes:
acquiring the equipment number of the terminal equipment;
and generating a corresponding number of preset encryption libraries according to the number of the devices.
In some embodiments of the present application, the obtaining device information of more than one terminal device includes:
acquiring an ESAM serial number of the terminal equipment, and storing the ESAM serial number in a first array;
and acquiring the key version information of the terminal equipment, and storing the key version information in a second array.
In some embodiments of the present application, the preset encryption library comprises a master session interface; the sending the device information and the operation information of each terminal device to the corresponding preset encryption library includes:
and sending the device information and the operation information of each terminal device to the master station session interface of the corresponding preset encryption library, so that the preset encryption library is communicated with the network encryption machine through the master station session interface.
In some embodiments of the present application, the receiving the first configuration parameter of each terminal device generated by the preset encryption library according to the device information and the current counter value includes:
receiving a first configuration parameter of each terminal device returned by the preset encryption library by using the master station session interface, where the first configuration parameter includes: and the master station random number, the application connection ciphertext or the signature information.
In some embodiments of the present application, the configuration requirements include: configuration numbers and configuration operations; the obtaining, based on the parsing packet, a configuration parameter according to a configuration requirement, and sending the configuration parameter to the terminal device, so that the terminal device utilizes the configuration parameter to implement the configuration requirement, includes:
acquiring the equipment number of the terminal equipment needing configuration, wherein the equipment number is the configuration number;
acquiring configuration parameters returned by the network encryption machine by using the preset encryption library based on the configuration operation;
and sending the configuration parameters to the terminal equipment based on the configuration number, so that the terminal equipment performs the configuration operation by using the configuration parameters to realize the configuration requirement.
In some embodiments of the present application, the parsing the packet includes: one or more of manufacturer information, merchant preset information, authentication result information and authentication additional information;
the vendor information includes: one or more of vendor code, software version number, software version date, hardware version number, hardware version date, or vendor extension information;
the merchant preset information comprises: one or more of preset application layer protocol version number, preset protocol consistency block, preset function consistency block, server sending frame maximum size, server receiving frame maximum window size, server maximum processable APDU size or preset application connection timeout time;
the authentication result information includes: allowing or disallowing the establishment of an application connection;
the authentication additional information includes: and the application session negotiation data returned by the terminal equipment, and one or more of the session negotiation MAC or session key negotiation verification returned by the terminal equipment.
In a second aspect, an embodiment of the present application further provides a concurrent communication system for a network encryption device, including a network encryption device, a preset encryption library, a client and a terminal device, where the preset encryption library is configured in the client, the client is in communication connection with more than one terminal device, the preset encryption library is in one-to-one correspondence with the terminal device, and the preset encryption library is in communication connection with the network encryption device;
the client acquires the equipment information and the operation information of the terminal equipment and sends the equipment information and the operation information to the network encryption machine by using the preset encryption library;
the client receives a first configuration parameter generated by the network encryption machine according to the equipment information and the operation information, and sends the first configuration parameter to the terminal equipment;
the client receives an analysis message generated by the terminal equipment according to the first configuration parameter;
the client sends the analysis message and the configuration requirement to the network encryption machine through the preset encryption library;
the client receives the configuration parameters generated by the network encryption machine according to the analysis message and the configuration requirements;
and the client side sends the configuration parameters to the terminal equipment, so that the terminal equipment realizes the configuration requirements by utilizing the configuration parameters.
In a third aspect, an embodiment of the present application further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the concurrent communication method for the network encryptor according to the embodiment of the first aspect of the present application when executing the computer program.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium, where the storage medium stores a program, and the program is executed by a processor to implement the network encryptor concurrent communication method according to the embodiment of the first aspect of the present application.
The embodiment of the application at least comprises the following beneficial effects: the embodiment of the application provides a concurrent communication method and system for a network encryption machine, an electronic device and a storage medium, wherein a client simultaneously obtains device information and operation information of more than one terminal device, the operation information comprises a device number and a current counter value of the terminal device, the client sends the obtained device information and operation information to preset encryption libraries corresponding to the terminal devices one to one, the network encryption machine is in communication connection with the network encryption machine through the preset encryption libraries, the network encryption machine can concurrently encrypt the device information and operation information of different terminal devices to generate first configuration parameters of different terminal devices, the first configuration parameters are sent to the client through the preset encryption libraries corresponding to one, after application connection is established between the client and different terminal devices, the first configuration parameters are sent to the corresponding terminal devices according to the device number, the terminal devices generate analysis messages according to the first configuration parameters and send the analysis messages to the client, the client obtains the configuration parameters according to configuration requirements after analyzing the analysis messages, and sends the configuration requirements to the corresponding terminal devices according to the configuration parameters. By establishing the preset encryption libraries corresponding to different terminal devices one to one, the client can synchronously or asynchronously and concurrently communicate with the terminal devices, and each terminal device independently carries out communication encryption, so that the problem of data errors during parallel communication of the different terminal devices is avoided, and the communication encryption efficiency of the terminal devices is effectively improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The above and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of a concurrent communication method of a network encryptor according to an embodiment of the present application;
fig. 2 is a schematic diagram of a concurrent communication system of network encryptors according to an embodiment of the present application;
FIG. 3 is a flowchart before step S101 of FIG. 1;
fig. 4 is a flowchart of step S101 of fig. 1;
FIG. 5 is a flowchart of step S103 of FIG. 1;
FIG. 6 is a flowchart of step S107 of FIG. 1;
fig. 7 is a schematic diagram of a concurrent communication system of a network encryptor according to another embodiment of the present application;
fig. 8 is a schematic diagram of a concurrent communication system of a network encryptor according to another embodiment of the present application;
fig. 9 is a schematic diagram of a concurrent communication system of network encryptors according to another embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Reference numerals are as follows: the system comprises a network encryption machine 1, a preset encryption library 2, a client 3, a terminal device 4, an electronic device 1000, a processor 1001 and a memory 1002.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative and are only for the purpose of explaining the present application and are not to be construed as limiting the present application.
In the description of the present application, it is to be understood that the positional descriptions, such as the directions of up, down, front, rear, left, right, etc., referred to herein are based on the directions or positional relationships shown in the drawings, and are only for convenience of description and simplification of description, and do not indicate or imply that the referred device or element must have a specific direction, be constructed and operated in a specific direction, and thus, should not be construed as limiting the present application.
In the description of the present application, the meaning of a plurality is one or more, the meaning of a plurality is two or more, and larger, smaller, larger, etc. are understood as excluding the present number, and larger, smaller, inner, etc. are understood as including the present number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present application, unless otherwise expressly limited, terms such as set, mounted, connected and the like should be construed broadly, and those skilled in the art can reasonably determine the specific meaning of the terms in the present application by combining the detailed contents of the technical solutions.
For a better understanding of the technical solutions provided in the present application, the terms appearing herein are explained accordingly:
a network encryption machine: in order to meet the relevant requirements of the national electric power relevant administration on the safety protection of the data transmission of the electric power metering equipment, the data encryption of a national cryptographic algorithm is adopted, and the confidentiality and the integrity of the data transmission among the terminal equipment, the terminal equipment and the client application software region are realized.
ESAM: the Embedded security control Module (Embedded Secure Access Module) is used for information exchange security authentication by embedding the cost control intelligent electric energy meter into an ESAM Module. When parameter setting, pre-storage of electric charge, information rewriting and remote control command issuing are carried out on the charge control intelligent electric energy meter through the solid medium or the virtual medium, safety certification needs to be carried out through the ESAM module, and data encryption and decryption processing is carried out to ensure the safety and integrity of data transmission.
Information required by the national power grid company and the southern power grid company for communication needs to be dynamically encrypted through a network encryption machine provided by the information, and then sent to the electric meter, and the electric meter can be configured or target data of the electric meter can be read after multi-step operation, so that the risks of stealing and illegal modification of the electric meter data are effectively reduced. The network encryption machine is a high-performance service computer device, generally only allows encryption and decryption of power metering communication data, and therefore has an independent operating system and application software. In order to prevent the invasion of network hackers and reduce the use difficulty of authorized users, each network encryption machine manufacturer provides a dynamic library of externally operated network encryption software, namely an encryption library.
As a high-performance computer, the network encryption equipment supports the concurrent communication of the client, but as the encryption libraries provided by various manufacturers do not open up the memory data storage space, the data can be obtained only once at the same time, and each target operation can be completed only by carrying out multiple communication operations on the client and the network encryption equipment. Specifically, the client provides data to the encryption library when the meter is communicated, the encryption library transmits the data to the network encryption machine for encryption, ciphertext data are returned and sent to the client, and the client sends the ciphertext data to the electric meter. And returning the first step of completion information after the ammeter is correctly analyzed, and reserving the returned information. The client transmits the returned information and other electric meter information to the network encryption machine through the encryption library for encryption, the second-step ciphertext data information is returned to the client, the client software transmits the ciphertext data to the electric meters again, and the iteration is carried out until the target operation is completed, so that the target operation of each electric meter can not be carried out until the target operation of the last electric meter is completed step by step.
In this case, if the client performs concurrent communication with the plurality of electric meters, when the first-step communication data operation between the client and the second electric meter is completed and the data returned by the encryption library is stored, and then the data returned by the first electric meter and the encryption library stored by the client is sent to the network encryption device, because the encryption library does not open up a storage space for storing data, the network encryption device will lose the previous data, but encrypt the data of the previous operation, that is, the second electric meter, and transmit the data to the encryption library of the client. As a result, the first electric meter receives the cipher text data, decrypts the received cipher text data, and finds out that the stored key information does not match, which results in communication failure, so that the electric meters can actually perform the encryption communication operation only in series, which is inefficient.
Based on this, the embodiment of the application provides a concurrent communication method, a concurrent communication system, an electronic device and a storage medium for a network encryption device, which enable a client and a plurality of terminal devices to perform concurrent synchronous or asynchronous encryption communication operation, and effectively improve communication efficiency. The following embodiments are described with the terminal device as an electricity meter.
Referring to a flow chart of a concurrent communication method of a network encryption device shown in fig. 1, an embodiment of the present application provides a concurrent communication method of a network encryption device, which is applied to an encryption system formed by a client, a network encryption device and a plurality of terminal devices. Referring to a schematic diagram of a concurrent communication system of a network encryption device shown in fig. 2, in an embodiment, the concurrent communication encryption system of the network encryption device includes a network encryption device 1, a preset encryption library 2, a client 3 and a terminal device 4, where the preset encryption library 2 is configured in the client 3, the client 3 is in communication connection with more than one terminal device 4, the preset encryption libraries 2 and the terminal devices 4 are in one-to-one correspondence, and the preset encryption library 2 is in communication connection with the network encryption device 1. Specifically, when the client 3 communicates with five terminal devices 4 concurrently, five corresponding preset encryption libraries 2 are configured and generated in the client 3, and the network encryptor 1 can concurrently receive, transmit and encrypt communication data through the different preset encryption libraries 2 working independently, thereby implementing the concurrent communication of the network encryptor. The quantitative relationship between the encryption systems can thus be expressed as client 3: network encryption equipment 1: terminal device 4=1: and N is added. The network encryption equipment concurrent communication method includes, but is not limited to, the following steps S101 to S107.
Step S101, acquiring the device information of more than one terminal device 4, wherein the terminal devices 4 correspond to the preset encryption library 2 one by one, and the preset encryption library 2 is in communication connection with the network encryption device 1.
In an embodiment, the client 3 obtains device information of the terminal device 4 that needs to be configured or operated by another target, and during an actual test or production process of the terminal device 4, there are a large number of communication operations that need to be encrypted, such as configuring a device number of the terminal device 4 by the client 3, configuring a negotiation time limit, configuring an asset management number, configuring a turning current, configuring a minimum current, and the like, so that the number of the terminal devices 4 is determined according to actual requirements, and each terminal device 4 and the preset encryption library 2 are in a one-to-one correspondence relationship. It can be understood that when the client 3 needs to communicate with the three terminal devices 4 concurrently, three preset encryption bases 2 are generated to correspond to each terminal device 4 one by one; when the client 3 needs to communicate with five terminal devices 4 concurrently, five preset encryption bases 2 are generated to correspond to each terminal device 4 one to one. The preset encryption library 2 is in communication connection with the network encryption device 1, and the client 3 transmits communication data to be encrypted to the network encryption device 1 through the preset encryption library 2 for encryption.
Step S102, operation information of each terminal device 4 is acquired, and the operation information includes a device number and a current counter value.
In an embodiment, the client 3 obtains operation information of each terminal device 4, where the operation information includes a device number of the terminal device 4 having a configuration requirement or other target operation, and the client 3 may perform configuration or other target operation on the corresponding terminal device 4 according to the device number. The operation information further includes a current counter value, and the client 3 can obtain the current state of the corresponding terminal device 4 according to the current counter value to prepare for the client 3 to perform the next operation on the corresponding terminal device 4. It will be understood that for each communication step between the client 3 and the terminal device 4, the corresponding current counter value is incremented by one.
Step S103, sending the device information and the current counter value of the corresponding terminal device 4 to the network encryption device 1 through different preset encryption libraries 2 for encryption.
In an embodiment, after the client 3 and the network encryption machine 1 establish application connection successfully, the preset encryption library 2 corresponding to different terminal devices 4 one to one sends corresponding device information and current counter values to the network encryption machine 1 for encryption, the network encryption machine 1 analyzes and encrypts the device information and generates corresponding operation result information according to the current counter values, the encrypted data and the operation result information are returned to the client 3, and the client 3 stores the operation result information at each step as a basis for the network encryption machine 1 to analyze and encrypt next communication data.
Step S104, receiving the first configuration parameter, generated by the network encryption device 1, corresponding to the terminal device 4 through the different preset encryption libraries 2.
In an embodiment, ciphertext data formed by encrypting first-time communication data of the client 3 and the terminal device 4 by the network encryptor 1 is a first configuration parameter, and it can be understood that different first configuration parameters are formed by encrypting communication data of different terminal devices 4 and the client 3 by the network encryptor 1, so that the client 3 needs to receive the corresponding first configuration parameters through the preset encryption libraries 2 corresponding to different terminal devices 4 one to one.
Step S105, sending different first configuration parameters to the corresponding terminal device 4 based on the device number.
In an embodiment, after receiving the different first configuration parameters, the client 3 needs to send the different first configuration parameters to the corresponding terminal device 4 according to the device number of the terminal device 4 obtained before. Specifically, the client 3 organizes the first configuration parameter and other information of the terminal device 4 related to the actual demand, such as table address information, to generate a message, and sends the message to the terminal device 4. It will be appreciated that each terminal device 4 has a unique device number, ensuring that different terminal devices 4 receive the correct communication data via the device number.
Step S106, receiving the analysis packet generated by the terminal device 4 according to the first configuration parameter.
In an embodiment, after receiving the message including the first configuration parameter, the terminal device 4 parses the message through the stored key information, determines a communication request of the client 3 according to the parsed first configuration parameter, and responds to the communication request to generate a parsed message, and sends the parsed message to the client 3.
Step S107, based on the analysis message, obtaining the configuration parameters according to the configuration requirements and sending the configuration parameters to the terminal equipment 4, so that the terminal equipment 4 realizes the configuration requirements by using the configuration parameters.
In this embodiment, the client 3 receives the analysis message and then analyzes the analysis message, communication data is formed by the analyzed data and actual configuration requirements, the communication data is transmitted to the network encryption machine 1 through the corresponding preset encryption library 2, the network encryption machine 1 encrypts the received communication data to generate configuration parameters to the client 3, the client 3 generates a message from the received configuration parameters and then transmits the message to the corresponding terminal device 4, and the terminal device 4 analyzes the received message and then realizes the configuration requirements of the client 3 according to the configuration parameters.
It is understood that the communication data is not limited to the parsed data and the configuration requirements, but also includes other related data, such as the information of the operation result of the previous step or the table address of the terminal device 4. Further, communication data between different terminal devices 4 and the client 3 are encrypted by the network encryptor 1 to form different configuration parameters, so that the client 3 receives the corresponding configuration parameters through the preset encryption libraries 2 corresponding to the different terminal devices 4 one to one.
It will be appreciated that the steps of communication between the client 3, the network encryptor 1 and the various terminal devices 4 are determined according to actual requirements, as are the relevant communication data and the target operations. By setting the one-to-one correspondence relationship between different terminal devices 4 and the preset encryption library 2, the client 3, the network encryption device 1 and different terminal devices 4 can concurrently communicate with each other, the operation capability of the network encryption device 1 as a high-performance computer is fully developed and utilized, and the communication efficiency is effectively improved.
Referring to fig. 3, in an embodiment, before the step S101, the following steps S201 to S202 may be further included, but not limited to.
In step S201, the number of devices of the terminal device 4 is acquired.
In one embodiment, the client 3 needs to determine the number of terminal devices 4 that are concurrently communicating before communicating with different terminal devices 4. The communication terminal device 4 may be determined to be required, for example, according to actual configuration requirements or other target operations.
Step S202, generating a corresponding number of preset encryption libraries 2 according to the number of devices.
In an embodiment, the client 3 configures and generates a corresponding number of preset encryption libraries 2 according to the number of devices, and it can be understood that when the client 3 needs to perform concurrent communication with three terminal devices 4, three preset encryption libraries 2 are configured and generated; when the client 3 needs to perform concurrent communication with five terminal devices 4, five preset encryption libraries 2 are configured and generated, different preset encryption libraries 2 are placed according to the catalog in a grading manner, and the realization path of the code realizes that each preset encryption library 2 works independently at the same time.
It can be understood that the client 3 may also be configured to generate only one preset encryption library 2, and when concurrently communicating with multiple terminal devices 4, the client opens threads corresponding to the number of the terminal devices 4 to communicate with the network encryption device 1, and in the process, only through macro definition, the program may simultaneously call multiple preset encryption libraries 2 with the same function, and the generated random number result, dispersion factor, MAC data, and the like are mutually independent, thereby implementing concurrent communication of the network encryption device 1.
Whether in the actual test or production process of the terminal device 4, for example, the client 3 configures the device number of the terminal device 4, configures the negotiation aging, configures the asset management number, configures the turning current, configures the minimum current, etc., or in the communication process of the client 3 and the network encryptor 1, for example, login server authority, login server, create random number, connect the network encryptor, master station session negotiation, negotiation authentication, read data authentication, report data verification, secure transmission encryption and decryption, broadcast data encryption and decryption, set ESAM parameter encryption, read ESAM parameter verification, wallet operation, electric energy meter update symmetric key, software comparison encryption comparison, etc., all relate to the communication operation needing encryption, so that the preset encryption libraries 2 corresponding to a plurality of terminal devices 4 one to one are arranged in the client 3, thereby realizing the concurrent encryption communication of the network encryptor 1 and effectively improving the communication efficiency.
Referring to fig. 4, in an embodiment, the step S101 may further include, but is not limited to, the following steps S301 to S304.
Step S301, an ESAM serial number of the terminal device 4 is acquired.
In an embodiment, the client 3 communicates with the terminal device 4 to obtain an ESAM serial number, where the ESAM serial number is a unique identification number of an ESAM module, and the client 3 can use the ESAM module after obtaining the ESAM serial number of the terminal device 4, and the ESAM module realizes security control transmission such as security storage, data encryption/decryption, bidirectional identity authentication, and the like, where operations such as parameter setting, pre-storage cost, information write-back, and the like for the terminal device 4 need to be subjected to strict password verification or security authentication such as the ESAM module, so as to ensure security and reliability of data transmission. Therefore, the client 3 acquires the ESAM serial number of the terminal equipment 4 to provide guarantee for the safe transmission of the data.
Step S302, the ESAM serial number is stored in the first array of the preset encryption library 2.
In an embodiment, after acquiring the ESAM serial numbers of different terminal devices 4, the client 3 stores the ESAM serial numbers in the first array of the preset encryption library 2 corresponding to the terminal devices 4 one to one, where it is understood that the first array is a memory array storing the ESAM serial numbers.
In step S303, the key version information of the terminal device 4 is acquired.
In an embodiment, the device information of the terminal device 4 further includes key version information, different key versions correspond to different analyzed ciphertext data, and in order to ensure that the terminal device 4 successfully analyzes the encrypted communication data, the client 3 obtains the key version information set by the terminal, so that the network encryptor 1 encrypts the communication data according to the different key version information.
In step S304, the key version information is stored in the first array of the preset encryption library 2.
In an embodiment, after acquiring the key version information of different terminal devices 4, the client 3 stores the key version information in the second array of the preset encryption library 2 corresponding to the terminal devices 4 one to one, where it can be understood that the second array is a memory array storing the key version information.
The client 3 obtains the device information corresponding to different terminal devices 4 and stores the device information in the memory array corresponding to the preset encryption library 2, so that a foundation and safety guarantee are provided for the encrypted communication among the client 3, the network encryption machine 1 and the plurality of terminal devices 4.
Referring to fig. 5, in an embodiment, the step S103 may further include, but is not limited to, the following steps S401 to S402.
Step S401, sending the device information and the operation information of the terminal device 4 to the corresponding session interface of the master station of the preset encryption library 2.
In an embodiment, different preset encryption libraries 2 store device information and operation information of different terminal devices 4, the client 3 sends the device information and the operation information of the different terminal devices 4 to a master session interface of the corresponding preset encryption library 2, and the master session interface calls a bottom-layer related function, such as a master session negotiation function, using the received information as an input condition.
And step S402, communicating with the network encryption equipment 1 through the main station session interface.
In an embodiment, the client 3 may perform communication interaction with the network encryptor 1 through the master station session interface of the preset encryption library 2, specifically, the client 3 transmits relevant communication data to be encrypted to the network encryptor 1 by using the master station session interface of the preset encryption library 2, the network encryptor 1 encrypts the communication data to form ciphertext data, and returns the ciphertext data to the client 3 through the corresponding master station session interface of the preset encryption library 2.
Interaction between the client 3 and the network encryption machine 1 is carried out through a master station session interface of the preset encryption library 2, so that an authorized user can realize the interaction without acquiring a bottom layer principle of the network encryption machine 1, the use difficulty of the authorized user is effectively reduced, and network hackers and other lawbreakers are prevented from invading.
In an embodiment, the client 3 receives ciphertext data obtained by encrypting the communication data by the network encryption machine 1 through a master station session interface of the preset encryption library 2, and it can be understood that when the ciphertext data is a first configuration parameter, the ciphertext data includes, but is not limited to, one or more of a master station random number, an application connection ciphertext, or signature information. Specifically, the master station random number is a verification basis corresponding to a subsequent configuration state, the application connection ciphertext is encrypted information requesting application connection between the client 3 and the terminal device 4, and the signature information is signature array information of the client 3. The safety of communication data is effectively guaranteed through the transmission of the ciphertext data.
Referring to fig. 6, in an embodiment, the step S107 may further include, but is not limited to, the following steps S501 to S503.
In step S501, a configuration number of the terminal device 4 that needs to be configured is obtained.
In an embodiment, the client 3 obtains a configuration number of the terminal device 4 that needs to be configured, that is, obtains a device number in the operation information of the terminal device 4, and can determine the terminal device 4 that needs to be configured according to the configuration number.
Step S502, the configuration parameters returned by the network encryption equipment 1 are obtained according to the configuration operation in the configuration requirement.
In an embodiment, the configuration requirement information includes, in addition to determining the configuration number of the terminal device 4 that needs to be configured, a configuration operation for performing a relevant configuration on the terminal device 4, and the network encryptor 1 encrypts the configuration operation to form a configuration parameter and returns the configuration parameter to the client 3. It can be understood that, when the client 3 needs to configure the device number for the terminal device 4, the client 3 obtains the device number to be set by scanning the nameplate or inputting, and the corresponding configuration operation information includes: the method comprises the following steps that equipment number, an input symmetric key state, a ciphertext operation mode, an ESAM serial number, a session key, a master station random number, 4 bytes of InOAD +1 byte of content length + equipment number to be set and other related information are transmitted to a network encryption machine 1 for encryption through a corresponding preset encryption library 2 by calling a parameter function, and configuration parameters formed after encryption comprise: and returning other related information such as the type of the safety identification, the safety additional data, the output data, the MAC check data and the like.
Step S503, sending the configuration parameters to the terminal device 4 according to the configuration number, so that the terminal device performs configuration operation by using the configuration parameters to complete the configuration requirement.
In an embodiment, the client 3 determines the corresponding terminal device 4 according to the configuration number, generates a message from received ciphertext data such as the configuration parameter and sends the message to the terminal device 4, and the terminal device 4 performs configuration operation by using the configuration parameter after analyzing the message, thereby completing the configuration requirement of the client 3. It will be appreciated that when the terminal device 4 successfully completes the configuration requirement, the relevant identification status or random number is returned to the client 3. For example, the terminal device 4 successfully completes the configuration requirement, and returns the identification status of '1' to the client 3, and when the terminal device 4 fails to configure the requirement, returns the identification status value of '0' to the client 3.
It can be understood that the client 3 may also use the preset encryption library 2 to transmit other relevant target operations, such as reading target data of the terminal device 4, to the network encryptor 1 for encryption, thereby ensuring the security and integrity of communication data.
In an embodiment, the parsing message formed by the terminal device 4 according to the first configuration parameter includes: one or more of manufacturer information, merchant preset information, authentication result information and authentication additional information. Wherein, the vendor information includes: one or more of vendor code, software version number, software version date, hardware version number, hardware version date or vendor extension information; the merchant preset information comprises: one or more of preset application layer protocol version number, preset protocol consistency block, preset function consistency block, server sending frame maximum size, server receiving frame maximum window size, server maximum processable APDU size or preset application connection timeout time; the authentication result information includes: allowing or disallowing the establishment of an application connection; the authentication additional information includes: application session negotiation data returned by the terminal device 4, session negotiation MAC returned by the terminal device 4, or session key negotiation authentication.
It will be appreciated that the parsed message includes information corresponding to the target operation performed by the client 3 on the terminal device 4, and also corresponding to the communication data of the network encryptor 1. Specifically, when the client 3 is to set the device number of the terminal device 4, the parsing packet includes authentication result information that allows establishing an application connection, application session negotiation data returned by the terminal device 4, session negotiation MAC, or authentication additional information for session key negotiation verification, and the like. According to different target operations to the terminal equipment 4, the analysis messages received by the client 3 are different, and the confidentiality and the safety of communication among the client 3, the network encryption machine 1 and the terminal equipment 4 are improved.
Referring to a schematic diagram of a network encryption equipment concurrent communication system shown in fig. 7, in an embodiment, a communication process between a client 3 and one of terminal devices 4 is specifically that the client 3 acquires device information and operation information of the terminal device 4, returns a first configuration parameter to the terminal device 4 based on the acquired information, the terminal device 4 analyzes and responds to the received first configuration parameter to form a corresponding analysis message, and sends the analysis message to the client 3, the client 3 returns the configuration parameter to the terminal device 4 according to the analysis message and a configuration requirement for the terminal device 4, and the terminal device 4 utilizes the received and analyzed configuration parameter to implement the configuration requirement of the client 3. It can be understood that, after the terminal device 4 successfully completes the configuration requirement, the corresponding identification status or random number is returned to the client 3.
Referring to a schematic diagram of a network encryption machine concurrent communication system shown in fig. 8, in an embodiment, interaction between a client 3 and a network encryption machine 1 is implemented through a preset encryption library 2, specifically, the client 3 transmits acquired device information and operation information of a terminal device 4 to the network encryption machine 1 through the corresponding preset encryption library 2, the network encryption machine encrypts received communication data to form ciphertext data, i.e., first configuration parameters, and returns the ciphertext data to the client 3 through the corresponding preset encryption library 2, the client 3 further transmits the received and analyzed analysis message data and related target operation data, i.e., configuration operation information, to the network encryption machine 1 through the preset encryption library 2, and the network encryption machine 1 continues to encrypt the received communication data to form ciphertext data, i.e., configuration parameters, and returns the ciphertext data to the client 3 through the preset encryption library 2. It can be understood that the interaction steps of the client 3 and the network encryption equipment 1 are determined according to specific target operations, and are not limited to the above steps, and the target operations on the terminal equipment 4 are completed step by step through a similar iterative process.
Referring to a schematic diagram of a network encryption machine concurrent communication system shown in fig. 9, in an embodiment, a communication process of a network encryption machine 1, a client 3 and a terminal device 4 is specifically that the client 3 generates and configures a preset encryption library 2 corresponding to the terminal device in a memory, transmits acquired device information and operation information to the network encryption machine 1 through the preset encryption library 2, receives communication data encrypted by the network encryption machine 1 through the preset encryption library 2, that is, a first configuration parameter, and transmits the first configuration parameter to the terminal device 4, the terminal device 4 returns a correspondingly generated analysis message to the client 3, the client 3 analyzes the analysis message and then combines configuration requirements for the terminal device 4, continues to transmit the analysis message to the network encryption machine 1 through the preset encryption library 2 for encryption, receives encrypted communication data through the preset encryption library 2, that is, the configuration parameter, and transmits the configuration message to the terminal device 4, the terminal device 4 realizes corresponding configuration requirements according to the configuration parameters after successful analysis, and returns a corresponding identification state or random number to the client 3 after successful completion.
Specifically, the device information of the terminal device 4 includes an ESAM serial number, key version information, and the like, and the operation information includes a device number, a current counter value, and the like, and when the client 3 communicates with the terminal device 4 through the network encryptor 1 for each step, the current counter value is incremented accordingly. The first configuration parameters formed by the encryption of the network encryption machine 1 comprise a master station random number, an application connection ciphertext and signature array information of the client 3, the analysis message formed by the terminal device 4 after obtaining the first configuration parameters can comprise one or more of manufacturer information, merchant preset information, authentication result information or authentication additional information according to actual requirements, and further, the network encryption machine 1 generates configuration parameters comprising output data, MAC check data, safety additional data and the like according to the configuration requirements of the client 3.
It can be understood that, when the configuration requirement of the client 3 for the terminal device 4 is other configuration operations such as setting a device number, setting a negotiation age, setting an asset management number, setting a turning current or setting a minimum current, the client 3 obtains related information such as the device number to be set, the negotiation age, the asset management number, the turning current, the minimum current and the like by scanning a nameplate or inputting, and the network encryption device generates corresponding configuration parameters by combining the configuration parameters with the parsing message so that the terminal device 4 is configured according to a target operation. Further, if the terminal device 4 successfully completes the configuration requirement, an identification status of '1' is returned to the client 3, and if the terminal device 4 fails in the configuration requirement, an identification status value of '0' is returned to the client 3.
The client 3 interacts with the network encryption machine 1 through the preset encryption libraries 2 which correspond to the plurality of terminal devices 4 one by one, and concurrently communicates, so that the problem that the client 3 can only serially operate different terminal devices 4 is solved, and the efficiency of communication and operation is effectively improved.
Fig. 10 illustrates an electronic device 1000 provided in an embodiment of the present application. The electronic device 1000 includes: a processor 1001, a memory 1002 and a computer program stored on the memory 1002 and operable on the processor 1001, the computer program being operable when executed to perform the network encryptor concurrent communication method described above.
The processor 1001 and the memory 1002 may be connected by a bus or other means.
The memory 1002, which is a non-transitory computer readable storage medium, may be used to store a non-transitory software program and a non-transitory computer executable program, such as the network encryption engine concurrent communication method described in the embodiments of the present application. The processor 1001 implements the network encryptor concurrent communication method described above by running a non-transitory software program and instructions stored in the memory 1002.
The memory 1002 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data for performing the above-described concurrent communication method of the network encryptor. Further, the memory 1002 may include high speed random access memory 1002, and may also include non-transitory memory 1002, such as at least one storage device memory device, flash memory device, or other non-transitory solid state memory device. In some embodiments, the memory 1002 may optionally include memory 1002 located remotely from the processor 1001, and such remote memory 1002 may be coupled to the electronic device 1000 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The non-transitory software programs and instructions required to implement the network encryption engine concurrent communication method described above are stored in the memory 1002 and, when executed by the one or more processors 1001, perform the network encryption engine concurrent communication method described above, e.g., performing method steps S101 to S107 in fig. 1, method steps S301 to S304 in fig. 4, and method steps S501 to S503 in fig. 6.
The embodiment of the application also provides a storage medium which is a computer readable storage medium, and the storage medium stores a computer program, and the computer program is executed by a processor to implement the network encryption equipment concurrent communication method. The memory, as a non-transitory computer-readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer-executable programs. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and these remote memories may be connected to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
According to the network encryption machine concurrent communication method, the system, the electronic device and the storage medium, the preset encryption libraries which are in one-to-one correspondence with the plurality of terminal devices are configured in the client, communication data of the client and different terminal devices are transmitted to the network encryption machine through the corresponding preset encryption libraries for encryption, the client can simultaneously operate the plurality of terminal devices for encryption communication at one time, and result information of each operation is stored, so that the different terminal devices can smoothly complete respective target operation.
The above-described embodiments of the apparatus are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may also be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, storage device storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
It should also be appreciated that the various implementations provided in the embodiments of the present application can be combined arbitrarily to achieve different technical effects. While the present application has been described with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A concurrent communication method for a network encryptor, comprising:
acquiring equipment information of more than one terminal equipment, wherein the terminal equipment corresponds to a preset encryption library one by one, and the preset encryption library is in communication connection with the network encryption machine;
acquiring operation information of each terminal device, wherein the operation information comprises: the device number and the current counter value;
sending the equipment information and the operation information of each terminal equipment to the corresponding preset encryption library;
receiving a first configuration parameter of each terminal device generated by the preset encryption library according to the device information and the current counter value;
if the connection with the terminal equipment is successful, the first configuration parameter is sent to the terminal equipment based on the equipment number;
receiving an analysis message generated by the terminal equipment according to the first configuration parameter;
and acquiring configuration parameters according to configuration requirements based on the analysis message, and sending the configuration parameters to the terminal equipment so that the terminal equipment realizes the configuration requirements by using the configuration parameters.
2. The method for concurrent communication of network encryptors according to claim 1, wherein before acquiring the device information of more than one terminal device, the method comprises:
acquiring the equipment number of the terminal equipment;
and generating a corresponding number of preset encryption libraries according to the number of the devices.
3. The method for concurrent communication of network encryptors according to claim 1, wherein the obtaining of the device information of more than one terminal device comprises:
acquiring an ESAM serial number of the terminal equipment, and storing the ESAM serial number in a first array;
and acquiring the key version information of the terminal equipment, and storing the key version information in a second group.
4. The concurrent communication method for the network encryption equipment according to claim 3, wherein the preset encryption library comprises a master session interface; the sending the device information and the operation information of each terminal device to the corresponding preset encryption library includes:
and sending the device information and the operation information of each terminal device to the master station session interface of the corresponding preset encryption library, so that the preset encryption library is communicated with the network encryption machine through the master station session interface.
5. The method for concurrent communication of network encryptors according to claim 4, wherein the receiving the first configuration parameter of each terminal device generated by the preset encryption library according to the device information and the current counter value includes:
receiving a first configuration parameter of each terminal device returned by the preset encryption library by using the master station session interface, where the first configuration parameter includes: and the master station random number, the application connection ciphertext or the signature information.
6. The method for concurrent communication of network encryptors according to claim 1, wherein the configuration requirements include: configuration numbers and configuration operations; the obtaining, based on the parsing packet, a configuration parameter according to a configuration requirement, and sending the configuration parameter to the terminal device, so that the terminal device utilizes the configuration parameter to implement the configuration requirement, includes:
acquiring the equipment number of the terminal equipment needing configuration, wherein the equipment number is the configuration number;
acquiring configuration parameters returned by the network encryption machine by using the preset encryption library based on the configuration operation;
and sending the configuration parameters to the terminal equipment based on the configuration number, so that the terminal equipment performs the configuration operation by using the configuration parameters to realize the configuration requirement.
7. The method according to claim 1, wherein the parsing the packet comprises: one or more of manufacturer information, merchant preset information, authentication result information and authentication additional information;
the vendor information includes: one or more of vendor code, software version number, software version date, hardware version number, hardware version date, or vendor extension information;
the merchant preset information comprises: one or more of preset application layer protocol version number, preset protocol consistency block, preset function consistency block, server sending frame maximum size, server receiving frame maximum window size, server maximum processable APDU size or preset application connection timeout time;
the authentication result information includes: allowing or disallowing the establishment of an application connection;
the authentication additional information includes: and one or more of application session negotiation data returned by the terminal equipment, session negotiation MAC returned by the terminal equipment or session key negotiation verification.
8. A network concurrent communication system comprises a network encryption machine, a preset encryption library, a client and terminal equipment, and is characterized in that the preset encryption library is configured in the client, the client is in communication connection with more than one terminal equipment, the preset encryption library is in one-to-one correspondence with the terminal equipment, and the preset encryption library is in communication connection with the network encryption machine;
the client acquires the equipment information and the operation information of the terminal equipment and sends the equipment information and the operation information to the network encryption machine by using the preset encryption library;
the client receives a first configuration parameter generated by the network encryption machine according to the equipment information and the operation information, and sends the first configuration parameter to the terminal equipment;
the client receives an analysis message generated by the terminal equipment according to the first configuration parameter;
the client sends the analysis message and the configuration requirement to the network encryption machine through the preset encryption library;
the client receives configuration parameters generated by the network encryption machine according to the analysis message and the configuration requirement;
and the client side sends the configuration parameters to the terminal equipment, so that the terminal equipment realizes the configuration requirements by utilizing the configuration parameters.
9. An electronic device, comprising a memory storing a computer program, and a processor implementing the network encryptor concurrent communication method according to any one of claims 1 to 7 when the processor executes the computer program.
10. A computer-readable storage medium characterized in that the storage medium stores a program executed by a processor to implement the network encryptor concurrent communication method according to any one of claims 1 to 7.
CN202211353909.6A 2022-11-01 2022-11-01 Network encryption machine concurrent communication method, system, electronic equipment and storage medium Pending CN115766124A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211353909.6A CN115766124A (en) 2022-11-01 2022-11-01 Network encryption machine concurrent communication method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211353909.6A CN115766124A (en) 2022-11-01 2022-11-01 Network encryption machine concurrent communication method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115766124A true CN115766124A (en) 2023-03-07

Family

ID=85354869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211353909.6A Pending CN115766124A (en) 2022-11-01 2022-11-01 Network encryption machine concurrent communication method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115766124A (en)

Similar Documents

Publication Publication Date Title
CN110995642B (en) Providing secure connections using pre-shared keys
CN101828357B (en) Credential provisioning method and device
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN109246053A (en) A kind of data communications method, device, equipment and storage medium
CN108965230A (en) A kind of safety communicating method, system and terminal device
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
CN110621014B (en) Vehicle-mounted equipment, program upgrading method thereof and server
CN102595404A (en) Methods and apparatus for storage and execution of access control clients
CN114520976B (en) Authentication method and device for user identity identification card and nonvolatile storage medium
CN100550030C (en) On portable terminal host, add the method for credible platform
CN103430479A (en) Systems, methods, and apparatus to authenticate communications modules
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN109962781B (en) Digital certificate distributing device
CN111654503A (en) Remote control method, device, equipment and storage medium
KR102266654B1 (en) Method and system for mqtt-sn security management for security of mqtt-sn protocol
CN112134694A (en) Data interaction method, master station, terminal and computer readable storage medium
CN114139176A (en) Industrial internet core data protection method and system based on state secret
KR20190040443A (en) Apparatus and method for creating secure session of smart meter
CN110532794A (en) A kind of electric energy method for processing business, device, equipment and readable storage medium storing program for executing
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium
CN115766124A (en) Network encryption machine concurrent communication method, system, electronic equipment and storage medium
US20230415595A1 (en) System for authenticating a user at and reporting about use of a charging device
CN110875902A (en) Communication method, device and system
CN115567195A (en) Secure communication method, client, server, terminal and network side equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination