[go: up one dir, main page]

CN105100116A - Efficient and safe power data interaction method in wireless communication mode - Google Patents

Efficient and safe power data interaction method in wireless communication mode Download PDF

Info

Publication number
CN105100116A
CN105100116A CN201510542456.5A CN201510542456A CN105100116A CN 105100116 A CN105100116 A CN 105100116A CN 201510542456 A CN201510542456 A CN 201510542456A CN 105100116 A CN105100116 A CN 105100116A
Authority
CN
China
Prior art keywords
data
module
key
symmetric key
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510542456.5A
Other languages
Chinese (zh)
Inventor
聂鼎
孙鹏
王耀龙
陈希龙
李力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhixun Information Science & Technology Co Ltd
Electric Power Research Institute of Yunnan Power System Ltd
Original Assignee
Guangzhou Zhixun Information Science & Technology Co Ltd
Electric Power Research Institute of Yunnan Power System Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhixun Information Science & Technology Co Ltd, Electric Power Research Institute of Yunnan Power System Ltd filed Critical Guangzhou Zhixun Information Science & Technology Co Ltd
Priority to CN201510542456.5A priority Critical patent/CN105100116A/en
Publication of CN105100116A publication Critical patent/CN105100116A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种无线通信方式下的电力数据高效安全交互的方法,其特征是,数据服务端(1)作为数据的提供方,移动应用端(2)作为数据的应用方,两端通过电力专用无线网络进行数据交互;本发明的有益效果是,保证了设备接入的合法性和数据安全性,提高了数据传输效率,有效解决了目前电力系统在无线网络通信方式下,存在非法接入设备,数据安全低下,数据传输效率不高,实效性欠缺的问题,为电力系统的可靠性通信提供了支撑,保障电网数据的安全和高效。

A method for efficiently and securely interacting electric power data in a wireless communication mode, characterized in that the data server (1) serves as the data provider, the mobile application end (2) acts as the data application party, and the two ends pass through the electric power dedicated wireless network Perform data interaction; the beneficial effect of the present invention is to ensure the legitimacy and data security of device access, improve data transmission efficiency, and effectively solve the problem of illegal access to devices and data in the current power system in the wireless network communication mode. Low security, low data transmission efficiency, and lack of effectiveness provide support for reliable communication in the power system and ensure the safety and efficiency of power grid data.

Description

一种无线通信方式下的电力数据高效安全交互的方法A method for efficient and safe interaction of power data in wireless communication mode

技术领域technical field

本发明涉及到移动通信技术、设备验证技术、混合加密技术、密钥随机管理技术和数据压缩技术。The invention relates to mobile communication technology, equipment verification technology, hybrid encryption technology, key random management technology and data compression technology.

背景技术Background technique

近年来,全球的数据网络正以令人惊奇的速度发展,为信息的交流和经济的发展提供了高效的工具和便利的平台。随着电力建设的飞速发展,电力自动化数据网络也迅速扩大,正在向全面覆盖所有的电力企业迈进,电力系统数字化己是大势所趋。电力调度自动化系统、配电自动化系统、电量计费系统、电力市场技术支持系统及交易系统、电力客户服务中心系统、变电站自动化系统、发电厂监控系统、MIS系统等,无一不是以高速的数据传输与交换为基本手段而建设的。而电力自动化数据通信网络利用因特网、无线网等的工具和平台,在提高数据传输便捷、减少开发维护工作量的同时,也带来了新的问题,这就是数据传输效率,内部机密信息在网络上的泄密、以及被攻击破坏等。In recent years, the global data network is developing at an astonishing speed, providing efficient tools and convenient platforms for information exchange and economic development. With the rapid development of electric power construction, the electric power automation data network is also rapidly expanding, and it is moving towards covering all electric power enterprises in an all-round way. The digitalization of electric power system is the general trend. Power dispatching automation system, power distribution automation system, electricity billing system, power market technical support system and transaction system, power customer service center system, substation automation system, power plant monitoring system, MIS system, etc., all of which rely on high-speed data Transmission and exchange are built as basic means. The power automation data communication network uses tools and platforms such as the Internet and wireless networks to improve the convenience of data transmission and reduce the workload of development and maintenance. At the same time, it also brings new problems. This is the efficiency of data transmission. Leakage on the Internet, and damage by attacks, etc.

现在的电力自动化系统主要采用的是有线通信和无线通信并用的方式。而其中的无线通信方式,不仅可以克服有线网络存在物理环境限制的先天不足,增强系统对环境的适应性,而且能够提供良好的可移动性和可配置性。但是,与有线通信方式相比较,无线通信方式数据传输效率相对较低,信息实效性容易受影响,并且由于通信信道开放,无法阻止攻击者窃听,恶意修改并转发,无线通信的信息安全问题更为突出。The current power automation system mainly adopts the combination of wired communication and wireless communication. Among them, the wireless communication method can not only overcome the inherent deficiency of the physical environment limitation of the wired network, enhance the adaptability of the system to the environment, but also provide good mobility and configurability. However, compared with the wired communication method, the data transmission efficiency of the wireless communication method is relatively low, and the effectiveness of information is easily affected, and because the communication channel is open, it is impossible to prevent attackers from eavesdropping, maliciously modifying and forwarding, and the information security problem of wireless communication is even more serious. for highlighting.

针对电力自动化系统无线通信方式下的数据交互问题,首先对数据系统进行全面、可靠、安全和多层次的备份是必不可少的,除此以外,各种安全产品,无论防火墙、防病毒、防黑客、防入侵等等,都或多或少地肩负着一些保护数据的责任,但总体只从数据源端对数据系统起到了物理保护作用,而严重忽略了数据传输以及伪数据请求的防护问题。虽然有的对数据采取了加密后再传输的方式,但是,大多仅仅运用了单纯的一种加密机制,而且,通信双方的密钥往往一经生成,则长久使用,未能做到一次一密,在本身薄弱的加密机制上加之密钥管理不当,很容易造成数据被破解,存在严重的数据信息安全隐患,并且在数据传输量增大时,容易造成数据堵塞,数据的实效性严重降低,影响电网安全稳定运行。For the data interaction problem in the wireless communication mode of the power automation system, it is essential to carry out comprehensive, reliable, safe and multi-level backup of the data system first. In addition, various security products, no matter firewall, anti-virus, anti-virus Hackers, anti-intrusion, etc., are more or less responsible for protecting data, but overall they only play a role in physical protection of the data system from the data source, while seriously ignoring the protection of data transmission and false data requests . Although some data are encrypted and then transmitted, most of them only use a simple encryption mechanism. Moreover, once the keys of the communication parties are generated, they are often used for a long time, failing to achieve one-time encryption. In addition to the weak encryption mechanism and improper key management, it is easy to cause data to be cracked, and there are serious hidden dangers of data information security. When the amount of data transmission increases, it is easy to cause data congestion, seriously reduce the effectiveness of data, and affect Safe and stable operation of the power grid.

一种无线通信方式下的电力数据高效安全交互的方法,通过采用移动通信技术、设备验证技术、混合加密技术、密钥随机管理技术和数据压缩技术,在对接入设备进行安全验证的前提下,抽取所请求的电力数据,通过混合加密的方式对数据进行加密,实现了一次一密的数据请求传输机制,并通过数据的综合压缩,提高了数据传输效率,有效解决了目前电力系统在无线网络通信方式下,数据安全低下,数据传输效率不高,实效性欠缺的问题,为电力系统的可靠性通信提供了支撑,保障电网数据的安全和可靠。A method for efficient and safe interaction of power data in wireless communication mode, by using mobile communication technology, device verification technology, hybrid encryption technology, key random management technology and data compression technology, under the premise of security verification of access devices , extract the requested power data, encrypt the data through hybrid encryption, realize the data request transmission mechanism of one encryption at a time, and improve the data transmission efficiency through comprehensive data compression, effectively solving the current power system in the wireless Under the network communication mode, the data security is low, the data transmission efficiency is not high, and the effectiveness is lacking, which provides support for the reliability communication of the power system and ensures the safety and reliability of the power grid data.

发明内容Contents of the invention

本发明的目的正是为了克服上述现有技术存在的缺陷和不足而提供一种数据安全性好,数据传输效率高,实效性充实的一种无线通信方式下的电力数据高效安全交互的方法。The purpose of the present invention is to overcome the defects and deficiencies of the above-mentioned prior art and provide a method for efficiently and securely interacting power data in a wireless communication mode with good data security, high data transmission efficiency, and substantial effectiveness.

本发明的目的是通过如下技术方案来实现的。The purpose of the present invention is achieved through the following technical solutions.

如图1所示,一种无线通信方式下的电力数据高效安全交互的方法,本发明的特征是,数据服务端作为数据的提供方,移动应用端作为数据的应用方,两端通过电力专用无线网络进行数据交互。数据服务端由数据综合处理模块、电力数据接口模块、数据响应转发模块、IMEI(移动设备国际身份码)库、终端合法性验证模块组成;其中,数据综合处理模块包括数据抽取模块、对称密钥随机生成模块、对称密钥加密模块、公钥加密模块和数据压缩模块。移动应用端由数据综合解析模块和数据请求模块组成;其中,数据综合解析模块包括非对称密钥随机生成模块、私钥解密模块、对称密钥解密模块和数据解压模块。As shown in Figure 1, a method for efficiently and securely interacting power data in a wireless communication mode is characterized in that the data server is used as the data provider, the mobile application is used as the data application, and the two ends are connected through the power dedicated Wireless network for data exchange. The data server is composed of a data comprehensive processing module, an electric power data interface module, a data response forwarding module, an IMEI (International Mobile Equipment Identity Code) library, and a terminal legality verification module; among them, the data comprehensive processing module includes a data extraction module, a symmetric key Random generation module, symmetric key encryption module, public key encryption module and data compression module. The mobile application end is composed of a data comprehensive analysis module and a data request module; wherein, the data comprehensive analysis module includes an asymmetric key random generation module, a private key decryption module, a symmetric key decryption module and a data decompression module.

移动应用端通过数据请求模块发起数据请求,并提取设备自身的IMEI码,经非对称密钥随机生成模块生成公钥和私钥,将私钥留存后,转交至数据服务端的终端合法性验证模块。The mobile application initiates a data request through the data request module, and extracts the IMEI code of the device itself, generates a public key and a private key through the asymmetric key random generation module, saves the private key, and transfers it to the terminal legitimacy verification module of the data server .

终端合法性验证模块提取IMEI库中合法设备的IMEI码对请求的移动应用端The terminal legitimacy verification module extracts the IMEI code of the legal device in the IMEI library to the requested mobile application terminal

在终端合法性验证模块通过验证后,数据响应转发模块将移动应用端的公钥交由公钥加密模块留存,并通知数据抽取模块向电力数据接口模块提取数据,一旦数据提取成功,对称密钥随机生成模块随机生成对称密钥,通过对称密钥加密模块将提取成功的数据进行对称加密得到数据密文,并且通过公钥加密模块对生成的对称密钥进行加密,得到密钥密文。数据压缩模块对密文数据和密钥数据进行压缩返回至移动应用端。After the terminal legitimacy verification module passes the verification, the data response forwarding module will hand over the public key of the mobile application to the public key encryption module for storage, and notify the data extraction module to extract data from the power data interface module. Once the data extraction is successful, the symmetric key will be randomly The generating module randomly generates a symmetric key, symmetric-encrypts the successfully extracted data through the symmetric-key encryption module to obtain data ciphertext, and encrypts the generated symmetric key through the public-key encryption module to obtain the key ciphertext. The data compression module compresses the ciphertext data and key data and returns them to the mobile application.

移动应用端在收到返回的数据时,通过数据解压模块对压缩后的数据进行解压,得到密钥密文和数据密文。密钥密文通过私钥解密模块利用先前留存的私钥解密出对称密钥,通过对称密钥解密模块利用已解密出的对称密钥完成对数据密文的解密,得到数据明文。When the mobile application receives the returned data, it decompresses the compressed data through the data decompression module to obtain the key ciphertext and data ciphertext. The key ciphertext is decrypted by the private key decryption module using the previously saved private key to decrypt the symmetric key, and the symmetric key decryption module uses the decrypted symmetric key to complete the decryption of the data ciphertext to obtain the data plaintext.

本发明通过采用移动通信技术、设备验证技术、混合加密技术、密钥随机管理技术和数据压缩技术,在对接入设备进行安全验证的前提下,抽取所请求的电力数据,通过混合加密的方式对数据进行加密,实现了一次一密的数据请求传输机制,并通过数据的综合压缩,提高了数据传输效率,有效解决了目前电力系统在无线网络通信方式下,数据安全低下,数据传输效率不高,实效性欠缺的问题,为电力系统的可靠性通信提供了支撑,保障电网数据的安全和高效。The present invention uses mobile communication technology, equipment verification technology, hybrid encryption technology, key random management technology and data compression technology to extract the requested power data under the premise of performing security verification on the access device, and through hybrid encryption The data is encrypted to realize the data request transmission mechanism of one-time encryption, and through the comprehensive compression of data, the data transmission efficiency is improved, which effectively solves the problem of low data security and low data transmission efficiency in the current power system in the wireless network communication mode. High and lack of effectiveness, it provides support for the reliability communication of the power system and ensures the safety and efficiency of power grid data.

本发明的有益效果是,保证了设备接入的合法性和数据安全性,提高了数据传输效率,有效解决了目前电力系统在无线网络通信方式下,存在非法接入设备,数据安全低下,数据传输效率不高,实效性欠缺的问题,为电力系统的可靠性通信提供了支撑,保障电网数据的安全和高效。The invention has the beneficial effects of ensuring the legitimacy of equipment access and data security, improving data transmission efficiency, and effectively solving the problem of illegal access equipment in the current power system under the wireless network communication mode, low data security, and data security. The problems of low transmission efficiency and lack of effectiveness provide support for reliable communication of the power system and ensure the safety and efficiency of power grid data.

附图说明Description of drawings

图1为本发明数据网络结构示意图。Fig. 1 is a schematic diagram of the data network structure of the present invention.

具体实施方式Detailed ways

如图1所示,一种无线通信方式下的电力数据高效安全交互的方法,本发明的特征是,数据服务端1作为数据的提供方,移动应用端2作为数据的应用方,两端通过电力专用无线网络进行数据交互。数据服务端1由数据综合处理模块1-1、电力数据接口模块1-2、数据响应转发模块1-3、IMEI移动设备国际身份码库1-4、终端合法性验证模块1-5组成;其中,数据综合处理模块1-1包括数据抽取模块1-1-1、对称密钥随机生成模块1-1-2、对称密钥加密模块1-1-3、公钥加密模块1-1-4和数据压缩模块1-1-5。移动应用端2由数据综合解析模块2-1和数据请求模块2-2组成;其中,数据综合解析模块2-1包括非对称密钥随机生成模块2-1-1、私钥解密模块2-1-2、对称密钥解密模块2-1-3和数据解压模块2-1-4。As shown in Figure 1, a method for efficiently and securely interacting power data in a wireless communication mode is characterized in that the data server 1 is used as a data provider, and the mobile application terminal 2 is used as a data application. Electric power dedicated wireless network for data interaction. The data server 1 is composed of a comprehensive data processing module 1-1, a power data interface module 1-2, a data response forwarding module 1-3, an IMEI mobile device international identity code database 1-4, and a terminal legality verification module 1-5; Wherein, the data comprehensive processing module 1-1 includes a data extraction module 1-1-1, a symmetric key random generation module 1-1-2, a symmetric key encryption module 1-1-3, a public key encryption module 1-1- 4 and the data compression module 1-1-5. The mobile application terminal 2 is composed of a data comprehensive analysis module 2-1 and a data request module 2-2; wherein, the data comprehensive analysis module 2-1 includes an asymmetric key random generation module 2-1-1, a private key decryption module 2- 1-2. Symmetric key decryption module 2-1-3 and data decompression module 2-1-4.

移动应用端2通过数据请求模块2-2发起数据请求,并提取设备自身的IMEI码,经非对称密钥随机生成模块2-1-1生成公钥和私钥,将私钥留存后,转交至数据服务端1的终端合法性验证模块1-5。The mobile application terminal 2 initiates a data request through the data request module 2-2, and extracts the IMEI code of the device itself, generates a public key and a private key through the asymmetric key random generation module 2-1-1, and after keeping the private key, transfers it to To the terminal legitimacy verification module 1-5 of the data server 1.

终端合法性验证模块1-5提取IMEI库中合法设备的IMEI码对请求的移动应用端2的合法性进行验证,若IMEI码和移动应用端2匹配则验证通过,否则拒绝该终端的请求。The terminal legitimacy verification module 1-5 extracts the IMEI code of the legal device in the IMEI storehouse to verify the legitimacy of the requested mobile application terminal 2. If the IMEI code matches the mobile application terminal 2, the verification is passed, otherwise the request of the terminal is rejected.

在终端合法性验证模块1-5通过验证后,数据响应转发模块1-3将移动应用端2的公钥交由公钥加密模块1-1-4留存,并通知数据抽取模块1-1-1向电力数据接口模块1-2提取数据,一旦数据提取成功,对称密钥随机生成模块1-1-3随机生成对称密钥,通过对称密钥加密模块1-1-2将提取成功的数据进行对称加密得到数据密文,并且通过公钥加密模块1-1-4对生成的对称密钥进行加密,得到密钥密文。数据压缩模块1-1-5对密文数据和密钥数据进行压缩返回至移动应用端2。After the terminal legitimacy verification module 1-5 passes the verification, the data response forwarding module 1-3 hands over the public key of the mobile application terminal 2 to the public key encryption module 1-1-4 for storage, and notifies the data extraction module 1-1- 1 Extract data from the power data interface module 1-2. Once the data extraction is successful, the symmetric key random generation module 1-1-3 randomly generates a symmetric key, and the symmetric key encryption module 1-1-2 extracts the successful data Perform symmetric encryption to obtain the data ciphertext, and encrypt the generated symmetric key through the public key encryption module 1-1-4 to obtain the key ciphertext. The data compression module 1-1-5 compresses the ciphertext data and key data and returns them to the mobile application terminal 2 .

移动应用端2在收到返回的数据时,通过数据解压模块2-1-4对压缩后的数据进行解压,得到密钥密文和数据密文。密钥密文通过私钥解密模块2-1-2利用先前留存的私钥解密出对称密钥,通过对称密钥解密模块2-1-3利用已解密出的对称密钥完成对数据密文的解密,得到数据明文。When the mobile application terminal 2 receives the returned data, it decompresses the compressed data through the data decompression module 2-1-4 to obtain the key ciphertext and data ciphertext. The key ciphertext uses the private key decryption module 2-1-2 to decrypt the symmetric key using the previously retained private key, and the symmetric key decryption module 2-1-3 uses the decrypted symmetric key to complete the data ciphertext Decryption to get the data plaintext.

本发明通过采用移动通信技术、设备验证技术、混合加密技术、密钥随机管理技术和数据压缩技术,在对接入设备进行安全验证的前提下,抽取所请求的电力数据,通过混合加密的方式对数据进行加密,实现了一次一密的数据请求传输机制,并通过数据的综合压缩,提高了数据传输效率,有效解决了目前电力系统在无线网络通信方式下,数据安全低下,数据传输效率不高,实效性欠缺的问题,为电力系统的可靠性通信提供了支撑,保障电网数据的安全和高效。The present invention uses mobile communication technology, equipment verification technology, hybrid encryption technology, key random management technology and data compression technology to extract the requested power data under the premise of performing security verification on the access device, and through hybrid encryption The data is encrypted to realize the data request transmission mechanism of one-time encryption, and through the comprehensive compression of data, the data transmission efficiency is improved, which effectively solves the problem of low data security and low data transmission efficiency in the current power system in the wireless network communication mode. High and lack of effectiveness, it provides support for the reliability communication of the power system and ensures the safety and efficiency of power grid data.

Claims (1)

1. the method that the electric power data highly effective and safe under a communication is mutual, it is characterized in that, data, services end (1) is as the provider of data, and Mobile solution end (2) is as the application side of data, and data interaction is carried out by electric power ad Hoc wireless network in two ends; Data, services end (1) is made up of aggregation of data processing module (1-1), electric power data interface module (1-2), data response forwarding module (1-3), IMEI (mobile device international identity code) storehouse (1-4), terminal legality authentication module (1-5); Wherein, aggregation of data processing module (1-1) comprises data extraction module (1-1-1), symmetric key random generating module (1-1-2), symmetric key encryption module (1-1-3), public-key encryption module (1-1-4) and data compressing module (1-1-5); Mobile solution end (2) is made up of aggregation of data parsing module (2-1) and data demand module (2-2); Wherein, aggregation of data parsing module (2-1) comprises unsymmetrical key random generating module (2-1-1), private key deciphering module (2-1-2), symmetric key decryption module (2-1-3) and data decompression module (2-1-4);
Mobile solution end (2) initiates request of data by data demand module (2-2), and the IMEI code of extraction equipment self, PKI and private key is generated through unsymmetrical key random generating module (2-1-1), after being retained by private key, deliver the terminal legality authentication module (1-5) to data, services end (1);
The legitimacy of IMEI code to the Mobile solution end (2) of request that terminal legality authentication module (1-5) extracts legitimate device in IMEI storehouse is verified, if IMEI code and Mobile solution end (2) coupling, be verified, otherwise refuse the request of this terminal;
After terminal legality authentication module (1-5) is by checking, the PKI of Mobile solution end (2) transfers to public-key encryption module (1-1-4) to retain by data response forwarding module (1-3), and notification data abstraction module (1-1-1) extracts data to electric power data interface module (1-2), once data are extracted successfully, symmetric key random generating module (1-1-3) stochastic generation symmetric key, by symmetric key encryption module (1-1-2), successful for extraction data are carried out symmetric cryptography and obtain data ciphertext, and by public-key encryption module (1-1-4), the symmetric key generated is encrypted, obtain key ciphertext, data compressing module (1-1-5) is carried out compression to encrypt data and key data and is back to Mobile solution end (2),
Mobile solution end (2), when receiving the data returned, carries out decompress(ion) by data decompression module (2-1-4) to the data after compression, obtains key ciphertext and data ciphertext; Key ciphertext utilizes the private key previously retained to decrypt symmetric key by private key deciphering module (2-1-2), utilized the deciphering of the complete paired data ciphertext of the symmetric key decrypted by symmetric key decryption module (2-1-3), obtain data clear text.
CN201510542456.5A 2015-08-31 2015-08-31 Efficient and safe power data interaction method in wireless communication mode Pending CN105100116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510542456.5A CN105100116A (en) 2015-08-31 2015-08-31 Efficient and safe power data interaction method in wireless communication mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510542456.5A CN105100116A (en) 2015-08-31 2015-08-31 Efficient and safe power data interaction method in wireless communication mode

Publications (1)

Publication Number Publication Date
CN105100116A true CN105100116A (en) 2015-11-25

Family

ID=54579661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510542456.5A Pending CN105100116A (en) 2015-08-31 2015-08-31 Efficient and safe power data interaction method in wireless communication mode

Country Status (1)

Country Link
CN (1) CN105100116A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109213540A (en) * 2018-10-31 2019-01-15 湖北大学 Power grid data processing method and device for handheld device
CN110971610A (en) * 2019-12-12 2020-04-07 广东电网有限责任公司电力调度控制中心 Control system identity verification method and device, computer equipment and storage medium
CN111680316A (en) * 2020-08-12 2020-09-18 国网浙江省电力有限公司营销服务中心 Information security sharing method for multiple business entities in the power industry
CN111953685A (en) * 2020-08-12 2020-11-17 珠海市鸿瑞信息技术股份有限公司 Dynamic electric power monitoring network security analysis system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095507A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Methods for pre-authentication of users using one-time passwords
CN1385969A (en) * 2001-05-10 2002-12-18 华邦电子股份有限公司 Method and device for dynamically adjusting compression rate to transmit data
CN1545230A (en) * 2003-11-20 2004-11-10 北京华安天诚科技有限公司 Time-division networking communication method for implementing flexible and highly effective transmission of airplane flying reference data
CN1610270A (en) * 2003-10-24 2005-04-27 上海华虹计通智能卡系统有限公司 Multi-message compression transmitting method in transit card
CN101883083A (en) * 2009-05-08 2010-11-10 杨宏桥 Inside and outside network isolator and application method thereof in hospital
CN103944711A (en) * 2014-02-17 2014-07-23 国家超级计算深圳中心 Cloud storage ciphertext retrieval method and system
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encryption network data security method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095507A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Methods for pre-authentication of users using one-time passwords
CN1385969A (en) * 2001-05-10 2002-12-18 华邦电子股份有限公司 Method and device for dynamically adjusting compression rate to transmit data
CN1610270A (en) * 2003-10-24 2005-04-27 上海华虹计通智能卡系统有限公司 Multi-message compression transmitting method in transit card
CN1545230A (en) * 2003-11-20 2004-11-10 北京华安天诚科技有限公司 Time-division networking communication method for implementing flexible and highly effective transmission of airplane flying reference data
CN101883083A (en) * 2009-05-08 2010-11-10 杨宏桥 Inside and outside network isolator and application method thereof in hospital
CN103944711A (en) * 2014-02-17 2014-07-23 国家超级计算深圳中心 Cloud storage ciphertext retrieval method and system
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encryption network data security method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109213540A (en) * 2018-10-31 2019-01-15 湖北大学 Power grid data processing method and device for handheld device
CN110971610A (en) * 2019-12-12 2020-04-07 广东电网有限责任公司电力调度控制中心 Control system identity verification method and device, computer equipment and storage medium
CN111680316A (en) * 2020-08-12 2020-09-18 国网浙江省电力有限公司营销服务中心 Information security sharing method for multiple business entities in the power industry
CN111953685A (en) * 2020-08-12 2020-11-17 珠海市鸿瑞信息技术股份有限公司 Dynamic electric power monitoring network security analysis system

Similar Documents

Publication Publication Date Title
CN106789015B (en) Intelligent power distribution network communication safety system
CN106656476A (en) Password protecting method and device
CN103491094A (en) Rapid identity authentication method based on C/S mode
Bali et al. Lightweight authentication for MQTT to improve the security of IoT communication
CN104158653A (en) Method of secure communication based on commercial cipher algorithm
CN104219228A (en) User registration and user identification method and user registration and user identification system
Ayday et al. Secure, intuitive and low-cost device authentication for smart grid networks
CN101420297A (en) Method and system for negotiating cipher
CN109450854A (en) A kind of distribution terminal communication security protection method and system
CN111711625A (en) A power system information security encryption system based on distribution terminal
CN105491073B (en) Data downloading method, device and system
CN107493283B (en) Method and system for realizing message security encryption based on live broadcast platform
CN105812128A (en) Malicious data mining attack-resisting data aggregation system and method for smart grid
CN105100116A (en) Efficient and safe power data interaction method in wireless communication mode
CN102739403A (en) Identity authentication method and device for dynamic token
CN107864040A (en) A kind of intelligent grid big data information management system based on safe cloud computing
CN103166757A (en) Method and system capable of dynamically protecting user private data
CN106656489A (en) Mobile payment oriented security enhancement method for information interaction between self-service sell device and server
Huang et al. A secure communication over wireless environments by using a data connection core
CN105099699A (en) Safe and high-efficiency communication method based on equipment of Internet of things and system
CN112055001B (en) Electric energy metering data uploading method and system, electric energy metering data storage method and system, and terminal
CN113472539A (en) Method for carrying out national encryption by using RDMA R _ Key
CN103200563A (en) Subliminal channel hiding communication method based on authentication code
CN102014380B (en) Authentication accelerator and high-speed authentication method based on wireless LAN authentication and privacy infrastructure (WAPI)
KR101366442B1 (en) Authentication method for smartmeter and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151125