Key management, data encryption and identity authentication method oriented to electrical measuring instrument

A technology of data encryption and identity authentication, which is applied in the field of information security and can solve problems such as interference

Active Publication Date: 2018-04-10
GUANGDONG POWER GRID CO LTD DONGGUAN POWER SUPPLY BUREAU
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the middleman can interfere, monitor and control the network through the transmission medium, and the communication transmission link must be vulnerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management, data encryption and identity authentication method oriented to electrical measuring instrument
  • Key management, data encryption and identity authentication method oriented to electrical measuring instrument
  • Key management, data encryption and identity authentication method oriented to electrical measuring instrument

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The accompanying drawings are only for illustrative purposes and cannot be understood as a limitation of the patent; in order to better illustrate this embodiment, some parts of the accompanying drawings may be omitted, enlarged or reduced, and do not represent the size of the actual product; For personnel, it is understandable that some well-known structures in the drawings and their descriptions may be omitted. The positional relationship described in the drawings is only for illustrative purposes and cannot be understood as a limitation of the patent.

[0065] Such as figure 1 The power measurement instrument shown in the large-scale network deployment application scenario, the power measurement instrument periodically uploads the collected and stored data to the monitoring center according to the specified time frequency, and various smart electrical equipment connects to the electricity through the network The measurement instruments are interconnected to form a Home...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, in particular to a key management, data encryption and identity authentication method oriented to an electrical measuring instrument. The method is remarkably characterized in that an asymmetrical encrypting-decrypting mechanism is adopted, and executed by two independent servers; a main server is used for generating and managing public and private keys; and an auxiliary server is used for decrypting a random number sequence generated by the electrical measuring instrument and transmitting the random number sequence to a monitoring center, so that the security of an incredible or unreliable communication transmission link is enhanced. The robustness of information security guarantee is enhanced through electrical energy instrumentidentity authentication based on an OCSVM (One-Class Support Vector Machine) algorithm, and extra processing overhead does not need to be increased. The method can be implemented with limited storageresources and computation capability of the electrical measuring instrument.

Description

Technical field [0001] The present invention relates to the field of information security, and more specifically, to a method for key management, data encryption and identity authentication for power measuring instruments. Background technique [0002] The smart grid is a 3S system that combines the electric power system (Electric Power System, EPS), the information communication system (Information Communication System, ICS), and the monitoring control system (Monitoring Control System, MCS). The EPS is composed of power generation equipment, transmission and distribution Power Physical Network (PPN) composed of power infrastructure such as power grids and energy storage equipment, while ICS and MCS are composed of advanced sensing and detection technology, network communication technology, computer technology and intelligent control technology and other information infrastructure Power Information Network (PIN), the two are interdependent and deeply integrated to form a binary ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L9/0631H04L63/0435H04L63/0442H04L63/0478H04L63/062H04L63/126H04L67/12H04Q2209/60
Inventor 邹钟璐黄志才卢润华柏东辉袁志坚翟柱新何建宗曾伟忠冯奕军黄贺平邱华勇罗伟康邓建中李为袁咏诗
Owner GUANGDONG POWER GRID CO LTD DONGGUAN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products