Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection authentication encryption method of intelligent network load interaction terminal information

An interactive terminal, authentication and encryption technology, applied in the field of intelligent distribution network, can solve urgent and complex security issues, achieve reliable protection services, ensure safe and stable operation, and improve overall security protection capabilities

Inactive Publication Date: 2018-04-17
NARI TECH CO LTD +3
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the advancement of smart grids, information technology is widely used in the power industry. Due to the introduction of a large number of new information network technologies in the smart grid-load interactive terminal information system, security issues have become more complex and more complex while intelligently processing information. urgent
Focus on analyzing and evaluating the security problems and potential security risks in each link of the interactive terminal information collection system, research security protection strategies, and propose an effective security protection scheme that has not yet been developed. Therefore, a smart network load interactive terminal comprehensive security protection authentication encryption scheme is designed. appears to be particularly important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection authentication encryption method of intelligent network load interaction terminal information
  • Security protection authentication encryption method of intelligent network load interaction terminal information
  • Security protection authentication encryption method of intelligent network load interaction terminal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0038] Such as figure 1 As shown in Fig. 1, an authentication and encryption method for information security protection of intelligent network load interactive terminal, the designed information security protection system includes the main station layer, remote channel layer and acquisition equipment layer. The researched system can be divided into system main station protection module, collection channel protection module and collection equipment protection module. The potential security risks of the intelligent network load interactive terminal information collection system that the system master station protection module needs to deal with mainly include five aspects...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection authentication encryption method of intelligent network load interaction terminal information. From three aspects of system master station protection, collection channel protection and collection equipment protection, coordinated and unified security protection technology and a security management method are adopted to perform a security design on an authentication encryption system. A system master station protection module ensures the security of the a system master station by setting a security protection measures of the master station and setting network boundary security protection; a collection channel protection module adopts the GPRS access network protection, power information internal network protection, optical fiber special networkprotection and power line carrier protection, and adopts an identity authentication mechanism and a data encryption measure to improve the security protection ability of the collection equipment. By adoption of the information security protection authentication encryption method, a dynamic and sustainable overall security protection scheme is constructed to provide more reliable protection services for the intelligent network load interaction terminal information.

Description

technical field [0001] The invention belongs to the technical field of intelligent distribution network, and in particular relates to an authentication and encryption method for information security protection of an interactive terminal of an intelligent network load. Background technique [0002] The information system of the intelligent network-load interactive terminal is an important part of the power system informatization. It is urgent to conduct security risk assessment and analysis on it, research and formulate a security protection authentication encryption scheme that meets its security needs, and design an applicable authentication key agreement protocol. , Improve the safety protection level of the electricity information collection system. With the advancement of smart grids, information technology is widely used in the power industry. Due to the introduction of a large number of new information network technologies in the smart grid-load interactive terminal in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0209H04L63/0428H04L63/08
Inventor 许道强陈霄霍尧郑红娟朱庆朱玮珂杨奕彬王德峰黄苏文
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products