CN113364733B - Transformer substation field data encryption transmission method - Google Patents

Transformer substation field data encryption transmission method Download PDF

Info

Publication number
CN113364733B
CN113364733B CN202110476155.2A CN202110476155A CN113364733B CN 113364733 B CN113364733 B CN 113364733B CN 202110476155 A CN202110476155 A CN 202110476155A CN 113364733 B CN113364733 B CN 113364733B
Authority
CN
China
Prior art keywords
data
secret key
electrical data
ciphertext
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110476155.2A
Other languages
Chinese (zh)
Other versions
CN113364733A (en
Inventor
陈冰晶
周刚
周子誉
周健
夏天君
詹晓怡
沈云超
张晓文
童玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Hengchuang Electric Power Group Co ltd Bochuang Material Branch
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Jiaxing Hengchuang Electric Power Group Co ltd Bochuang Material Branch
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Hengchuang Electric Power Group Co ltd Bochuang Material Branch, Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Jiaxing Hengchuang Electric Power Group Co ltd Bochuang Material Branch
Priority to CN202110476155.2A priority Critical patent/CN113364733B/en
Publication of CN113364733A publication Critical patent/CN113364733A/en
Application granted granted Critical
Publication of CN113364733B publication Critical patent/CN113364733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a transformer substation field data encryption transmission method, which comprises the following steps: s1, the inspection robot encrypts the detected and obtained electrical data by using the first secret key to generate a data ciphertext; s2, the inspection robot encrypts the first secret key by using a public secret key to generate a secret key ciphertext; s3, the inspection robot transmits the data ciphertext and the key ciphertext to the control platform through a data transmission channel; s4, the control platform decrypts the received secret key ciphertext by using the private secret key to obtain a first secret key; and S5, the control platform decrypts the received data ciphertext by using the first secret key to obtain the electrical data. The invention adopts a double encryption method to transmit data, thereby improving the safety of data transmission.

Description

Transformer substation field data encryption transmission method
Technical Field
The invention relates to the technical field of data encryption transmission, in particular to a substation field data encryption transmission method.
Background
With the increasing improvement of the related technologies of the power control systems, communication among substation equipment distributed all over the country is more and more frequent. At present, data communication between substation equipment mainly depends on a special network, but a transmission line inside the special network is not sufficiently encrypted and protected, so that information leakage and network attack are easily caused, and the safety of substation data in transmission is low.
For example, chinese patent document CN104219282A discloses a "transformer substation data acquisition remote wireless transmission system", which includes three parts, namely a management center master station, a wireless data transmission unit and a data acquisition unit, and provides a transformer substation data acquisition remote wireless transmission system constructed on a GPRS service network platform by using a wireless IP provided in a GPRS mobile network system, so as to achieve the purposes of automatically acquiring transformer substation data and remotely transmitting transformer substation data. The disadvantage of the above patent is that the safety of the data transmission of the substation is low.
Disclosure of Invention
The invention mainly solves the technical problem of low security of the existing transformer substation data transmission; the transformer substation field data encryption transmission method improves data transmission safety through double encryption of electrical data.
The technical problem of the invention is mainly solved by the following technical scheme: the invention comprises the following steps:
s1, the inspection robot encrypts the detected and obtained electrical data by using the first secret key to generate a data ciphertext;
s2, the inspection robot encrypts the first secret key by using a public secret key to generate a secret key ciphertext;
s3, the inspection robot transmits the data ciphertext and the key ciphertext to the control platform through a data transmission channel;
s4, the control platform decrypts the received secret key ciphertext by using the private secret key to obtain a first secret key;
and S5, the control platform decrypts the received data ciphertext by using the first secret key to obtain the electrical data.
The inspection robot uses the first secret key to encrypt the detected and obtained electrical data to generate a data ciphertext, uses a public secret key in an asymmetric encryption algorithm to encrypt the first secret key to generate a secret key ciphertext, the control platform decrypts the received secret key ciphertext by using a private secret key in the asymmetric encryption algorithm to obtain the first secret key, uses the first secret key to decrypt the received data ciphertext to obtain the electrical data, and adopts a double encryption method to transmit the data, so that the safety of data transmission is improved.
The step S1 specifically includes the following steps:
s11, converting the detection acquisition time of the electrical data into a binary form, wherein the detection acquisition time of the electrical data represented by the binary form is the corresponding initial secret key M;
s12, converting the electrical data Q according to a transcoding rule to obtain electrical data Q ' consisting of numbers ' 0 ' and ' 1 ';
s13, calculating a remainder S of dividing i by N, wherein i is the transmission order of the electrical data in the inspection robot, N is the rotation frequency set by the inspection robot, i is a positive integer, N belongs to {0,1,2 …, 9} and N is smaller than the character number of the initial key;
s14, placing the first S characters of the initial secret key M at the tail end for rearrangement to obtain a first secret key M';
s15, adding the first secret key M 'and the electric data Q' to obtain a data ciphertext.
The first secret key is obtained through conversion deformation on the basis of the detection and acquisition time of the electrical data, and the detection and acquisition time of each group of electrical data is different, so that the first secret key finally generated through conversion deformation is also different, a potential attacker is prevented from intercepting and deciphering the data in the data transmission process, and the safety of data transmission is improved.
The electrical data and the first key are both composed of numbers "0" and "1", which reduces the characteristic appearance of the electrical data and the first key.
Preferably, the rearranging of the first S characters of the initial key M to the end in step S14 to obtain the first secret key M' includes the following 4 ways:
1) placing the first S characters of the initial secret key M at the tail of the secret key according to the original sequence to obtain a first secret key M';
2) inverting the first S characters of the initial secret key M from beginning to end and then placing the tail of the secret key to obtain a first secret key M';
3) if the total number of the first S characters is an even number, performing parity replacement on the first S characters of the initial secret key M, and then placing the tail of the secret key to obtain a first secret key M';
4) if the total number of the first S characters is odd, the position of the first character or the last character or the middle character is kept unchanged, and the tail of the secret key is placed after the parity replacement of the rest S-1 characters to obtain a first secret key M'.
The initial secret key is generated according to the detection acquisition time of the electrical data, and the initial secret key is transformed and deformed, so that the complexity of the finally generated first secret key is improved, the decoding difficulty of transmitted data is improved, and the safety of data transmission is indirectly improved.
Preferably, the step S15 of adding the first key M 'and the electrical data Q' to obtain the data ciphertext includes the following 2 ways:
1) if the number of characters of the first secret key M 'is larger than or equal to the number of characters of the electric data Q', adding a first character of the electric data Q 'and the first character of the first secret key M', adding a second character of the electric data Q 'and the second character of the first secret key M' … and so on to obtain a data ciphertext;
2) if the number of characters of the first secret key M 'is less than the number of characters of the electrical data Q', adding … the first character of the first secret key M 'to the first character of the electrical data Q', adding … the second character of the first secret key M 'to the second character of the electrical data Q' until the last character of the first secret key M 'is added to the T-th character of the electrical data Q', adding … the first character of the first secret key M 'to the T + 1-th character of the electrical data Q', and so on to obtain a data ciphertext.
Preferably, the detection acquisition time of the electrical data is in one of three formats, namely year, month, day, hour, minute and second.
Preferably, the electrical data comprises a device number, an electrical data type, electrical data specific parameter values and electrical data parameter units, the device number, the electrical data type, the electrical data specific parameter values and the electrical data parameter units all have corresponding transcoding values consisting of numbers "0" and "1", and the transcoding rule is that the corresponding transcoding values are selected according to the content of the electrical data Q and combined to obtain the electrical data Q'.
Preferably, the public key in step S2 is obtained by:
the inspection robot transmits a data packet containing a self number to a control platform through a data transmission channel after detecting and acquiring electrical data, the control platform decodes the data packet after receiving the data packet to obtain the number of the inspection robot, a group of public keys and private keys are randomly selected from an asymmetric encryption key base to be bound with the number of the inspection robot, and the public keys are sent to the inspection robot.
The inspection robot transmits a data packet containing a self number to the control platform through a data transmission channel after detecting and acquiring electrical data, the control platform sends the selected public key to the inspection robot, and through the data transmission, the inspection robot detects the communication quality of the data transmission channel between the inspection robot and the control platform, so that the smooth transmission of the data transmission channel is ensured. A group of public keys and private keys are randomly selected from the asymmetric encryption key library to be bound with the serial numbers of the inspection robots, namely, each inspection robot has a group of corresponding public keys and private keys, and the safety of data transmission is further enhanced.
Preferably, the data ciphertext and the key ciphertext in step S3 are transmitted to the control platform through 2 different data transmission channels, respectively.
And the data ciphertext and the key ciphertext are respectively transmitted to the control platform through 2 different data transmission channels, so that the data transmission efficiency is improved.
Preferably, in step S5, the control platform reversely decrypts the received data ciphertext by using the first secret key to obtain the electrical data.
The invention has the beneficial effects that:
1) the inspection robot encrypts the detected electric data by using the first secret key to generate a data ciphertext, encrypts the first secret key by using a public secret key in an asymmetric encryption algorithm to generate a secret key ciphertext, decrypts the received secret key ciphertext by using a private secret key in the asymmetric encryption algorithm by using the control platform to obtain the first secret key, decrypts the received data ciphertext by using the first secret key to obtain the electric data, and transmits the data by using a double encryption method, so that the safety of data transmission is improved;
2) the method comprises the steps of generating an initial secret key based on the detection acquisition time of the electrical data, converting and transforming the initial secret key to generate a first secret key, improving the complexity of the first secret key, and improving the deciphering difficulty of transmission data;
3) because the detection acquisition time of each group of electrical data is different, the first secret keys finally generated through conversion and deformation are also different, a potential attacker is prevented from intercepting and decoding the data in the data transmission process, and the safety of data transmission is improved.
4) The electrical data and the first secret key are both composed of numbers '0' and '1', so that the characteristic expression of the electrical data and the first secret key is reduced;
5) each inspection robot has a corresponding set of public key and private key, and the safety of data transmission is further enhanced.
Drawings
FIG. 1 is a flow chart of a method of the present invention.
Detailed Description
The technical scheme of the invention is further specifically described by the following embodiments and the accompanying drawings.
Example (b): as shown in fig. 1, the method for encrypting and transmitting the field data of the transformer substation in the embodiment includes the following steps:
s1, the inspection robot encrypts the detected and obtained electrical data by using the first secret key to generate a data ciphertext, and the method specifically comprises the following steps:
s11, converting the detection acquisition time of the electrical data into a binary form, wherein the detection acquisition time of the electrical data represented by the binary form is the corresponding initial secret key M;
the detection acquisition time of the electrical data has the following 3 formats: year, month, day, hour, minute and second (202112311635), month, day, hour, minute and second (12311635) and hour, minute and second (1635), wherein 2021 represents year, 12 represents month, 31 represents day, 16 represents hour, and 35 represents minute. The original key M is obtained by converting 202112311635, 12311635 or 1635 into binary format.
S12, converting the electrical data Q according to a transcoding rule to obtain electrical data Q ' consisting of numbers ' 0 ' and ' 1 ';
the electrical data comprises a device number, an electrical data type, specific parameter values of the electrical data and electrical data parameter units, wherein the electrical data type is current (I), voltage (U), resistance (R) and the like, and the electrical data parameter units are A, V, omega and the like. For example, the electrical data is K1201I6A, where K1201 is the device number, I is the electrical data type, 6 is the electrical data specific parameter value, and a is the electrical data parameter unit.
The equipment number, the electrical data type, the electrical data specific parameter value and the electrical data parameter unit all have corresponding transcoding values consisting of numbers '0' and '1', and the digits of the transcoding values corresponding to the equipment number, the electrical data type, the electrical data specific parameter value and the electrical data parameter unit are different and are manually specified. The transcoding rule is that the equipment number, the electrical data type, the specific parameter value of the electrical data and the transcoding value corresponding to each part of the electrical data parameter unit are selected according to the actual content of the electrical data Q to be combined to obtain the electrical data Q'.
The electrical data and the first key are both composed of numbers "0" and "1", which reduces the characteristic appearance of the electrical data and the first key.
S13, calculating a remainder S of dividing i by N, wherein i is the transmission order of the electrical data in the inspection robot, N is the rotation frequency set by the inspection robot, i is a positive integer, N belongs to {0,1,2 …, 9} and N is smaller than the character number of the initial key;
s14, rearranging the first S characters of the initial key M to end to obtain the first key M', which includes the following 4 ways:
1) placing the first S characters of the initial secret key M at the tail of the secret key according to the original sequence to obtain a first secret key M';
for example, when M is (1101101010), S is 3, then M is (1101010110).
2) Inverting the first S characters of the initial secret key M from beginning to end and then placing the tail of the secret key to obtain a first secret key M';
for example, when M is (1101101010), S is 3, then M is (1101010011).
3) If the total number of the first S characters is an even number, performing parity replacement on the first S characters of the initial secret key M, and then placing the tail of the secret key to obtain a first secret key M';
for example, when M is (1101101010), S is 4, then M is (1110101010).
4) If the total number of the first S characters is odd, keeping the position of the first character or the last character or the middle character unchanged, and performing parity replacement on the rest S-1 characters and then placing the tail of the secret key to obtain a first secret key M';
for example, when M ═ 1101101010, S ═ 3, then M ═ 1011101010, or M ═ 1101101010, or M ═ 0111101010.
The initial secret key is converted and deformed by the detection and acquisition time of the electrical data, so that the complexity of the finally generated first secret key is improved, the deciphering difficulty of transmitted data is improved, and the safety of data transmission is indirectly improved.
The initial secret key is generated on the basis of the detection acquisition time of the electrical data, and the initial secret key is converted and deformed to generate the first secret key, so that the complexity of the first secret key is improved, and the deciphering difficulty of the transmission data is improved. Because the detection acquisition time of each group of electrical data is different, the first secret keys finally generated through conversion and deformation are also different, a potential attacker is prevented from intercepting and decoding the data in the data transmission process, and the safety of data transmission is improved.
S15, adding the first secret key M 'and the electrical data Q' to obtain a data ciphertext, including the following 2 ways:
1) if the number of characters of the first secret key M 'is larger than or equal to the number of characters of the electric data Q', adding a first character of the electric data Q 'and the first character of the first secret key M', adding a second character of the electric data Q 'and the second character of the first secret key M' … and so on to obtain a data ciphertext;
for example, when M is (1101101010), Q is (101101), the data cipher text is (211211).
2) If the number of characters of the first secret key M 'is less than the number of characters of the electrical data Q', adding … the first character of the first secret key M 'to the first character of the electrical data Q', adding … the second character of the first secret key M 'to the second character of the electrical data Q' until the last character of the first secret key M 'is added to the T-th character of the electrical data Q', adding … the first character of the first secret key M 'to the T + 1-th character of the electrical data Q', and so on to obtain a data ciphertext;
for example, when M is (1101101010), Q is (101101001110101001), the data cipher text is (211211102121112011).
S2, the inspection robot encrypts the first secret key by using the public secret key to generate a secret key ciphertext;
the public key is obtained by the following method:
the inspection robot transmits a data packet containing a self number to a control platform through a data transmission channel after detecting and acquiring electrical data, the control platform decodes the data packet after receiving the data packet to obtain the number of the inspection robot, a group of public keys and private keys are randomly selected from an asymmetric encryption key base to be bound with the number of the inspection robot, and the public keys are sent to the inspection robot.
S3, the inspection robot transmits the data ciphertext and the key ciphertext to the control platform through a data transmission channel;
the data ciphertext and the secret key ciphertext are respectively bound with the number of the inspection robot and are respectively transmitted to the control platform through 2 different data transmission channels, and the data transmission efficiency is improved.
S4, the control platform decrypts the received secret key ciphertext by using the private secret key to obtain a first secret key;
and after receiving the private key ciphertext, the control platform decrypts the ciphertext by using the corresponding private key according to the number of the inspection robot to obtain the first private key.
S5, the control platform uses the first secret key to reversely decrypt the received data ciphertext to obtain the electrical data:
1) if the number of characters of the first secret key M 'is larger than or equal to the number of characters of the data ciphertext, subtracting the first character of the first secret key M' from the first character of the data ciphertext, subtracting the second character … of the first secret key M 'from the second character of the data ciphertext, and the like to obtain electrical data Q';
the method comprises the steps of dividing electrical data Q' according to the number of the transcoding values corresponding to the equipment number, the type of the electrical data, the specific parameter value of the electrical data and the unit of the electrical data parameter, and converting the transcoding values into the corresponding equipment number, the type of the electrical data, the specific parameter value of the electrical data and the unit of the electrical data parameter according to the dividing result, so that the electrical data Q is obtained.
2) If the number of characters of the first secret key M ' is less than that of the data ciphertext, subtracting a first character of the first secret key M ' from a first character of the data ciphertext, subtracting a second character … of the first secret key M ' from a second character of the data ciphertext until the last character of the first secret key M ' is subtracted from the T-th character of the data ciphertext, subtracting the first character of the first secret key M ' from the T + 1-th character of the data ciphertext, subtracting the second character … of the first secret key M ' from the T + 2-th character of the data ciphertext, and so on to obtain the electrical data Q ';
the method comprises the steps of dividing electrical data Q' according to the number of the transcoding values corresponding to the equipment number, the type of the electrical data, the specific parameter value of the electrical data and the unit of the electrical data parameter, and converting the transcoding values into the corresponding equipment number, the type of the electrical data, the specific parameter value of the electrical data and the unit of the electrical data parameter according to the dividing result, so that the electrical data Q is obtained.
The inspection robot uses the first secret key to encrypt the detected and obtained electrical data to generate a data ciphertext, uses a public secret key in an asymmetric encryption algorithm to encrypt the first secret key to generate a secret key ciphertext, the control platform decrypts the received secret key ciphertext by using a private secret key in the asymmetric encryption algorithm to obtain the first secret key, uses the first secret key to decrypt the received data ciphertext to obtain the electrical data, and adopts a double encryption method to transmit the data, so that the safety of data transmission is improved.

Claims (8)

1. A transformer substation field data encryption transmission method is characterized by comprising the following steps:
s1, the inspection robot encrypts the detected and obtained electrical data by using the first secret key to generate a data ciphertext;
s2, the inspection robot encrypts the first secret key by using a public secret key to generate a secret key ciphertext;
s3, the inspection robot transmits the data ciphertext and the key ciphertext to the control platform through a data transmission channel;
s4, the control platform decrypts the received secret key ciphertext by using the private secret key to obtain a first secret key;
s5, the control platform decrypts the received data ciphertext by using the first secret key to obtain electrical data;
the step S1 specifically includes the following steps:
s11, converting the detection acquisition time of the electrical data into a binary form, wherein the detection acquisition time of the electrical data represented by the binary form is the corresponding initial secret key M;
s12, converting the electrical data Q according to a transcoding rule to obtain electrical data Q ' consisting of numbers ' 0 ' and ' 1 ';
s13, calculating a remainder S of dividing i by N, wherein i is the transmission order of the electrical data in the inspection robot, N is the rotation frequency set by the inspection robot, i is a positive integer, N belongs to {0,1,2 …, 9} and N is smaller than the character number of the initial key;
s14, placing the first S characters of the initial secret key M at the tail end for rearrangement to obtain a first secret key M';
s15, adding the first secret key M 'and the electric data Q' to obtain a data ciphertext.
2. The substation field data encryption transmission method according to claim 1, wherein the rearranging the first S characters of the initial key M to end to obtain the first secret key M' in step S14 includes the following 4 ways:
1) placing the first S characters of the initial secret key M at the tail of the secret key according to the original sequence to obtain a first secret key M';
2) inverting the first S characters of the initial secret key M from beginning to end and then placing the tail of the secret key to obtain a first secret key M';
3) if the total number of the first S characters is an even number, performing parity replacement on the first S characters of the initial secret key M, and then placing the tail of the secret key to obtain a first secret key M';
4) if the total number of the first S characters is odd, the position of the first character or the last character or the middle character is kept unchanged, and the tail of the secret key is placed after the parity replacement of the rest S-1 characters to obtain a first secret key M'.
3. The substation field data encryption transmission method according to claim 1, wherein the step S15 of adding the first key M 'and the electrical data Q' to obtain a data ciphertext includes the following 2 ways:
1) if the number of characters of the first secret key M 'is larger than or equal to the number of characters of the electric data Q', adding a first character of the electric data Q 'and the first character of the first secret key M', adding a second character of the electric data Q 'and the second character of the first secret key M' … and so on to obtain a data ciphertext;
2) if the number of characters of the first secret key M 'is less than the number of characters of the electrical data Q', adding … the first character of the first secret key M 'to the first character of the electrical data Q', adding … the second character of the first secret key M 'to the second character of the electrical data Q' until the last character of the first secret key M 'is added to the T-th character of the electrical data Q', adding … the first character of the first secret key M 'to the T + 1-th character of the electrical data Q', and so on to obtain a data ciphertext.
4. The substation field data encryption transmission method according to claim 1, wherein the detection acquisition time of the electrical data is in one of three formats, namely year, month, day, hour, minute and second.
5. The substation field data encryption transmission method according to claim 1, wherein the electrical data comprises a device number, an electrical data type, a specific electrical data parameter value and an electrical data parameter unit, the device number, the electrical data type, the specific electrical data parameter value and the electrical data parameter unit all have transcoding values consisting of numbers "0" and "1", and the transcoding rule is that the corresponding transcoding values are selected according to the content of the electrical data Q and combined to obtain the electrical data Q'.
6. The substation field data encryption transmission method according to claim 1, wherein the public key in step S2 is obtained by:
the inspection robot transmits a data packet containing a self number to a control platform through a data transmission channel after detecting and acquiring electrical data, the control platform decodes the data packet after receiving the data packet to obtain the number of the inspection robot, a group of public keys and private keys are randomly selected from an asymmetric encryption key base to be bound with the number of the inspection robot, and the public keys are sent to the inspection robot.
7. The substation field data encryption transmission method according to claim 1, wherein the data ciphertext and the key ciphertext in step S3 are respectively transmitted to the control platform through 2 different data transmission channels.
8. The substation field data encryption transmission method according to claim 1, wherein in step S5, the control platform reversely decrypts the received data ciphertext with the first secret key to obtain the electrical data.
CN202110476155.2A 2021-04-29 2021-04-29 Transformer substation field data encryption transmission method Active CN113364733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110476155.2A CN113364733B (en) 2021-04-29 2021-04-29 Transformer substation field data encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110476155.2A CN113364733B (en) 2021-04-29 2021-04-29 Transformer substation field data encryption transmission method

Publications (2)

Publication Number Publication Date
CN113364733A CN113364733A (en) 2021-09-07
CN113364733B true CN113364733B (en) 2022-04-15

Family

ID=77525643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110476155.2A Active CN113364733B (en) 2021-04-29 2021-04-29 Transformer substation field data encryption transmission method

Country Status (1)

Country Link
CN (1) CN113364733B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219282A (en) * 2014-08-04 2014-12-17 烟台恒迪克能源科技有限公司 Substation data acquisition and remote wireless transmission system
CN104394134B (en) * 2014-11-17 2017-09-15 国网上海市电力公司 A kind of power transformation station equipment operational monitoring visible light communication transmits encryption method
CN110995716B (en) * 2019-12-06 2022-09-02 国网浙江省电力有限公司电力科学研究院 Data transmission encryption and decryption method and system for transformer substation inspection robot
CN110996318B (en) * 2019-12-23 2021-07-23 广西电网有限责任公司电力科学研究院 Safety communication access system of intelligent inspection robot of transformer substation
CN112102516B (en) * 2020-09-22 2022-08-02 国网山东省电力公司电力科学研究院 Intelligent robot inspection system for transformer substation and access operation method thereof
CN112526251B (en) * 2020-10-22 2022-05-17 国网浙江省电力有限公司嘉兴供电公司 Transformer substation power equipment fault diagnosis method based on data driving

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device

Also Published As

Publication number Publication date
CN113364733A (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN101188496B (en) A SMS encryption transport method
CN102333093A (en) Data encryption transmission method and system
CN113114460B (en) Quantum encryption-based power distribution network information secure transmission method
CN101873214A (en) Method for generating, encrypting and decrypting key in broadcast encryption as well as device
CN1323523C (en) Method of forming dynamic key in radio local network
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN103580859A (en) Asymmetric encryption method for intelligent electricity using interaction
CN113364733B (en) Transformer substation field data encryption transmission method
CN107659405A (en) The encrypting and decrypting method that data communicate between a kind of transformer station boss station
CN104579645B (en) Key updating method based on AES encryption system
CN103795524B (en) Dynamic SMS encryption based on 3DES, decryption method
JP2002152189A (en) Open key distributing method, and open key transmitting device and open key receiving device used for the same method
CN114374550A (en) Electric power measurement platform that possesses high security
CN114785421A (en) IM offline message processing method based on quantum encryption
CN113352318B (en) Intelligent robot communication link self-checking selection method
CN101242453A (en) A transmission method and system for dual-audio multi-frequency signal
CN113596054A (en) Information intersystem transmission soft frequency hopping encryption method
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
CN106357382A (en) Encryption method and system for network data transmission
CN113395170B (en) Intelligent robot data transmission method based on linear topology transmission
CN108200108B (en) Asymmetric encryption algorithm and application thereof
CN103427985B (en) A kind of method that data encryption key is distributed to telecommunication terminal
CN103746793A (en) Number form text encryption and decryption methods
US20170026829A1 (en) Advanced metering infrastructure network system and message broadcasting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant