CN102413144B - A kind of safety access system for C/S framework business and relevant cut-in method - Google Patents

A kind of safety access system for C/S framework business and relevant cut-in method Download PDF

Info

Publication number
CN102413144B
CN102413144B CN201110398830.0A CN201110398830A CN102413144B CN 102413144 B CN102413144 B CN 102413144B CN 201110398830 A CN201110398830 A CN 201110398830A CN 102413144 B CN102413144 B CN 102413144B
Authority
CN
China
Prior art keywords
data
service
terminal
authentication
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110398830.0A
Other languages
Chinese (zh)
Other versions
CN102413144A (en
Inventor
赵保华
郑晓崑
吴立斌
张波
汪仕兵
方鸣睿
杨宇
秦凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Global Energy Interconnection Research Institute
Chengdu Westone Information Industry Inc
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI, Chengdu Westone Information Industry Inc filed Critical China Electric Power Research Institute Co Ltd CEPRI
Priority to CN201110398830.0A priority Critical patent/CN102413144B/en
Publication of CN102413144A publication Critical patent/CN102413144A/en
Application granted granted Critical
Publication of CN102413144B publication Critical patent/CN102413144B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of safety access system for C/S framework business and relevant cut-in method, described operation system and safety access system comprise: teleaction service terminal, described safety access system comprise safe access gateway server and be connected successively with terminal security access unit, service server.Described method comprises: authentication, consult be used for unilateral authentication and transfer of data protection key, symmetrical certification, based on the challenge-response agreement of PKI system, the safety data transmission between described teleaction service terminal and service server.Safety access system for C/S framework business provided by the invention and relevant cut-in method, solve between service server and long-range whole service terminal cannot confirm the other side's identity, problem that the data of transmission may be stolen and distort.

Description

A kind of safety access system for C/S framework business and relevant cut-in method
Technical field
The invention belongs to field of Internet communication, specifically relate to a kind of safety access system for C/S framework business and relevant cut-in method.
Background technology
Along with the development of network and informationization technology, use in every profession and trade RTU (remote terminal unit) and the mutual application scope of application of application server more and more wider, as the remote data transmission etc. of the industry observing and controlling class industrial equipments such as electric power, water conservancy, oil.
But at present, there is no a product for RTU (remote terminal unit) secure access application server.In existing C/S model, service server cannot effectively be differentiated the identity of RTU (remote terminal unit), easily defrauded of confidence by illegal terminal, the data transmission security of application server and teleaction service terminal room does not ensure, easily be stolen and distort, these all cause a large amount of losses by enterprises and individuals.
Summary of the invention
For overcoming above-mentioned defect, the invention provides a kind of safety access system for C/S framework business and relevant cut-in method, the data transmission security that can solve service server and teleaction service terminal room does not ensure, the problem being easily stolen and distorting.
For achieving the above object, the invention provides a kind of safety access system for C/S framework business, it comprises: safe access gateway server and terminal security access unit; Its improvements are, between original service server and teleaction service terminal equipment, be connected in series access security connecting system.
Safe access gateway server in the present invention comprises authentication module 1, data encrypting and deciphering module 1, access control module, access monitoring module and data forwarding module; At key agreement phase, described safe access gateway server receives the data coming from described terminal security access unit, carry out identity verify by described authentication module 1 pair of terminal security access unit and consult, to the key of transfer of data protection, to consult to enter the service communication stage successfully; In the service communication stage, service terminal is mail to the data of service server, described safe access gateway receives the data that described terminal security access unit sends, by described data encrypting and deciphering module 1 pair of decrypt data, data after deciphering are given described service server according to described access control module to the result of determination of teleaction service terminal access authority by described data forwarding module; In the service communication stage, service server is mail to the data of teleaction service terminal, described safe access gateway receives the data that described service server sends, be encrypted by described data encrypting and deciphering module 1 pair of communication data, the data after encryption are given described terminal security access unit by described data forwarding module; Described access monitoring module monitors the access state of terminal security access unit registered in safe access gateway server.
Terminal security access unit in the present invention comprises: authentication module 2, data encrypting and deciphering module 2 and data transmission module; At key agreement phase, described terminal security access unit carries out certification and arranging key by described authentication module 1 with described safe access gateway server, consults to enter the service communication stage successfully; In the service communication stage, teleaction service terminal is mail to the data of service server, described secure accessing unit receives the data that teleaction service terminal sends, be encrypted by described data encrypting and deciphering module 2 pairs of data, the data after encryption are transferred to described safe access gateway server by described data transmission module; In the service communication stage, service server is mail to the data of teleaction service terminal, terminal security access unit receives the data that safe access gateway sends, by described data encrypting and deciphering module 2 pairs of decrypt data, the data after deciphering are transferred to described teleaction service terminal by described data transmission module.
Described safe access gateway in the present invention and terminal security access unit are supported based on the authentication mode of certificate and the authentication mode based on preset public private key pair.
The present invention also provides a kind of safety access method of the safety access system for C/S framework business, the mode of operation of the method is divided into authentication stage, service communication stage and symmetrical authentication phase, its improvements are, safety access method comprises the steps:
1). first terminal security access unit enters the authentication stage, and in the authentication stage, terminal security access unit initiates certification to safe access gateway server;
2). in the authentication stage, certification uses the agreement based on the challenge-response of PKI system;
3). in the authentication stage, consult the symmetric key being used for transfer of data protection, after being successfully completed, enter the service communication stage;
4). in the service communication stage, after terminal security access unit receives the data of teleaction service terminal, data are encrypted, then enciphered data is sent to safe access gateway server, after safe access gateway server receives the data coming from terminal security access unit, to decrypt data, and be transmitted to service server;
5). in the service communication stage, safe access gateway server is encrypted data after getting service server data, is then transmitted to terminal security access unit; After terminal security access unit will receive and come from safe access gateway server data, to decrypt data, and be transmitted to teleaction service terminal;
6). enter symmetrical authentication phase when terminal security access unit communicates provisional interruption or data generation encryption and decryption mistake with safe access gateway, in symmetrical authentication phase, terminal security access unit initiates certification to safe access gateway server;
7). in symmetrical authentication phase, certification uses the agreement based on the challenge-response of PKI system, enters the service communication stage after completing;
8). reenter the authentication stage reaching symmetrical authentification failure threshold values or arrive after asymmetric certification completes threshold time; Wherein, symmetrical authentification failure threshold values and asymmetric certification complete threshold time and can arrange in safe access gateway.
Compared with the prior art, a kind of safety access system for C/S framework business provided by the invention and relevant cut-in method, all kinds of terminal equipments can be applied to and use Ethernet interface communication, being connected GPRS module communication etc. by serial ports; The bidirectional identification solving service server and teleaction service terminal room differentiates problem; Ensure that communicating pair confirms mutually the other side's identity by authentication, with the trust preventing unauthorized remote terminal equipment from gaining service server by cheating, thus steal and distort the information of application server or illegal traffic server controls teleaction service terminal, carry out the problem of malicious sabotage; Solve the safety issue of data between teleaction service terminal and service server; After authentication, system data to be encrypted, integrity protection, thus to ensure that data are not stolen and distort; And under the prerequisite of the system architecture and few change configuration that do not change original system, provide the protection of " transparent "; Safety access system supports multiple cryptographic algorithm adapted; Meanwhile, monitor by the access situation of safe access gateway to terminal security access unit registered in a gateway.
Accompanying drawing explanation
Fig. 1 is the application structure schematic diagram of the safety access system for C/S framework business.
Fig. 2 is the flow chart of safety access method.
Embodiment
As shown in Figure 1, deployment secure connecting system between teleaction service terminal and service server, the identity between teleaction service terminal and service server and all business datums carry out identity verify and transmit protecting by this system.
In a first aspect of the present invention, provide a kind of system being applicable to strengthen various RTU (remote terminal unit) fail safe for C/S framework business.Safe access gateway server is used for authentication terminal equipment identities, coordinates terminal equipment, makes it and transmission data safe between service server; Terminal security access unit is for expanding RTU (remote terminal unit) authentication ability and safe transmission ability.
Wherein, terminal security access unit can be respectively the equipment being received teleaction service terminal data by Ethernet interface, RS232 serial ports or optical fiber interface, built in hardware cryptographic algorithm chip, terminal security access unit carries out certification and arranging key by authentication module and safe access gateway server; Consult encryption and decryption and the forwarding of being carried out data successfully by data encrypting and deciphering module and transport module, realize the safety function of teleaction service end side safety access system.
Safe access gateway server can be the server of Dual-Ethernet interface, cryptographic algorithm can be realized by built in hardware encrypted card, safe access gateway server by authentication module to terminal security access unit carry out identity verify and consult to transfer of data protection key; Consult encryption and decryption and the forwarding of being carried out data successfully by data encrypting and deciphering module and data transmission module; Meanwhile, safe access gateway server can monitor the access state of registered terminal security access unit, realizes the safety function of service server side safety access system.
Terminal security access unit can support that all kinds of terminal equipments being realized tcp/ip communication by Ethernet interface, RS232 serial ports, optical fiber interface are connected; The support of safe access gateway server is connected with service server by routing mode.The safety access system be made up of safe access gateway server and terminal security access unit can be serially connected with between service server and teleaction service terminal; do not changing the system architecture of original system and and under the prerequisite of few change configuration, providing the protection of " transparent ".
As shown in Figure 2, propose a kind of safety access method of the safety access system for C/S framework business, comprise step as follows:
1). first terminal security access unit enters the authentication stage, and in the authentication stage, terminal security access unit initiates certification to safe access gateway server;
2). in the authentication stage, certification uses the agreement based on the challenge-response of PKI system;
3). in the authentication stage, consult the symmetric key being used for transfer of data protection, after being successfully completed, enter the service communication stage;
4). in the service communication stage, after terminal security access unit receives the data of teleaction service terminal, data are encrypted, then enciphered data is sent to safe access gateway server, after safe access gateway server receives the data coming from terminal security access unit, to decrypt data, and be transmitted to service server;
5). in the service communication stage, safe access gateway server is encrypted data after getting service server data, is then transmitted to terminal security access unit; After terminal security access unit will receive and come from safe access gateway server data, to decrypt data, and be transmitted to teleaction service terminal.
6). enter symmetrical authentication phase when terminal security access unit communicates provisional interruption or data generation encryption and decryption mistake with safe access gateway, in symmetrical authentication phase, terminal security access unit initiates certification to safe access gateway server.
7). in symmetrical authentication phase, certification uses the agreement based on the challenge-response of PKI system, enters the service communication stage after completing;
8). reach symmetrical authentification failure threshold values or arrive asymmetric certification complete threshold time after (symmetrical authentification failure threshold values and asymmetric certification complete threshold time and can arrange in safe access gateway), reenter the authentication stage.
9) in whole process, safe access gateway can monitor the access state of registered terminals secure accessing unit, and records detailed audit information for inquiring about afterwards.
The concrete steps of described safety access method are as follows:
1. authentication, identification authentication mode has two kinds of modes:
Based on the PKI authentication mode of certificate;
Based on the PKI authentication mode of preset public private key pair;
PKI authentication mode step based on certificate:
1) terminal security access unit A sends authentication request clientHello message to safe access gateway server B, contains the authentication mode of A, the algorithm of A support and the random number challenge of A generation in clientHello message;
2) B confirms algorithm after receiving the clientHello message of A, signature response is carried out to the random number challenge that A produces, and produce a random number challenge and form serverHello message together with signature response and send to A, the certificate of oneself is sent to A by B simultaneously;
3), after the certificate receiving B as A and serverHello message, following sub-process is comprised:
A) certificate of B is verified;
B) from the certificate be verified, extract the signature value of PKI to random number verify;
C) private key is used to carry out signature response to the random number that B produces;
D) produce a symmetric key, and with the PKI of B, protection is encrypted to key;
E) send to B by signature response and by the key formation ClientKeyExchange message of B PKI protection, the certificate of oneself is sent to B by A simultaneously;
4), after the certificate receiving A as B and ClientKeyExchange message, following sub-process is comprised:
A) certificate of A is verified;
B) from the certificate be verified, extract the signature value of PKI to random number verify;
C), after the success of certifying signature value, private key is used to be decrypted the key that A produces;
D) finally the Finish message of authentication success is sent to A;
PKI authentication mode step based on preset public private key pair:
1) terminal security access unit A sends authentication request clientHello message to safe access gateway server B, contains the authentication mode of A, the algorithm of A support and the random number challenge of A generation in clientHello message;
2) B confirms algorithm after receiving the clientHello message of A, carries out signature response to the random number challenge that A produces, and produces a random number challenge and send to A together with signature response formation serverHello message;
3), after the certificate receiving B as A and serverHello message, following sub-process is comprised:
A) from the certificate of preset B, extract the signature value of PKI to random number to verify;
B) private key is used to carry out signature response to the random number that B produces;
C) produce a symmetric key, and with the PKI of B, protection is encrypted to key;
D) by signature response and form ClientKeyExchange message by the key of B PKI protection and send to B, while A by oneself ID value mode in B corresponding to pre-arranged public to A;
4), after the certificate receiving A as B and ClientKeyExchange message, following sub-process is comprised:
A) the ID value taking-up A sent according to A is preset at the PKI in B;
B), after taking out PKI success, verify by the signature value of this PKI to random number;
C), after the success of certifying signature value, private key is used to be decrypted the key that A produces;
D) finally the Finish message of authentication success is sent to A;
5) after completing asymmetric certification, terminal security access unit and safe access gateway send change_cipher_spec message mutually, notify that the key that the other side consults is encrypted deciphering.Then, initiate agent way negotiation message by terminal security access unit A to safe access gateway server B, B confirms agent way after receiving message and replys A.
2. unidirectional authentication
1) symmetrical authentication phase is entered when terminal security access unit communicates provisional interruption or data generation encryption and decryption mistake with safe access gateway, in symmetrical authentication phase, terminal security access unit initiates certification to safe access gateway server, and certification adopts the mode using the symmetric key consulted in above-mentioned steps to do MAC computing to carry out.
2) after completing symmetrical certification, terminal security access unit and safe access gateway send change_cipher_spec message mutually, notify that the key that the other side consults is encrypted deciphering.Then, initiate agent way negotiation message by terminal security access unit A to safe access gateway server B, B confirms agent way after receiving message and replys A.
3. service communication
When agent way is consulted successfully, terminal security access unit A receives the application data of teleaction service terminal C, safe access gateway server B will be transmitted to after data encryption, after B receives the data coming from A, data deciphering be transmitted to service server S.B gets the data of S, is transmitted to A by after data encryption, after A receives the data coming from B, data deciphering is transmitted to C.
The invention solves the secure access problem between client and server under the business model using C/S framework, mainly contain following advantage:
1) the bidirectional identity authentication problem of client and server is solved.Confirm mutually the other side's identity by authentication teleaction service terminal and application server, falsely used to have prevented side's identity.
2) data security sex chromosome mosaicism between teleaction service terminal equipment and service server is solved.All protected through confidentiality and integrity by the business datum of safety access system, thus ensure that data are not monitored and distort.
3) system architecture of original operation system is maintained.The safety access system that safe access gateway server and terminal security access unit are formed can be serially connected with between service server and client, under the prerequisite of the system architecture and few change configuration that do not change original system, provides the protection of " transparent ".
It is to be understood that content of the present invention and embodiment are intended to the practical application proving technical scheme provided by the present invention, should not be construed as limiting the scope of the present invention.Those skilled in the art inspired by the spirit and principles of the present invention, can do various amendment, equivalent replacement or improve.But these changes or amendment are all in the protection range that application is awaited the reply.

Claims (4)

1. for a safety access system for C/S framework business, it comprises: safe access gateway server and terminal security access unit; It is characterized in that, service server, described safety access system, teleaction service terminal equipment connect successively;
The described safety access system for C/S framework business realizes secure accessing as follows:
1). first terminal security access unit enters the authentication stage, and in the authentication stage, terminal security access unit initiates certification to safe access gateway server;
2). in the authentication stage, certification uses the agreement of choosing war ?response based on PKI system;
3). in the authentication stage, consult the symmetric key being used for transfer of data protection, after being successfully completed, enter the service communication stage;
4). in the service communication stage, after terminal security access unit receives the data of teleaction service terminal, data are encrypted, then enciphered data is sent to safe access gateway server, after safe access gateway server receives the data coming from terminal security access unit, to decrypt data, and be transmitted to service server;
5). in the service communication stage, safe access gateway server is encrypted data after getting service server data, is then transmitted to terminal security access unit; After terminal security access unit will receive and come from safe access gateway server data, to decrypt data, and be transmitted to teleaction service terminal;
6). enter symmetrical authentication phase when terminal security access unit communicates provisional interruption or data generation encryption and decryption mistake with safe access gateway, in symmetrical authentication phase, terminal security access unit initiates certification to safe access gateway server;
7). in symmetrical authentication phase, certification uses the agreement of choosing war ?response based on PKI system, enters the service communication stage after completing;
8). reenter the authentication stage reaching symmetrical authentification failure threshold values or arrive after asymmetric certification completes threshold time; Wherein, symmetrical authentification failure threshold values and asymmetric certification complete threshold time and can arrange in safe access gateway.
2. safety access system according to claim 1, is characterized in that, described safe access gateway server, comprises authentication module 1, data encrypting and deciphering module 1, access control module, access monitoring module and data forwarding module; At key agreement phase, described safe access gateway server receives the data coming from described terminal security access unit, carry out identity verify by described authentication module 1 pair of terminal security access unit and consult, to the key of transfer of data protection, to consult to enter the service communication stage successfully; In the service communication stage, service terminal is mail to the data of service server, described safe access gateway receives the data that described terminal security access unit sends, by described data encrypting and deciphering module 1 pair of decrypt data, data after deciphering are given described service server according to described access control module to the result of determination of teleaction service terminal access authority by described data forwarding module; In the service communication stage, service server is mail to the data of teleaction service terminal, described safe access gateway receives the data that described service server sends, be encrypted by described data encrypting and deciphering module 1 pair of communication data, the data after encryption are given described terminal security access unit by described data forwarding module; Described access monitoring module monitors the access state of terminal security access unit registered in safe access gateway server.
3. safety access system according to claim 2, is characterized in that, described terminal security access unit comprises: authentication module 2, data encrypting and deciphering module 2 and data transmission module; At key agreement phase, described terminal security access unit carries out certification and arranging key by described authentication module 1 with described safe access gateway server, consults to enter the service communication stage successfully; In the service communication stage, teleaction service terminal is mail to the data of service server, described secure accessing unit receives the data that teleaction service terminal sends, be encrypted by described data encrypting and deciphering module 2 pairs of data, the data after encryption are transferred to described safe access gateway server by described data transmission module; In the service communication stage, service server is mail to the data of teleaction service terminal, terminal security access unit receives the data that safe access gateway sends, by described data encrypting and deciphering module 2 pairs of decrypt data, the data after deciphering are transferred to described teleaction service terminal by described data transmission module.
4. the safety access system according to claim 1,2 or 3, is characterized in that, described safe access gateway and terminal security access unit are supported based on the authentication mode of certificate and the authentication mode based on preset public private key pair.
CN201110398830.0A 2011-12-05 2011-12-05 A kind of safety access system for C/S framework business and relevant cut-in method Active CN102413144B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110398830.0A CN102413144B (en) 2011-12-05 2011-12-05 A kind of safety access system for C/S framework business and relevant cut-in method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110398830.0A CN102413144B (en) 2011-12-05 2011-12-05 A kind of safety access system for C/S framework business and relevant cut-in method

Publications (2)

Publication Number Publication Date
CN102413144A CN102413144A (en) 2012-04-11
CN102413144B true CN102413144B (en) 2015-08-05

Family

ID=45914994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110398830.0A Active CN102413144B (en) 2011-12-05 2011-12-05 A kind of safety access system for C/S framework business and relevant cut-in method

Country Status (1)

Country Link
CN (1) CN102413144B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796397B (en) * 2015-01-08 2017-09-19 北京思普崚技术有限公司 A kind of method that data encryption is sent
CN105516210B (en) * 2016-02-05 2018-08-21 山东信通电子股份有限公司 The system and method for terminal security access authentication
CN106411962B (en) * 2016-12-15 2019-08-27 中国科学技术大学 A kind of date storage method of combination user side access control and cloud access control
CN109688115B (en) * 2018-12-11 2022-09-13 北京数盾信息科技有限公司 Data security transmission system
CN112229438A (en) * 2020-08-31 2021-01-15 深圳技术大学 Natural ecological credible monitoring system and method
CN114928491A (en) * 2022-05-20 2022-08-19 国网江苏省电力有限公司信息通信分公司 Internet of things security authentication method, device and system based on identification cryptographic algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183942A (en) * 2006-11-15 2008-05-21 捷讯研究有限公司 Client credential based secure session authentication method and apparatus
CN101369995A (en) * 2008-05-30 2009-02-18 国网南京自动化研究院 Dial-up gateway based on security credible connection technology
CN101765057A (en) * 2008-12-25 2010-06-30 上海贝尔阿尔卡特股份有限公司 Method, equipment and system for providing multicast service to WiFi access terminal
CN101778099A (en) * 2009-12-31 2010-07-14 郑州信大捷安信息技术有限公司 Architecture accessing trusted network for tolerating untrusted components and access method thereof
CN102075522A (en) * 2010-12-22 2011-05-25 北京航空航天大学 Secure certification and transaction method with combination of digital certificate and one-time password
CN102223364A (en) * 2011-05-09 2011-10-19 飞天诚信科技股份有限公司 Method and system for accessing e-book data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183942A (en) * 2006-11-15 2008-05-21 捷讯研究有限公司 Client credential based secure session authentication method and apparatus
EP1924047A1 (en) * 2006-11-15 2008-05-21 Research In Motion Limited Client credential based secure session authentication method and apparatus
CN101369995A (en) * 2008-05-30 2009-02-18 国网南京自动化研究院 Dial-up gateway based on security credible connection technology
CN101765057A (en) * 2008-12-25 2010-06-30 上海贝尔阿尔卡特股份有限公司 Method, equipment and system for providing multicast service to WiFi access terminal
CN101778099A (en) * 2009-12-31 2010-07-14 郑州信大捷安信息技术有限公司 Architecture accessing trusted network for tolerating untrusted components and access method thereof
CN102075522A (en) * 2010-12-22 2011-05-25 北京航空航天大学 Secure certification and transaction method with combination of digital certificate and one-time password
CN102223364A (en) * 2011-05-09 2011-10-19 飞天诚信科技股份有限公司 Method and system for accessing e-book data

Also Published As

Publication number Publication date
CN102413144A (en) 2012-04-11

Similar Documents

Publication Publication Date Title
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
Saxena et al. Authentication and authorization scheme for various user roles and devices in smart grid
CN111049660B (en) Certificate distribution method, system, device and equipment, and storage medium
CN109088870B (en) Method for safely accessing acquisition terminal of power generation unit of new energy plant station to platform
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
CN100558035C (en) A kind of mutual authentication method and system
CN103095696B (en) A kind of authentication and cryptographic key negotiation method being applicable to power information acquisition system
CN102413144B (en) A kind of safety access system for C/S framework business and relevant cut-in method
CN107105060A (en) A kind of method for realizing electric automobile information security
CN111865939A (en) Point-to-point national secret tunnel establishment method and device
CN107769913A (en) A kind of communication means and system based on quantum UKey
CN105577365B (en) A kind of user accesses the cryptographic key negotiation method and device of WLAN
CN105978883B (en) Safe collecting method under extensive car networking
CN108712364B (en) Security defense system and method for SDN (software defined network)
CN102685749A (en) Wireless safety authentication method orienting to mobile terminal
CN104468126A (en) Safety communication system and method
CN111935213A (en) Distributed trusted authentication virtual networking system and method
CN102111273A (en) Pre-sharing-based secure data transmission method for electric load management system
CN101521667B (en) Method and device for safety data communication
CN111988328A (en) Safety guarantee method and system for acquiring terminal data of power generation unit of new energy plant station
CN115085943B (en) Edge computing method and platform for safe encryption of electric power Internet of things in north and south directions
CN101282208B (en) Method for updating safety connection association master key as well as server and network system
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
CN114095168B (en) Communication method based on quantum key and encrypted communication terminal thereof
CN108833113A (en) A kind of authentication method and system of the enhancing communication security calculated based on mist

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20171016

Address after: 100192 Beijing city Haidian District Qinghe small Camp Road No. 15

Co-patentee after: State Grid Smart Grid Institute

Patentee after: China Electric Power Research Institute

Co-patentee after: Weishi-ting Information Industry Co., Ltd., Chengdu City

Address before: 100192 Beijing city Haidian District Qinghe small Camp Road No. 15

Co-patentee before: Weishi-ting Information Industry Co., Ltd., Chengdu City

Patentee before: China Electric Power Research Institute

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100192 Beijing city Haidian District Qinghe small Camp Road No. 15

Co-patentee after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Patentee after: China Electric Power Research Institute

Co-patentee after: Weishi-ting Information Industry Co., Ltd., Chengdu City

Address before: 100192 Beijing city Haidian District Qinghe small Camp Road No. 15

Co-patentee before: State Grid Smart Grid Institute

Patentee before: China Electric Power Research Institute

Co-patentee before: Weishi-ting Information Industry Co., Ltd., Chengdu City