CN103327020A - Security access method and system based on region dividing - Google Patents

Security access method and system based on region dividing Download PDF

Info

Publication number
CN103327020A
CN103327020A CN2013102424723A CN201310242472A CN103327020A CN 103327020 A CN103327020 A CN 103327020A CN 2013102424723 A CN2013102424723 A CN 2013102424723A CN 201310242472 A CN201310242472 A CN 201310242472A CN 103327020 A CN103327020 A CN 103327020A
Authority
CN
China
Prior art keywords
gateway
converyer
terminal
information
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102424723A
Other languages
Chinese (zh)
Inventor
徐敏
彭林
胡斌
朱力鹏
邵志鹏
楚杰
戴造建
侯战胜
李尼格
陈牧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Smart Grid Research Institute of SGCC
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN2013102424723A priority Critical patent/CN103327020A/en
Publication of CN103327020A publication Critical patent/CN103327020A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a security access method and system based on region dividing. A conveyer A and a conveyer B are arranged at the position of a terminal and the position of a gateway respectively, a security access platform system is managed in a divided mode according to region dividing, consumption of resources of a gateway server due to the fact that a large number of terminals build connection can be greatly reduced, and network resource consumption caused by long-distance transmission is reduced. The method that respective conveyers are respectively divided into each area is used, and the problem that long-distance transmission excessively consumes the resources of a public net is solved. Safety and reliability in the data transmission and identity authentication processes are improved through an SM1encipherment module, an SM2 signature module and an SM3 Hash module, on a hardware encryption card, of the national secret bureau.

Description

A kind of safety access method and system that divides based on the zone
Technical field
The invention belongs to information security, IT application, relate to safety access method and system that a kind of close office of employing state cryptographic algorithm of dividing based on the zone is encrypted.
Background technology
Safe access platform is that a kind of employing SSL (Secure Sockets Layer SSL) agreement (as shown in Figure 3) realizes a kind of novel VPN equipment of long-range access.It by the tunneling technique of packet encapsulation, and adopts the comprehensive safety mechanism such as encryption technology, authentication techniques and access control, the secure virtual dedicated network of structure on the public ip network facility.
Along with popularizing of the safe access platform of State Grid Corporation of China, more and more net province company and joined among the deployment of safe access platform.The net province companies such as North China, East China, Central China, northwest are just disposing this platform with more and more faster speed, immediately following and what come is the surge of the increasing and terminal quantity of the territorial scope of Platform deployment.And the communication of these terminals is also increasing to the complexity on its gateway separately.
At first because management be connected a connection and need to expend a large amount of server resources, the terminal quantity of different net province companies also differs widely.Some net province companies comparatively flourishing in economy adopt the PDA mobile operating in a large number, therefore their terminal quantity might reach hundreds thousand of, and but the terminal quantity in some economically underdeveloped areas is not a lot, substantially about thousands of, therefore just cause some areas and caused the phenomenon that server load is painstaking even crash because terminal quantity is huge, and occurred the phenomenon of the idle waste of server in other areas.
Secondly, along with portable terminal may appear at each position, the whole nation, therefore safeguarding that the routing table of its terminal and corresponding gateway also needs to spend great Internet resources, also is huge to the consumption of Internet resources.
At last, what the core of original safe access platform authentication module adopted is that the RSA signature algorithm cooperates the fail safe of SHA1 hash algorithm authentication certificate, and RSA cryptographic algorithms is a kind of rivest, shamir, adelman.RSA is widely used in public key cryptography standards and e-business.The difficulty of decomposing very big integer has determined the reliability of RSA Algorithm.In other words, decompose more difficulty of very big integer, RSA Algorithm is more reliable.If someone finds a kind of algorithm of very fast factoring, the reliability with the information of rsa encryption just is certain to extremely descend so.But the possibility that finds such algorithm is very little.Only have today short RSA key just may be broken by powerful mode solution.Till 2008, in the world also without any the mode of attacking reliably RSA Algorithm.As long as the length long enough of its key, be actually to be separated with the information of rsa encryption and break.But in today that distributed computing technology and quantum computer theory reach its maturity, the rsa encryption fail safe has been subject to challenge.Therefore, in today of computer technology fast development, if continue to use old RSA signature algorithm to carry out authentication, will inevitably bring the danger that is caused the Intranet information-leakage by assault.And safe access platform is higher to the security requirement of authentication algorithm as a kind of safety means, in case safe access platform cannot stand attack, all resources of Intranet will be exposed to fully the hacker in face of, cause loss without redemption.Elliptic curve cryptosystem is the strong competitor who replaces RSA.The elliptic curve cryptography method is compared with the RSA method, and following advantage is arranged: (1) security performance is higher to have identical security intensity such as 160 ECC with 1024 RSA, DSA.(2) amount of calculation is little, and processing speed is on the processing speed of private key (deciphering and signature) soon, and ECC is faster more than RSA, DSA.(3) the memory space keys sizes that takies little ECC and system parameters compare with RSA, DSA much smaller, so the memory space that takies is much smaller.(4) bandwidth requirement is low so that ECC has the extensive application prospect that gets.The SM2 signature algorithm of the close office of state just is based on oval algorithm and realizes having higher encryption and reliability.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art, the invention provides a kind of safety access method and system that divides based on the zone.
In order to realize the foregoing invention purpose, the present invention takes following technical scheme:
A kind of safety access method of dividing based on the zone, the method is applied to safe access platform, it is characterized in that, and described method comprises: arrange respectively converyer A and converyer B in terminal and gateway.
Preferably, described converyer A comprises regional gateway routing table, and described converyer B comprises detailed gateway routing table.
Preferably, described method comprises the steps:
(1) terminal is handed to described converyer A with information to be sent, and converyer A determines that this information arrives the optimal path of gateway A and is handed to gateway A, carries out the computing of SM2 signature after calling the preliminary treatment of SM3 digest algorithm;
(2) gateway A receives described information, identifies its gateway identification code, and the described converyer B that is located at gateway A determines that this message arrives the optimal path of gateway B, and this message is forwarded to gateway B;
(3) gateway B receives described information and mates the gateway identification code, if the match is successful, and execution in step (4) then; If it fails to match, then abandon this message;
(4) gateway B decomposed information bag calls the local certificate of SM3 digest algorithm preliminary treatment and it is carried out hash, carries out afterwards the checking of information with the SM2 computing, if checking is passed through, then information is sent to authentication server; If the checking do not pass through, then in connection breaking;
(5) certificate server receives described information, the connection data storehouse, and the inquiring user authority, and the result returned terminal.
Preferably, the preliminary treatment of the described SM3 of calling algorithm comprises: the PKI of user ID and certificate is carried out the SM3 Hash operation obtain the Z value, operational formula is: Z=SM3 (ENTL||ID||a||b||xG||yG||xA||yA); Wherein: ENTL is the bit length by the ID of 2 byte representations; ID is user ID; A, b are system's parameter of curve; XG, yG are basic point; XA, yA are user's PKI; Use the Z value and treat signature information M, obtain digest value H by the SM3 computing; Digest value H is used for the SM2 digital signature; Operational formula is: H=SM3 (Z||M);
The computing of SM2 signature comprises in the described step (1): use the certificate private key of terminal, obtain as a result S to carry out the computing of SM2 signature through the pretreated information H of SM3 Hash, expression formula is: S=SM2(H), and S passed to described certificate server;
The SM2 computing comprises in the described step (4): the PKI that uses gateway server, the signature value S that transmits through the pretreated information H of SM3 algorithm and terminal is carried out the computing of SM2 sign test obtain as a result Q, expression formula is: Q=SM2(H||S), and judge whether the value of Q is true; If illustrate that very then the certificate of terminal is legal, checking is passed through; If be not true, illustrate that then the certificate of terminal is illegal, interruption is connected with terminal.
Preferably, described converyer A or converyer B be by searching routing table, and utilize dijkstra's algorithm to obtain described optimal path.
Preferably, described information comprises: the unique identifier (UID) of the gateway identification code of its affiliated area and gateway server equipment.
On the other hand, the invention provides a kind of safety access system of dividing based on the zone, described system comprises: terminal, base station, router, gateway, certificate server and background data base; It is characterized in that, described terminal and gateway are respectively equipped with converyer A and converyer B.
Preferably, described converyer A comprises regional gateway routing table, and described converyer B comprises detailed gateway routing table.
Preferably, described converyer A and B all arrive the optimal path of next gateway for the information of computing terminal transmission.
Compared with prior art, beneficial effect of the present invention is:
(1) divides according to the zone, safe access platform system is divided and rule, can reduce greatly because great amount of terminals connects to the consumption of gateway server resource and reduces the network resource consumption that long-distance transmissions is brought;
(2) by divide the method for converyer separately at regional, solved the resource consumption problems of too of remote information transmission to public network;
(3) improved security reliability in transfer of data and authentication process by the SM1 of the close office of the state on hardware encryption card encrypting module, SM2 signature blocks and SM3 Hash module.
Description of drawings
Fig. 1 is existing safety access system;
Fig. 2 is the safety access system after the improvement;
Fig. 3 is SSL handshake procedure figure;
Fig. 4 is converyer A structure chart;
Fig. 5 is converyer B structure chart.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
The magnanimity portable terminal that the present invention is directed to the original system existence is improved with the not high problem of fail safe that is connected the time-delay phenomenon seriously and employing RSA signature algorithm brings at the remote a large amount of public network resource consumptions that produce in the process of safe access platform server that connect, and the main technical schemes of dealing with problems is: added respectively converyer A and B in terminal and gateway.And gateway is divided into several zones, each gateway only is responsible for the connection of the terminal in its zone.Converyer A(is as shown in Figure 4) be mounted in a software module on the terminal, comprised the gateway routing table of regional.Converyer B(is as shown in Figure 5) then be mounted in a module on the gateway, wherein comprised each detailed gateway distribution routing table of net province company, can find fast the routing iinformation of any one gateway B of the whole nation by this routing table gateway A, thereby information is forwarded on this gateway B fast.In the authentication process, cooperate the algorithm of SHA1 Hash to be revised as the state's SM2 of close office signature algorithm original RSA signature algorithm and cooperate the state SM3 of close office hash algorithm, the validity of certificate is carried out the checking of greater strength.
Reaching by reference to the accompanying drawings performing step is described in detail as follows.
Step 1: terminal (PC, the information that PDA) will send sends on the converyer, converyer is searched the IP address of routing table and comparison oneself, calculates shortest path by the path by dijkstra's algorithm, on the local area gateway A that this terminal of information transmission range is nearest.The gateway identification code (such as gateway B) of its affiliated area and the unique identifier (UID) of gateway server equipment have been comprised in the information that wherein terminal sends, and carry out the computing of SM2 signature after calling the digest algorithm SM3 Hash operation preliminary treatment of hardware encipher card interface, concrete processing procedure is as follows:
1. the PKI of the user ID of terminal and terminal certificate is carried out the SM3 Hash operation and obtain the Z value, operational formula is: Z=SM3 (ENTL||ID||a||b||xG||yG||xA||yA) wherein: ENTL is the bit length by the ID of 2 byte representations; ID is user ID; A, b are system's parameter of curve; XG, yG are basic point; XA, yA are user's PKI.
2. use the Z value and treat signature information M, obtain the process of digest value H by the computing of SM3 hash.Digest value H is used for the SM2 digital signature.Operational formula is: H=SM3 (Z||M).
3. use the certificate private key of terminal, obtain as a result S, S=SM2(H to carry out the computing of SM2 signature through the pretreated information H of SM3 Hash), and S passed to server.
Step 2: after gateway A receives the information of self terminal, resolve this information.After identifying the gateway identification code of its affiliated area, gateway A connects converyer B, is searched the detailed routing table that is positioned on the gateway by converyer B, again calculates the optimal path that arrives gateway B by dijkstra's algorithm, and information is forwarded to intended gateway B.
Step 3: after gateway B receives the information of self terminal, coupling gateway identification code, after the message that is confirmed to be from the terminal of its compass of competency, packets of information is decomposed, and call hardware encipher card interface SM3 digest algorithm local certificate is carried out hash after preliminary treatment, carry out afterwards the checking of information with the SM2 algorithm.Concrete processing procedure is as follows:
1. the PKI of the user ID of gateway server and terminal certificate is carried out the SM3 Hash operation and obtain the Z value, operational formula is: Z=SM3 (ENTL||ID||a||b||xG||yG||xA||yA) wherein: ENTL is the bit length by the ID of 2 byte representations; ID is user ID; A, b are system's parameter of curve; XG, yG are basic point; XA, yA are user's PKI.
2. use the Z value and treat signature information M, obtain the process of digest value H by the SM3 Hash operation.Digest value H is used for the SM2 digital signature.Operational formula is: H=SM3 (Z||M).
3. use the PKI of gateway server, the signature value S that transmits through the pretreated information H of SM3 Hash and terminal is carried out the computing of SM2 sign test obtains as a result Q, Q=SM2(H||S), and judge whether the value of Q is true, if illustrate that very then the certificate of terminal is legal, checking is passed through; If be not true, illustrate that then the certificate of terminal is illegal, interruption is connected with terminal.
4. after checking is passed through, information is sent on the authentication server on backstage.
Step 4: after the authentication server that is in the work Intranet receives the authentication information of terminal, connect the database on backstage, inquire about this user's authority, and be back to terminal.Terminal by the authentication after, the Intranet resource that just can finish whole handshake procedure and access its region.
Should be noted that at last: above embodiment is only in order to illustrate that technical scheme of the present invention is not intended to limit, although with reference to above-described embodiment the present invention is had been described in detail, those of ordinary skill in the field are to be understood that: still can make amendment or be equal to replacement the specific embodiment of the present invention, and do not break away from any modification of spirit and scope of the invention or be equal to replacement, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (9)

1. safety access method of dividing based on the zone, the method is applied to safe access platform, it is characterized in that, and described method comprises: arrange respectively converyer A and converyer B in terminal and gateway.
2. the method for claim 1 is characterized in that, described converyer A comprises regional gateway routing table, and described converyer B comprises detailed gateway routing table.
3. method as claimed in claim 2 is characterized in that, described method comprises the steps:
(1) terminal is handed to described converyer A with information to be sent, and converyer A determines that this information arrives the optimal path of gateway A and is handed to gateway A, carries out the computing of SM2 signature after calling the preliminary treatment of SM3 digest algorithm;
(2) gateway A receives described information, identifies its gateway identification code, and the described converyer B that is located at gateway A determines that this message arrives the optimal path of gateway B, and this message is forwarded to gateway B;
(3) gateway B receives described information and mates the gateway identification code, if the match is successful, and execution in step (4) then; If it fails to match, then abandon this message;
(4) gateway B decomposed information bag calls the local certificate of SM3 digest algorithm preliminary treatment and it is carried out hash, carries out afterwards the checking of information with the SM2 computing, if checking is passed through, then information is sent to authentication server; If the checking do not pass through, then in connection breaking;
(5) certificate server receives described information, the connection data storehouse, and the inquiring user authority, and the result returned terminal.
4. method as claimed in claim 3 is characterized in that,
The preliminary treatment of the described SM3 of calling algorithm comprises: the PKI of user ID and certificate is carried out the SM3 Hash operation obtain the Z value, operational formula is: Z=SM3 (ENTL||ID||a||b||xG||yG||xA||yA); Wherein: ENTL is the bit length by the ID of 2 byte representations; ID is user ID; A, b are system's parameter of curve; XG, yG are basic point; XA, yA are user's PKI; Use the Z value and treat signature information M, obtain digest value H by the SM3 computing; Digest value H is used for the SM2 digital signature; Operational formula is: H=SM3 (Z||M);
The computing of SM2 signature comprises in the described step (1): use the certificate private key of terminal, obtain as a result S to carry out the computing of SM2 signature through the pretreated information H of SM3 Hash, expression formula is: S=SM2(H), and S passed to described certificate server;
The SM2 computing comprises in the described step (4): the PKI that uses gateway server, the signature value S that transmits through the pretreated information H of SM3 algorithm and terminal is carried out the computing of SM2 sign test obtain as a result Q, expression formula is: Q=SM2(H||S), and judge whether the value of Q is true; If illustrate that very then the certificate of terminal is legal, checking is passed through; If be not true, illustrate that then the certificate of terminal is illegal, interruption is connected with terminal.
5. method as claimed in claim 3 is characterized in that: described converyer A or converyer B be by searching routing table, and utilize dijkstra's algorithm to obtain described optimal path.
6. method as claimed in claim 2 is characterized in that, described information comprises: the unique identifier (UID) of the gateway identification code of its affiliated area and gateway server equipment.
7. safety access system of dividing based on the zone, described system comprises: terminal, base station, router, gateway, certificate server and background data base; It is characterized in that, described terminal and gateway are respectively equipped with converyer A and converyer B.
8. system as claimed in claim 7, it is characterized in that: described converyer A comprises regional gateway routing table, described converyer B comprises detailed gateway routing table.
9. system as claimed in claim 7 is characterized in that: the information that described converyer A and B all send for computing terminal arrives the optimal path of next gateway.
CN2013102424723A 2013-06-19 2013-06-19 Security access method and system based on region dividing Pending CN103327020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102424723A CN103327020A (en) 2013-06-19 2013-06-19 Security access method and system based on region dividing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102424723A CN103327020A (en) 2013-06-19 2013-06-19 Security access method and system based on region dividing

Publications (1)

Publication Number Publication Date
CN103327020A true CN103327020A (en) 2013-09-25

Family

ID=49195551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102424723A Pending CN103327020A (en) 2013-06-19 2013-06-19 Security access method and system based on region dividing

Country Status (1)

Country Link
CN (1) CN103327020A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363278A (en) * 2014-11-13 2015-02-18 许继电气股份有限公司 Mass terminal communication access system
CN106612505A (en) * 2015-10-23 2017-05-03 国网智能电网研究院 Wireless sensor safety communication and anti-leakage positioning method based on region division
CN109155779A (en) * 2016-02-12 2019-01-04 杰皮优艾欧有限公司 Mobile security emptier
CN109257375A (en) * 2018-11-01 2019-01-22 北京信息科技大学 A kind of internet access authentication system and method based on trust anchor system
CN116436703A (en) * 2023-06-13 2023-07-14 广东电网有限责任公司 Financial privacy data management method and system based on smart grid

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003190A1 (en) * 2002-06-27 2004-01-01 International Business Machines Corporation Remote authentication caching on a trusted client or gateway system
CN101771632A (en) * 2008-12-29 2010-07-07 厦门雅迅网络股份有限公司 Cross-LAN system communication method
CN103051611A (en) * 2012-12-11 2013-04-17 北京交通大学 Security mobility management method in identity and location separation system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003190A1 (en) * 2002-06-27 2004-01-01 International Business Machines Corporation Remote authentication caching on a trusted client or gateway system
CN101771632A (en) * 2008-12-29 2010-07-07 厦门雅迅网络股份有限公司 Cross-LAN system communication method
CN103051611A (en) * 2012-12-11 2013-04-17 北京交通大学 Security mobility management method in identity and location separation system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
国家密码管理局: "SM2椭圆曲线公钥密码算法", 《SM2椭圆曲线公钥密码算法 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363278A (en) * 2014-11-13 2015-02-18 许继电气股份有限公司 Mass terminal communication access system
CN106612505A (en) * 2015-10-23 2017-05-03 国网智能电网研究院 Wireless sensor safety communication and anti-leakage positioning method based on region division
CN109155779A (en) * 2016-02-12 2019-01-04 杰皮优艾欧有限公司 Mobile security emptier
CN109155779B (en) * 2016-02-12 2021-06-11 杰皮优艾欧有限公司 Mobile safety unloader
CN109257375A (en) * 2018-11-01 2019-01-22 北京信息科技大学 A kind of internet access authentication system and method based on trust anchor system
CN109257375B (en) * 2018-11-01 2021-12-28 北京信息科技大学 Internet access authentication system and method based on trust anchor system
CN116436703A (en) * 2023-06-13 2023-07-14 广东电网有限责任公司 Financial privacy data management method and system based on smart grid
CN116436703B (en) * 2023-06-13 2023-09-19 广东电网有限责任公司 Financial privacy data management method and system based on smart grid

Similar Documents

Publication Publication Date Title
Ustun et al. A novel approach for mitigation of replay and masquerade attacks in smartgrids using IEC 61850 standard
Aman et al. Low power data integrity in IoT systems
CN102571702B (en) Key generation method, system and equipment in Internet of things
CN106789015B (en) Intelligent power distribution network communication safety system
Raza Lightweight security solutions for the internet of things
CN103138938B (en) Based on SM2 certificate request and the application process of CSP
Huang et al. PUF-assisted group key distribution scheme for software-defined wireless sensor networks
CN103095696A (en) Identity authentication and key agreement method suitable for electricity consumption information collection system
CN101771992B (en) Method, equipment and system for protection of confidentiality of international mobile subscriber identifier IMSI
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN103327020A (en) Security access method and system based on region dividing
CN102404220B (en) Equipment and implementation method of safety router based on proprietary protocol
CN110401530A (en) A kind of safety communicating method of gas meter, flow meter, system, equipment and storage medium
CN115242392B (en) Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN104883372A (en) Anti-cheating and anti-attack data transmission method based on wireless Ad Hoc network
Mbarek et al. Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec
CN108075895B (en) Node permission method and system based on block chain
Raad et al. Secure data in lorawan network by adaptive method of elliptic-curve cryptography
CN101616084A (en) A kind of distributed IPSec load sharing device and method
CN106209756B (en) Password update method, user equipment, subscriber location servers and domain router
CN102970134A (en) Method and system for encapsulating PKCS#7 (public-key cryptography standard #7) data by algorithm of hardware password equipment
CN101174945B (en) Method for validating PUSH message and identity of its transmission part
CN104486082A (en) Authentication method and router
Wang et al. A key management method for smart substation
Lv et al. A highly reliable lightweight distribution network communication encryption scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160425

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: State Grid Smart Grid Institute

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant before: State Grid Corporation of China

Applicant before: China Electric Power Research Institute

CB02 Change of applicant information

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant before: State Grid Corporation of China

Applicant before: China Electric Power Research Institute

Applicant before: State Grid Smart Grid Institute

COR Change of bibliographic data
RJ01 Rejection of invention patent application after publication

Application publication date: 20130925

RJ01 Rejection of invention patent application after publication