CN104301319A - Intelligent ammeter encryption management device and data encryption protection method - Google Patents

Intelligent ammeter encryption management device and data encryption protection method Download PDF

Info

Publication number
CN104301319A
CN104301319A CN201410553103.0A CN201410553103A CN104301319A CN 104301319 A CN104301319 A CN 104301319A CN 201410553103 A CN201410553103 A CN 201410553103A CN 104301319 A CN104301319 A CN 104301319A
Authority
CN
China
Prior art keywords
card
mac
encryption
key
psam
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410553103.0A
Other languages
Chinese (zh)
Inventor
沈鑫
李鹏
闫永梅
曹敏
丁心志
张林山
王昕�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of Yunnan Power System Ltd
Original Assignee
Electric Power Research Institute of Yunnan Power System Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of Yunnan Power System Ltd filed Critical Electric Power Research Institute of Yunnan Power System Ltd
Priority to CN201410553103.0A priority Critical patent/CN104301319A/en
Publication of CN104301319A publication Critical patent/CN104301319A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an intelligent ammeter encryption management device and a data encryption protection method. The device is formed by sequentially connecting an encryption management module, a card distribution management module, an intelligent ammeter and an electricity sale management module, wherein the encryption management module is formed by sequentially connecting a first authorization card, a second authorization card, a third authorization card, a fourth authorization card, a provincial master key card, a main transmission card, a prefecture-level master key card, a main transmission card, a prefecture-level card-washing mother card and a card-washing control card, the card distribution management module comprises a user card distribution mother card, a user card, a PSAM card distribution mother card and a PSAM card, the user card distribution mother card is connected with the user card and the PSAM card distribution mother card is connected with the PSAM card. According to the intelligent ammeter encryption management device and the data encryption protection method, advanced reliable and high-safety encryption algorithms and encryption management are adopted, the defect that users are charged for electricity according to data of meter reading is avoided, defects in management are eliminated, marketing management is reinforced, customer service level is improved, and valuable guidance and experience are provided for transformation of marketing mode exploration of power supply enterprises and companies.

Description

A kind of intelligent electric energy meter encryption handling device and protecting data encryption method
Technical field
The invention belongs to electricity field, especially a kind of technical field of intelligent electric energy meter encryption handling device.
Background technology
Along with the carrying out of electricity consumption system reform is more and more higher with the demand of the public to electricity consumption, study and utilize modernization intellectual technology to carry out automatic monitoring to electricity consumption, the sale of electricity pattern changing Utilities Electric Co.'s " first power and charge afterwards " is for a long time imperative.Adopt intelligent electric energy meter encryption handling system can solve tariff recovery, manual metering to the full extent and realize the some problem that power supply department management controls electricity.
Summary of the invention
In order to solve the problem, a kind of intelligent electric energy meter encryption handling device provided by the invention, this device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module.
Wherein, described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected.
A protecting data encryption method for intelligent electric energy meter encryption handling device, comprises following step:
Step 1: calculate MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P;
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value, and only when C, M, K are all effective, the MAC calculated is just effective;
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody, sends to user side, that is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2;
P *=E -1(Q+MAC,Key1)
MAC *=C -1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys described device with same cipher mode.
For protecting Information Security and the validity of customer transaction, make data from the attack of disabled user.To illustrate for the encryption handling in security mechanism, safety certification and protecting data encryption respectively below.
1. encryption handling comprises the various aspects of the destruction from the generation of key to key, and encryption handling module root key of the present invention generates shown in schematic diagram.In safety, reliably, flexibly under prerequisite, the generation master key at different levels of safety and all kinds of master key, and secret key safety is handed down to card sending system, be used for produce PSAM, subscriber card, optimum configurations card each key, guarantee fail safe and the consistency of key in above all links, realize the concentrated safety management to key.By four donors the highest respectively input 16 byte character strings, be expressed as A, B, C, D, then these four 16 byte character strings are converted into byte Type, be expressed as A*, B*, C*, D*, use B* to carry out 3DES encryption to A* and obtain E*, use D* to carry out 3DES encryption to C* and obtain F*.Utilize F* to E* carry out 3DES encryption obtain G*, front 16 bytes in status of getting G* as root key GKey, stored in the assigned address of root key card.
2. data authentication: the certificate scheme that the present invention adopts is divided into three kinds: internal authentication, external authentication, two-way authentication.Internal authentication we usually also referred to as authentication, the flow process of internal authentication is as follows: to same random number, and A, B are encrypted computing with corresponding key simultaneously, the ciphertext that obtains after comparison encryption.If ciphertext is consistent, then judge that certification is passed through.External authentication, also referred to as purview certification, only has and just can obtain further operating right by external authentication.Flow process A being done to external authentication is as follows: A gets a random number from B, and the A authenticate key of specifying obtains ciphertext to random number encryption, and the external authentication key that B is corresponding is decrypted ciphertext.If it is identical with the random number that A gets to decipher the plaintext obtained, then certification is passed through.Otherwise certification is not passed through.Namely two-way authentication also does external authentication while internal authentication.
3. protecting data encryption
In order to ensure the realization of the reliability of data, integrality and certification, system protecting data encryption, electric energy meter should first decrypting ciphertext, then verifies the validity that MAC verifies, and is verified and can carries out subsequent operation; There is anti-attack ability.Ciphertext form transmission ensure that the security reliability of data, and MAC adds the reliability that ensure that data integrity and certification.
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value.Only when C, M, K are all effective, the MAC calculated is just effective.Verification process needs following step:
Step 1: a kind of intelligent electric energy meter encryption handling device of the present invention calculates MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P.
MAC=C(Q,Key2)
P=E(Q+MAC,Key1)
Step 2: MAC value is attached to encrypt data P afterbody by device of the present invention, sends to user side.That is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2.
P *=E -1(Q+MAC,Key1)
MAC *=C -1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys device of the present invention with same cipher mode.
The present invention compared with the existing technology, has the following advantages and beneficial effect:
1. reduce the management cost of electric power system.Change backward, outmoded artificial electric energy tariff pattern, achieve the technological revolution of electricity clearing form, reduce the human input of expense of checking meter, urge, be that electric power system is cut payroll to improve efficiency, reduce management cost and create advantage;
2. fail safe and operating efficiency improve greatly, electricity clearing personnel can accomplish the home-confined data that just can read real-time electric energy meter, raise labour productivity greatly, decrease the danger that electricity clearing personnel step on bar operation, thus convenient, fast, safety simultaneously;
3. avoid electricity and settle accounts the drawback of checking meter, charging.Original craft is checked meter and is charged, and some managerial leaks, there is " connection-related electricity use, power-based electricity use, electricity use based on human relationships " phenomenon in the management of power use, the high damage of circuit, mistake of checking meter, client's arrearage not only make power supply enterprise sustain a loss, and also bring unnecessary trouble to Electricity customers.The enforcement of this system, adds electricity consumption transparency, reduces tariff recovery risk to greatest extent, has also made client use " relieved electricity, satisfied electricity ";
4. offer help for scientifically developing power load.By the load balancing analysis of intelligent electric energy meter, when developing new clothes load, just can accomplish and shooting the arrow at the target, avoiding the line loss because pell-mell development load, individual event overload cause;
5. the operational management means of rural power distribution have been enriched, the invention process is utilized to operate in rural area low-voltage distribution network, not only change " three is diligent " maintenance mode that the old circuit operation maintenance personnel that must rely on eye is diligent, diligent, tireless in running around, also to the three rate management carrying out fully digitalization, precision, rational allocation power resource, scientifically carries out operational management and has established solid foundation;
6. the present invention and greatly reduce the man power and material of debugging, the production cost reduced, largely decrease loaded down with trivial details and a large amount of basic security and marginal testing work minimizing, power department just can drop into the maintenance work such as circuit, equipment that more man power and material carries out other side.
Accompanying drawing explanation
Fig. 1 is structural representation of the present invention;
Fig. 2 is that encryption handling module root key of the present invention generates schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is clearly and completely described.
As shown in Figure 1, a kind of intelligent electric energy meter encryption handling device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module;
Described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected;
Described sale of electricity administration module is prior art module, at installation and operations such as each outlet of electric company, bank, self-aided terminals, completes sale of electricity work and the back-stage management work of prepayment meter and intelligent electric energy meter etc.Mainly realize pre-payment file administration, prepaid electricity selling management, intelligent electric energy meter management, optimum configurations, report query, charge, beat the multiple functions such as receipt.Described subscriber card, PSAM card are connected successively with intelligent electric energy meter, described sale of electricity administration module.
As shown in Figure 1, described encryption handling module installation province and district city two-stage encryption handling, be responsible for by one-level key management system the key master card generating and be kept at next stage use, next stage key management system mainly issues the various key master card and hair fastener master card that use in card issuance system at the corresponding levels.Multilevel mode is applicable to Wang Ji Utilities Electric Co. or provincial (comprising regional power grid) Utilities Electric Co.'s aspect, is convenient to unified management.Make further improvements with the major technique under existing single mode and be: under single mode, grasp respective key master card by office of prefectures and cities, structure is relatively simple, is applicable to use on a small scale, the situation that user is very little; Double pole mode can manage comparatively multi-user, has Redundancy Design, is applicable to the overlay management of Wang Ji Utilities Electric Co. or provincial Utilities Electric Co. aspect large regions.Encryption handling, to guaranteeing that the normal use of intelligent electric energy meter safety is most important, comprises the many aspects such as generation, storage, distribution, lower dress, protection, renewal of the initialization of module, key.Root key is generated each business root key in the electricity charge, metering, gatherer process by encryption handling module, under install in corresponding key master card; Under filled key master card and will be deployed in corresponding operation system and run, to ensure every business operation safety encipher.
Described hair fastener administration module structure is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Hair fastener administration module, primarily of subscriber card distribution, PSAM distribution, is responsible for the initialization of subscriber card and PSAM card, and for management and protection intelligent electric energy meter data message.
Described sale of electricity administration module, at installation and operations such as each outlet of electric company, bank, self-aided terminals, completes sale of electricity work and the back-stage management work of prepayment meter.For economizing on resources to greatest extent, rationally share the soft and hardware resource of marketing information system, local charge control electric energy meter and intelligent electric energy meter share a set of management system for selling power, pre-payment file administration, prepaid electricity selling management, intelligent electric energy meter management, optimum configurations, report query, charge can be realized, beat the multiple functions such as receipt.
For protecting Information Security and the validity of customer transaction, make data from the attack of disabled user.To illustrate for the encryption handling in security mechanism, safety certification and protecting data encryption respectively below:
1. encryption handling comprises the various aspects of the destruction from the generation of key to key, and encryption handling module root key as of the present invention in Fig. 2 generates shown in schematic diagram.In safety, reliably, flexibly under prerequisite, the generation master key at different levels of safety and all kinds of master key, and secret key safety is handed down to card sending system, be used for produce PSAM, subscriber card, optimum configurations card each key, guarantee fail safe and the consistency of key in above all links, realize the concentrated safety management to key.By four donors the highest respectively input 16 byte character strings, be expressed as A, B, C, D, then these four 16 byte character strings are converted into byte Type, be expressed as A*, B*, C*, D*, use B* to carry out 3DES encryption to A* and obtain E*, use D* to carry out 3DES encryption to C* and obtain F*.Utilize F* to E* carry out 3DES encryption obtain G*, front 16 bytes in status of getting G* as root key GKey, stored in the assigned address of root key card.
2. data authentication: the certificate scheme that the present invention adopts is divided into three kinds: internal authentication, external authentication, two-way authentication.Internal authentication we usually also referred to as authentication, the flow process of internal authentication is as follows: to same random number, and A, B are encrypted computing with corresponding key simultaneously, the ciphertext that obtains after comparison encryption.If ciphertext is consistent, then judge that certification is passed through.External authentication, also referred to as purview certification, only has and just can obtain further operating right by external authentication.Flow process A being done to external authentication is as follows: A gets a random number from B, and the A authenticate key of specifying obtains ciphertext to random number encryption, and the external authentication key that B is corresponding is decrypted ciphertext.If it is identical with the random number that A gets to decipher the plaintext obtained, then certification is passed through.Otherwise certification is not passed through.Namely two-way authentication also does external authentication while internal authentication.
3. protecting data encryption
In order to ensure the realization of the reliability of data, integrality and certification, system protecting data encryption, electric energy meter should first decrypting ciphertext, then verifies the validity that MAC verifies, and is verified and can carries out subsequent operation; There is anti-attack ability.Ciphertext form transmission ensure that the security reliability of data, and MAC adds the reliability that ensure that data integrity and certification.
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value.Only when C, M, K are all effective, the MAC calculated is just effective.Verification process needs following step:
Step 1: a kind of intelligent electric energy meter encryption handling device of the present invention calculates MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P.
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody by device of the present invention, sends to user side.That is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2) (4)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2.
P *=E -1(Q+MAC,Key1) (5)
MAC *=C -1(Q,Key2) (6)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys device of the present invention with same cipher mode.
Present invention employs advanced person is reliable, fail safe is high cryptographic algorithm and encryption handling, be conducive to strengthening marketing management and promoting level of customer service, provide valuable guidance and experience for reference for power supply enterprise and company's exploration marketing model change.

Claims (2)

1. an intelligent electric energy meter encryption handling device, is characterized in that, this device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module;
Wherein, described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected.
2. use the protecting data encryption method of a kind of intelligent electric energy meter encryption handling device described in claim 1, it is characterized in that, comprise following step:
Step 1: calculate MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P;
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
M is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value, and only when C, M, K are all effective, the MAC calculated is just effective;
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody, sends to user side, that is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2;
P *=E -1(Q+MAC,Key1)
MAC *=C -1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys described device with same cipher mode.
CN201410553103.0A 2014-10-17 2014-10-17 Intelligent ammeter encryption management device and data encryption protection method Pending CN104301319A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410553103.0A CN104301319A (en) 2014-10-17 2014-10-17 Intelligent ammeter encryption management device and data encryption protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410553103.0A CN104301319A (en) 2014-10-17 2014-10-17 Intelligent ammeter encryption management device and data encryption protection method

Publications (1)

Publication Number Publication Date
CN104301319A true CN104301319A (en) 2015-01-21

Family

ID=52320887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410553103.0A Pending CN104301319A (en) 2014-10-17 2014-10-17 Intelligent ammeter encryption management device and data encryption protection method

Country Status (1)

Country Link
CN (1) CN104301319A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166118A1 (en) * 2016-03-30 2017-10-05 李昕光 Key management method
CN107483185A (en) * 2017-07-25 2017-12-15 贵州眯果创意科技有限公司 A kind of mobile terminal PSAM card paying systems based on safe key
CN111582422A (en) * 2020-04-10 2020-08-25 全景智联(武汉)科技有限公司 CPU card anti-copy encryption method
CN115276963A (en) * 2022-06-13 2022-11-01 云南电网有限责任公司 Power grid security management method, system and medium based on intelligent key
CN115473729A (en) * 2022-09-09 2022-12-13 中国联合网络通信集团有限公司 Data transmission method, gateway, SDN controller and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5056140A (en) * 1990-02-22 1991-10-08 Blanton Kimbell Communication security accessing system and process
CN1567323A (en) * 2003-06-19 2005-01-19 北京握奇数据系统有限公司 Security measure management method of prepay IC card meter based on ESAM module
CN101256645A (en) * 2008-01-16 2008-09-03 苏州市城市信息化建设有限公司 Integration burgher card system and setting method
EP1973034A2 (en) * 1998-09-11 2008-09-24 Alexander Gelbman Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture
CN102111273A (en) * 2010-12-30 2011-06-29 中国电力科学研究院 Pre-sharing-based secure data transmission method for electric load management system
CN102281136A (en) * 2011-07-28 2011-12-14 中国电力科学研究院 Quantum key distribution system for safety communication of electric vehicle intelligent charging network
CN102903226A (en) * 2012-10-18 2013-01-30 杭州海兴电力科技股份有限公司 Data transmission method for communication of intelligent electric meters

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5056140A (en) * 1990-02-22 1991-10-08 Blanton Kimbell Communication security accessing system and process
EP1973034A2 (en) * 1998-09-11 2008-09-24 Alexander Gelbman Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture
EP1973034A3 (en) * 1998-09-11 2008-10-01 Alexander Gelbman Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture
CN1567323A (en) * 2003-06-19 2005-01-19 北京握奇数据系统有限公司 Security measure management method of prepay IC card meter based on ESAM module
CN101256645A (en) * 2008-01-16 2008-09-03 苏州市城市信息化建设有限公司 Integration burgher card system and setting method
CN102111273A (en) * 2010-12-30 2011-06-29 中国电力科学研究院 Pre-sharing-based secure data transmission method for electric load management system
CN102281136A (en) * 2011-07-28 2011-12-14 中国电力科学研究院 Quantum key distribution system for safety communication of electric vehicle intelligent charging network
CN102903226A (en) * 2012-10-18 2013-01-30 杭州海兴电力科技股份有限公司 Data transmission method for communication of intelligent electric meters

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
奥飚: "运用CPU卡的电力收费系统中密钥管理系统的安全性研究与设计", 《华北电力大学硕士学位论文》 *
肖现华: "基于密钥管理和安全认证的网络预付费管理模式的研究", 《山东建筑大学硕士学位论文》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166118A1 (en) * 2016-03-30 2017-10-05 李昕光 Key management method
CN108886465A (en) * 2016-03-30 2018-11-23 李昕光 Key management method
CN107483185A (en) * 2017-07-25 2017-12-15 贵州眯果创意科技有限公司 A kind of mobile terminal PSAM card paying systems based on safe key
CN111582422A (en) * 2020-04-10 2020-08-25 全景智联(武汉)科技有限公司 CPU card anti-copy encryption method
CN115276963A (en) * 2022-06-13 2022-11-01 云南电网有限责任公司 Power grid security management method, system and medium based on intelligent key
CN115473729A (en) * 2022-09-09 2022-12-13 中国联合网络通信集团有限公司 Data transmission method, gateway, SDN controller and storage medium
CN115473729B (en) * 2022-09-09 2024-05-28 中国联合网络通信集团有限公司 Data transmission method, gateway, SDN controller and storage medium

Similar Documents

Publication Publication Date Title
Zhuang et al. Blockchain for cybersecurity in smart grid: A comprehensive survey
CN103729942B (en) Transmission security key is transferred to the method and system of key server from terminal server
Petrlic A privacy-preserving concept for smart grids
CN109302491A (en) A kind of industry internet framework and its operation method based on block chain
CN104301319A (en) Intelligent ammeter encryption management device and data encryption protection method
CN109274498A (en) A kind of smart grid data aggregate and monitoring method based on alliance's chain
CN110120868B (en) Smart power grid safety data aggregation method and system based on block chain technology
CN103036884B (en) A kind of data guard method based on homomorphic cryptography and system
CN101593389A (en) A kind of key management method and system that is used for the POS terminal
CN201387642Y (en) Single-phase electronic type multi-rate prepayment electric energy meter
CN108173344A (en) LORA wireless communication techniques are in the application process of low-voltage distribution transformer platform district
CN103001771A (en) Data transmission security encryption method for metering automation system
CN110430050A (en) A kind of smart grid collecting method based on secret protection
Yan et al. Network security protection technology for a cloud energy storage network controller
Tian et al. Blockchain-based AMI framework for data security and privacy protection
CN112733211A (en) Intelligent power grid data storage scheme based on block chain
CN207283595U (en) User power utilization data analysis integrated system based on power information collection
CN105119719B (en) A kind of key management method of safe storage system
CN204206215U (en) A kind of intelligent electric energy meter encryption handling device
CN110299993A (en) A kind of telesecurity meter register method based on improvement IBOOE algorithm
CN207652034U (en) A kind of aftercurrent action protecting equipment based on LORA wireless communication techniques
Ai et al. A Blockchain-based Distributed Controllable Electricity Transaction Match System
CN102487502A (en) Cluster communication safety method
CN107948144B (en) Threat processing system based on intelligent power grid information security detection
Shovgenya et al. On demand for situational awareness for preventing attacks on the smart grid

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150121