CN104301319A - Intelligent ammeter encryption management device and data encryption protection method - Google Patents
Intelligent ammeter encryption management device and data encryption protection method Download PDFInfo
- Publication number
- CN104301319A CN104301319A CN201410553103.0A CN201410553103A CN104301319A CN 104301319 A CN104301319 A CN 104301319A CN 201410553103 A CN201410553103 A CN 201410553103A CN 104301319 A CN104301319 A CN 104301319A
- Authority
- CN
- China
- Prior art keywords
- card
- mac
- encryption
- key
- psam
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000005611 electricity Effects 0.000 claims abstract description 30
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 238000013475 authorization Methods 0.000 claims abstract description 7
- 238000012790 confirmation Methods 0.000 claims description 4
- 238000004519 manufacturing process Methods 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 4
- 238000009826 distribution Methods 0.000 abstract description 11
- 230000007547 defect Effects 0.000 abstract 2
- 238000005406 washing Methods 0.000 abstract 2
- 230000009466 transformation Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 3
- 230000006378 damage Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an intelligent ammeter encryption management device and a data encryption protection method. The device is formed by sequentially connecting an encryption management module, a card distribution management module, an intelligent ammeter and an electricity sale management module, wherein the encryption management module is formed by sequentially connecting a first authorization card, a second authorization card, a third authorization card, a fourth authorization card, a provincial master key card, a main transmission card, a prefecture-level master key card, a main transmission card, a prefecture-level card-washing mother card and a card-washing control card, the card distribution management module comprises a user card distribution mother card, a user card, a PSAM card distribution mother card and a PSAM card, the user card distribution mother card is connected with the user card and the PSAM card distribution mother card is connected with the PSAM card. According to the intelligent ammeter encryption management device and the data encryption protection method, advanced reliable and high-safety encryption algorithms and encryption management are adopted, the defect that users are charged for electricity according to data of meter reading is avoided, defects in management are eliminated, marketing management is reinforced, customer service level is improved, and valuable guidance and experience are provided for transformation of marketing mode exploration of power supply enterprises and companies.
Description
Technical field
The invention belongs to electricity field, especially a kind of technical field of intelligent electric energy meter encryption handling device.
Background technology
Along with the carrying out of electricity consumption system reform is more and more higher with the demand of the public to electricity consumption, study and utilize modernization intellectual technology to carry out automatic monitoring to electricity consumption, the sale of electricity pattern changing Utilities Electric Co.'s " first power and charge afterwards " is for a long time imperative.Adopt intelligent electric energy meter encryption handling system can solve tariff recovery, manual metering to the full extent and realize the some problem that power supply department management controls electricity.
Summary of the invention
In order to solve the problem, a kind of intelligent electric energy meter encryption handling device provided by the invention, this device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module.
Wherein, described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected.
A protecting data encryption method for intelligent electric energy meter encryption handling device, comprises following step:
Step 1: calculate MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P;
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value, and only when C, M, K are all effective, the MAC calculated is just effective;
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody, sends to user side, that is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2;
P
*=E
-1(Q+MAC,Key1)
MAC
*=C
-1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys described device with same cipher mode.
For protecting Information Security and the validity of customer transaction, make data from the attack of disabled user.To illustrate for the encryption handling in security mechanism, safety certification and protecting data encryption respectively below.
1. encryption handling comprises the various aspects of the destruction from the generation of key to key, and encryption handling module root key of the present invention generates shown in schematic diagram.In safety, reliably, flexibly under prerequisite, the generation master key at different levels of safety and all kinds of master key, and secret key safety is handed down to card sending system, be used for produce PSAM, subscriber card, optimum configurations card each key, guarantee fail safe and the consistency of key in above all links, realize the concentrated safety management to key.By four donors the highest respectively input 16 byte character strings, be expressed as A, B, C, D, then these four 16 byte character strings are converted into byte Type, be expressed as A*, B*, C*, D*, use B* to carry out 3DES encryption to A* and obtain E*, use D* to carry out 3DES encryption to C* and obtain F*.Utilize F* to E* carry out 3DES encryption obtain G*, front 16 bytes in status of getting G* as root key GKey, stored in the assigned address of root key card.
2. data authentication: the certificate scheme that the present invention adopts is divided into three kinds: internal authentication, external authentication, two-way authentication.Internal authentication we usually also referred to as authentication, the flow process of internal authentication is as follows: to same random number, and A, B are encrypted computing with corresponding key simultaneously, the ciphertext that obtains after comparison encryption.If ciphertext is consistent, then judge that certification is passed through.External authentication, also referred to as purview certification, only has and just can obtain further operating right by external authentication.Flow process A being done to external authentication is as follows: A gets a random number from B, and the A authenticate key of specifying obtains ciphertext to random number encryption, and the external authentication key that B is corresponding is decrypted ciphertext.If it is identical with the random number that A gets to decipher the plaintext obtained, then certification is passed through.Otherwise certification is not passed through.Namely two-way authentication also does external authentication while internal authentication.
3. protecting data encryption
In order to ensure the realization of the reliability of data, integrality and certification, system protecting data encryption, electric energy meter should first decrypting ciphertext, then verifies the validity that MAC verifies, and is verified and can carries out subsequent operation; There is anti-attack ability.Ciphertext form transmission ensure that the security reliability of data, and MAC adds the reliability that ensure that data integrity and certification.
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value.Only when C, M, K are all effective, the MAC calculated is just effective.Verification process needs following step:
Step 1: a kind of intelligent electric energy meter encryption handling device of the present invention calculates MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P.
MAC=C(Q,Key2)
P=E(Q+MAC,Key1)
Step 2: MAC value is attached to encrypt data P afterbody by device of the present invention, sends to user side.That is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2.
P
*=E
-1(Q+MAC,Key1)
MAC
*=C
-1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys device of the present invention with same cipher mode.
The present invention compared with the existing technology, has the following advantages and beneficial effect:
1. reduce the management cost of electric power system.Change backward, outmoded artificial electric energy tariff pattern, achieve the technological revolution of electricity clearing form, reduce the human input of expense of checking meter, urge, be that electric power system is cut payroll to improve efficiency, reduce management cost and create advantage;
2. fail safe and operating efficiency improve greatly, electricity clearing personnel can accomplish the home-confined data that just can read real-time electric energy meter, raise labour productivity greatly, decrease the danger that electricity clearing personnel step on bar operation, thus convenient, fast, safety simultaneously;
3. avoid electricity and settle accounts the drawback of checking meter, charging.Original craft is checked meter and is charged, and some managerial leaks, there is " connection-related electricity use, power-based electricity use, electricity use based on human relationships " phenomenon in the management of power use, the high damage of circuit, mistake of checking meter, client's arrearage not only make power supply enterprise sustain a loss, and also bring unnecessary trouble to Electricity customers.The enforcement of this system, adds electricity consumption transparency, reduces tariff recovery risk to greatest extent, has also made client use " relieved electricity, satisfied electricity ";
4. offer help for scientifically developing power load.By the load balancing analysis of intelligent electric energy meter, when developing new clothes load, just can accomplish and shooting the arrow at the target, avoiding the line loss because pell-mell development load, individual event overload cause;
5. the operational management means of rural power distribution have been enriched, the invention process is utilized to operate in rural area low-voltage distribution network, not only change " three is diligent " maintenance mode that the old circuit operation maintenance personnel that must rely on eye is diligent, diligent, tireless in running around, also to the three rate management carrying out fully digitalization, precision, rational allocation power resource, scientifically carries out operational management and has established solid foundation;
6. the present invention and greatly reduce the man power and material of debugging, the production cost reduced, largely decrease loaded down with trivial details and a large amount of basic security and marginal testing work minimizing, power department just can drop into the maintenance work such as circuit, equipment that more man power and material carries out other side.
Accompanying drawing explanation
Fig. 1 is structural representation of the present invention;
Fig. 2 is that encryption handling module root key of the present invention generates schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is clearly and completely described.
As shown in Figure 1, a kind of intelligent electric energy meter encryption handling device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module;
Described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected;
Described sale of electricity administration module is prior art module, at installation and operations such as each outlet of electric company, bank, self-aided terminals, completes sale of electricity work and the back-stage management work of prepayment meter and intelligent electric energy meter etc.Mainly realize pre-payment file administration, prepaid electricity selling management, intelligent electric energy meter management, optimum configurations, report query, charge, beat the multiple functions such as receipt.Described subscriber card, PSAM card are connected successively with intelligent electric energy meter, described sale of electricity administration module.
As shown in Figure 1, described encryption handling module installation province and district city two-stage encryption handling, be responsible for by one-level key management system the key master card generating and be kept at next stage use, next stage key management system mainly issues the various key master card and hair fastener master card that use in card issuance system at the corresponding levels.Multilevel mode is applicable to Wang Ji Utilities Electric Co. or provincial (comprising regional power grid) Utilities Electric Co.'s aspect, is convenient to unified management.Make further improvements with the major technique under existing single mode and be: under single mode, grasp respective key master card by office of prefectures and cities, structure is relatively simple, is applicable to use on a small scale, the situation that user is very little; Double pole mode can manage comparatively multi-user, has Redundancy Design, is applicable to the overlay management of Wang Ji Utilities Electric Co. or provincial Utilities Electric Co. aspect large regions.Encryption handling, to guaranteeing that the normal use of intelligent electric energy meter safety is most important, comprises the many aspects such as generation, storage, distribution, lower dress, protection, renewal of the initialization of module, key.Root key is generated each business root key in the electricity charge, metering, gatherer process by encryption handling module, under install in corresponding key master card; Under filled key master card and will be deployed in corresponding operation system and run, to ensure every business operation safety encipher.
Described hair fastener administration module structure is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Hair fastener administration module, primarily of subscriber card distribution, PSAM distribution, is responsible for the initialization of subscriber card and PSAM card, and for management and protection intelligent electric energy meter data message.
Described sale of electricity administration module, at installation and operations such as each outlet of electric company, bank, self-aided terminals, completes sale of electricity work and the back-stage management work of prepayment meter.For economizing on resources to greatest extent, rationally share the soft and hardware resource of marketing information system, local charge control electric energy meter and intelligent electric energy meter share a set of management system for selling power, pre-payment file administration, prepaid electricity selling management, intelligent electric energy meter management, optimum configurations, report query, charge can be realized, beat the multiple functions such as receipt.
For protecting Information Security and the validity of customer transaction, make data from the attack of disabled user.To illustrate for the encryption handling in security mechanism, safety certification and protecting data encryption respectively below:
1. encryption handling comprises the various aspects of the destruction from the generation of key to key, and encryption handling module root key as of the present invention in Fig. 2 generates shown in schematic diagram.In safety, reliably, flexibly under prerequisite, the generation master key at different levels of safety and all kinds of master key, and secret key safety is handed down to card sending system, be used for produce PSAM, subscriber card, optimum configurations card each key, guarantee fail safe and the consistency of key in above all links, realize the concentrated safety management to key.By four donors the highest respectively input 16 byte character strings, be expressed as A, B, C, D, then these four 16 byte character strings are converted into byte Type, be expressed as A*, B*, C*, D*, use B* to carry out 3DES encryption to A* and obtain E*, use D* to carry out 3DES encryption to C* and obtain F*.Utilize F* to E* carry out 3DES encryption obtain G*, front 16 bytes in status of getting G* as root key GKey, stored in the assigned address of root key card.
2. data authentication: the certificate scheme that the present invention adopts is divided into three kinds: internal authentication, external authentication, two-way authentication.Internal authentication we usually also referred to as authentication, the flow process of internal authentication is as follows: to same random number, and A, B are encrypted computing with corresponding key simultaneously, the ciphertext that obtains after comparison encryption.If ciphertext is consistent, then judge that certification is passed through.External authentication, also referred to as purview certification, only has and just can obtain further operating right by external authentication.Flow process A being done to external authentication is as follows: A gets a random number from B, and the A authenticate key of specifying obtains ciphertext to random number encryption, and the external authentication key that B is corresponding is decrypted ciphertext.If it is identical with the random number that A gets to decipher the plaintext obtained, then certification is passed through.Otherwise certification is not passed through.Namely two-way authentication also does external authentication while internal authentication.
3. protecting data encryption
In order to ensure the realization of the reliability of data, integrality and certification, system protecting data encryption, electric energy meter should first decrypting ciphertext, then verifies the validity that MAC verifies, and is verified and can carries out subsequent operation; There is anti-attack ability.Ciphertext form transmission ensure that the security reliability of data, and MAC adds the reliability that ensure that data integrity and certification.
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
C is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value.Only when C, M, K are all effective, the MAC calculated is just effective.Verification process needs following step:
Step 1: a kind of intelligent electric energy meter encryption handling device of the present invention calculates MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P.
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody by device of the present invention, sends to user side.That is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2) (4)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2.
P
*=E
-1(Q+MAC,Key1) (5)
MAC
*=C
-1(Q,Key2) (6)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys device of the present invention with same cipher mode.
Present invention employs advanced person is reliable, fail safe is high cryptographic algorithm and encryption handling, be conducive to strengthening marketing management and promoting level of customer service, provide valuable guidance and experience for reference for power supply enterprise and company's exploration marketing model change.
Claims (2)
1. an intelligent electric energy meter encryption handling device, is characterized in that, this device is sequentially connected to form by encryption handling module, hair fastener administration module, intelligent electric energy meter, sale of electricity administration module;
Wherein, described encryption handling module by authorization card one, two, three, four, provincial master key card, main transmission card, prefecture-level master key card, main transmission card, prefecture-levelly wash card master card, wash control fabrication and be connected to form successively;
Described hair fastener administration module is made up of subscriber card hair fastener master card, subscriber card, PSAM card hair fastener master card, PSAM card; Wherein, subscriber card hair fastener master card, subscriber card are connected; PSAM card hair fastener master card, PSAM card are connected.
2. use the protecting data encryption method of a kind of intelligent electric energy meter encryption handling device described in claim 1, it is characterized in that, comprise following step:
Step 1: calculate MAC to order data territory Q, re-uses 3DES algorithm, common key Key1 adopts MAC to be encrypted computing to clear data territory, obtain encrypt data territory P;
MAC is the open function of message content and key, and computing formula is
MAC=C(M,K) (1)
M is pass-along message content, and K is communicating pair common key, and C is the generating algorithm of MAC value, and only when C, M, K are all effective, the MAC calculated is just effective;
MAC=C(Q,Key2) (2)
P=E(Q+MAC,Key1) (3)
Step 2: MAC value is attached to encrypt data P afterbody, sends to user side, that is:
A→B:E(Q+MAC,Key1)‖C(Q,Key2)
Step 3: after user side receives order, first uses common key Key1 to decrypt ciphertext, then verifies the correctness of deciphering the MAC value obtained with Key2;
P
*=E
-1(Q+MAC,Key1)
MAC
*=C
-1(Q,Key2)
Step 4: after confirmation transfer of data is effective, user side, according to the order received, replys described device with same cipher mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410553103.0A CN104301319A (en) | 2014-10-17 | 2014-10-17 | Intelligent ammeter encryption management device and data encryption protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410553103.0A CN104301319A (en) | 2014-10-17 | 2014-10-17 | Intelligent ammeter encryption management device and data encryption protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104301319A true CN104301319A (en) | 2015-01-21 |
Family
ID=52320887
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410553103.0A Pending CN104301319A (en) | 2014-10-17 | 2014-10-17 | Intelligent ammeter encryption management device and data encryption protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104301319A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017166118A1 (en) * | 2016-03-30 | 2017-10-05 | 李昕光 | Key management method |
CN107483185A (en) * | 2017-07-25 | 2017-12-15 | 贵州眯果创意科技有限公司 | A kind of mobile terminal PSAM card paying systems based on safe key |
CN111582422A (en) * | 2020-04-10 | 2020-08-25 | 全景智联(武汉)科技有限公司 | CPU card anti-copy encryption method |
CN115276963A (en) * | 2022-06-13 | 2022-11-01 | 云南电网有限责任公司 | Power grid security management method, system and medium based on intelligent key |
CN115473729A (en) * | 2022-09-09 | 2022-12-13 | 中国联合网络通信集团有限公司 | Data transmission method, gateway, SDN controller and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5056140A (en) * | 1990-02-22 | 1991-10-08 | Blanton Kimbell | Communication security accessing system and process |
CN1567323A (en) * | 2003-06-19 | 2005-01-19 | 北京握奇数据系统有限公司 | Security measure management method of prepay IC card meter based on ESAM module |
CN101256645A (en) * | 2008-01-16 | 2008-09-03 | 苏州市城市信息化建设有限公司 | Integration burgher card system and setting method |
EP1973034A2 (en) * | 1998-09-11 | 2008-09-24 | Alexander Gelbman | Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture |
CN102111273A (en) * | 2010-12-30 | 2011-06-29 | 中国电力科学研究院 | Pre-sharing-based secure data transmission method for electric load management system |
CN102281136A (en) * | 2011-07-28 | 2011-12-14 | 中国电力科学研究院 | Quantum key distribution system for safety communication of electric vehicle intelligent charging network |
CN102903226A (en) * | 2012-10-18 | 2013-01-30 | 杭州海兴电力科技股份有限公司 | Data transmission method for communication of intelligent electric meters |
-
2014
- 2014-10-17 CN CN201410553103.0A patent/CN104301319A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5056140A (en) * | 1990-02-22 | 1991-10-08 | Blanton Kimbell | Communication security accessing system and process |
EP1973034A2 (en) * | 1998-09-11 | 2008-09-24 | Alexander Gelbman | Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture |
EP1973034A3 (en) * | 1998-09-11 | 2008-10-01 | Alexander Gelbman | Remotely-alterable electronic-ink based display device employing an electronic-ink layer integrated within a stacked architecture |
CN1567323A (en) * | 2003-06-19 | 2005-01-19 | 北京握奇数据系统有限公司 | Security measure management method of prepay IC card meter based on ESAM module |
CN101256645A (en) * | 2008-01-16 | 2008-09-03 | 苏州市城市信息化建设有限公司 | Integration burgher card system and setting method |
CN102111273A (en) * | 2010-12-30 | 2011-06-29 | 中国电力科学研究院 | Pre-sharing-based secure data transmission method for electric load management system |
CN102281136A (en) * | 2011-07-28 | 2011-12-14 | 中国电力科学研究院 | Quantum key distribution system for safety communication of electric vehicle intelligent charging network |
CN102903226A (en) * | 2012-10-18 | 2013-01-30 | 杭州海兴电力科技股份有限公司 | Data transmission method for communication of intelligent electric meters |
Non-Patent Citations (2)
Title |
---|
奥飚: "运用CPU卡的电力收费系统中密钥管理系统的安全性研究与设计", 《华北电力大学硕士学位论文》 * |
肖现华: "基于密钥管理和安全认证的网络预付费管理模式的研究", 《山东建筑大学硕士学位论文》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017166118A1 (en) * | 2016-03-30 | 2017-10-05 | 李昕光 | Key management method |
CN108886465A (en) * | 2016-03-30 | 2018-11-23 | 李昕光 | Key management method |
CN107483185A (en) * | 2017-07-25 | 2017-12-15 | 贵州眯果创意科技有限公司 | A kind of mobile terminal PSAM card paying systems based on safe key |
CN111582422A (en) * | 2020-04-10 | 2020-08-25 | 全景智联(武汉)科技有限公司 | CPU card anti-copy encryption method |
CN115276963A (en) * | 2022-06-13 | 2022-11-01 | 云南电网有限责任公司 | Power grid security management method, system and medium based on intelligent key |
CN115473729A (en) * | 2022-09-09 | 2022-12-13 | 中国联合网络通信集团有限公司 | Data transmission method, gateway, SDN controller and storage medium |
CN115473729B (en) * | 2022-09-09 | 2024-05-28 | 中国联合网络通信集团有限公司 | Data transmission method, gateway, SDN controller and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhuang et al. | Blockchain for cybersecurity in smart grid: A comprehensive survey | |
CN103729942B (en) | Transmission security key is transferred to the method and system of key server from terminal server | |
Petrlic | A privacy-preserving concept for smart grids | |
CN109302491A (en) | A kind of industry internet framework and its operation method based on block chain | |
CN104301319A (en) | Intelligent ammeter encryption management device and data encryption protection method | |
CN109274498A (en) | A kind of smart grid data aggregate and monitoring method based on alliance's chain | |
CN110120868B (en) | Smart power grid safety data aggregation method and system based on block chain technology | |
CN103036884B (en) | A kind of data guard method based on homomorphic cryptography and system | |
CN101593389A (en) | A kind of key management method and system that is used for the POS terminal | |
CN201387642Y (en) | Single-phase electronic type multi-rate prepayment electric energy meter | |
CN108173344A (en) | LORA wireless communication techniques are in the application process of low-voltage distribution transformer platform district | |
CN103001771A (en) | Data transmission security encryption method for metering automation system | |
CN110430050A (en) | A kind of smart grid collecting method based on secret protection | |
Yan et al. | Network security protection technology for a cloud energy storage network controller | |
Tian et al. | Blockchain-based AMI framework for data security and privacy protection | |
CN112733211A (en) | Intelligent power grid data storage scheme based on block chain | |
CN207283595U (en) | User power utilization data analysis integrated system based on power information collection | |
CN105119719B (en) | A kind of key management method of safe storage system | |
CN204206215U (en) | A kind of intelligent electric energy meter encryption handling device | |
CN110299993A (en) | A kind of telesecurity meter register method based on improvement IBOOE algorithm | |
CN207652034U (en) | A kind of aftercurrent action protecting equipment based on LORA wireless communication techniques | |
Ai et al. | A Blockchain-based Distributed Controllable Electricity Transaction Match System | |
CN102487502A (en) | Cluster communication safety method | |
CN107948144B (en) | Threat processing system based on intelligent power grid information security detection | |
Shovgenya et al. | On demand for situational awareness for preventing attacks on the smart grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150121 |