CN105391551A - Method for encryption and decryption of intelligent electric meter embedded engineering file - Google Patents
Method for encryption and decryption of intelligent electric meter embedded engineering file Download PDFInfo
- Publication number
- CN105391551A CN105391551A CN201510833048.5A CN201510833048A CN105391551A CN 105391551 A CN105391551 A CN 105391551A CN 201510833048 A CN201510833048 A CN 201510833048A CN 105391551 A CN105391551 A CN 105391551A
- Authority
- CN
- China
- Prior art keywords
- elliptic curve
- encryption
- intelligent electric
- electric meter
- subfile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The invention belongs to the technical field of electric and automation, particularly relates to a method for encryption of a software engineering file, and specifically relates to a method for encryption and decryption of an intelligent electric meter embedded engineering file. The method includes preprocessing the intelligent electric meter embedded engineering file, converting the embedded engineering file into numeric characters, and then performing encryption and decryption operation of the intelligent electric meter software engineering file on the basis of using an elliptic curve to encrypt preprocessing, thereby guaranteeing confidentiality of the intelligent electric meter embedded engineering file of a submission unit, improving intellectual property security of an intelligent electric meter submission company, and reducing intelligent electric meter embedded software transmission and storage risks brought by the Internet. The method provided by the invention reduces the data length of a secret key, thereby reducing time consumption and resource consumption of encryption, reducing the calculation amount of encryption, and improving the encryption speed of the intelligent electric meter software engineering file.
Description
Technical field
The invention belongs to electric and technical field of automation, refer more particularly to the encryption method of soft project file, be specifically related to the encryption and decryption method of the embedded project file of a kind of intelligent electric meter.
Background technology
The ultra-large development of power industry, brings many unprecedented challenges, and intelligent grid has become the common choice of countries in the world power industry reply Challenges for Future, is the developing direction of 21 century electric power system.Intelligent electric meter is one of basic equipment of intelligent grid data acquisition, carries the task of original electrical energy data acquiring, metering and transmission, is to realize the basis that information integerated, analysis optimization and information represents.
At present, due to the high speed development of intelligent grid, the demand of intelligent electric energy meter is increased rapidly.For ensureing accuracy and the accuracy of intelligent electric meter, according to the requirement of State Grid Corporation of China, must strictly detect the intelligent electric meter being about to come into operation according to intelligent electric energy meter technical requirement, and the approach of submitting to a higher level for approval or revision of the embedded project file of intelligent electric meter of each unit of company current is all be committed to the cloud platform of specifying, how ensureing the confidentiality of the embedded project file of intelligent electric meter and the intellectual property fail safe of each company, is a current difficult problem urgently to be resolved hurrily.Along with the development of wireless communication technique and network encryption technique, the encryption for the embedded project file of intelligent electric meter has become the development trend of industrial detection.
Summary of the invention
Object of the present invention is the problems referred to above solving prior art, the invention provides the encryption and decryption method of the embedded project file of a kind of intelligent electric meter, invention increases the efficiency of the embedded project file encryption of intelligent electric meter, add confidentiality and the fail safe of intelligent electric meter soft project file, to achieve these goals, the technical solution used in the present invention is as follows:
An encryption method for the embedded project file of intelligent electric meter, is characterized in that: described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file
i, i is subfile T
iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T
ibe the sequence of an ASCII value, T
i={ a
1, a
2, a
3..., a
j..., a
n, wherein a
jfor the ASCII value of character in subfile, n is file T
ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T
iin a series of ASCII value divide into groups in order, according to calculate block length L, T
ibecome after grouping:
T
i'={{a
1,a
2,a
3,...,a
L},{a
L+1,a
L+2,a
L+3,...,a
2L},...,{a
mL+1,a
2,a
3,...a
n}},
Wherein
Step 4: to the T obtained in step 3
i'={ t
1, t
2..., t
min each subsequence reconstruct in 65536 systems, wherein t
qfor T
i' in q subsequence, t
q={ a
(q-1) L+1, a
(q-1) L+2..., a
qL, 1≤q≤m+1, that is:
N
q=65536
L-1a
(q-1)L+1+65536
L-2a
(q-1)L+2+...+65536a
qL-1+a
qL(1);
If T
i' in element number in last subsequence be less than block length L, then mend 0 at sequence end, if sub-sequence length is L, substitutes in formula (1) and calculate, obtain T
ithe Serial No. R of reconstruct
i, R
i={ N
1, N
2..., N
m, if m is odd number, then at sequence R
iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate
wherein G is the generator point choosing elliptic curve, wherein G={60204628237568865675821348058752611191669876636884684 818,17405033229362203140485755228021941036402348892738665064 1}
Wherein
represent the multiplication on elliptic curve;
Step 5.3: calculate
wherein
represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
NB=28186466892849679686038856807396267537577176687436853 369; Pm is by sequence R
iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
pm={{N
1,N
2},{N
3,N
4},…}(3)
Calculate:
Step 5.4: calculate final encrypt file pT
i, pT
irepresent embedded project file T
ilast ciphertext, then meet:
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2.
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
Preferably, the calculating of the block length L in described encryption section step 3 comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1;
Preferably, the step of the elliptic curve encryption algorithm encryption in described step 5 is as follows: pass through Elliptic Curve y
2=x
32 P (x on+ax+bmodp
1, y
1), Q (x
2, y
2), suppose
if P, Q are different points, then calculate:
x
3={λ
2-x
1-x
2}modp(31);
y
3={λ(x
1-x
2)-y
1}modp(32);
Wherein
If P, Q are same point (x
1, y
1),
x
3={λ
2-2x
1}modp(34);
y
3={λ(x
1-x
3)-y
1}modp(35);
Wherein
Addition on elliptic curve meets associative law and law of communication:
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P, then the subtraction rule on elliptic curve meets:
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve.
Preferably, the elliptic curve side y of described step 3
2=x
3+ ax+bmodp journey meets:
Wherein x, y are the unknown number a of curvilinear equation, and b, p are the parameters of elliptic curve equation, and parameter value is taken as respectively: a=-3;
b=2455155546008943817740293915197451784769108058161191238065;
p=6277101735386680763835789423207666416083908700390324961279;
A decryption method for the embedded project file of intelligent electric meter, is characterized in that: the embedded project file of intelligent electric meter after encryption is decomposed into subfile one by one, obtains a series of encrypt file pT
i, wherein, 1≤i≤s; , utilize selected Elliptic Curve y simultaneously
2=x
3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT
i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption
2=x
3+ ax+bmodp, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R
i;
Step 54: by Serial No. R
iin each element N
q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile
i;
Step 55: by T
iin each ASCII value a
jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 according to step 51, obtains original document.
In sum, the present invention is owing to have employed above technical scheme, and the present invention has following remarkable result:
(1), patent of the present invention is encrypted the embedded project file of the intelligent electric meter after preliminary treatment on the basis of elliptic curve encryption algorithm, the operation of deciphering, thus ensure that the confidentiality of the embedded project file of censorship unit intelligent electric meter, improve the intellectual property fail safe of intelligent electric meter censorship company.
(2), embedded project file is converted into numerical chracter by patent of the present invention, recycling elliptic curve encryption algorithm is to digital file encryption, intelligent electric meter embedded software after encryption transmitted and is stored into cloud server, reduce the embedded project file transmission of the intelligent electric meter brought the Internet and store risk.
(3), the encryption method that proposes of the present invention has less key data length, thus reduces time loss and the resource consumption of encryption, improves the enciphering rate of the embedded project file of intelligent electric meter.
Accompanying drawing explanation
In order to be illustrated more clearly in example of the present invention or technical scheme of the prior art, introduce doing accompanying drawing required in embodiment or description of the prior art simply below, apparently, accompanying drawing in the following describes is only examples more of the present invention, to those skilled in the art, do not paying under creationary prerequisite, other accompanying drawing can also obtained according to these accompanying drawings.
Fig. 1 is the general flow chart of the encryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Fig. 2 is the encryption flow figure of the encryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Fig. 3 is the deciphering flow chart of the decryption method of the embedded project file of a kind of intelligent electric meter of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in example of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Below in conjunction with Fig. 1, set forth the embedded project file encryption method of a kind of intelligent electric meter based on elliptic curve of the present invention, described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file
i, i is subfile T
iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T
ibe the sequence of an ASCII value, T
i={ a
1, a
2, a
3..., a
j..., a
n, wherein a
jfor the ASCII value of character in subfile, n is file T
ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T
iin a series of ASCII value divide into groups in order, according to calculate block length L, the calculating of described block length L comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1;
T
ibecome after grouping:
T
i'={{a
1,a
2,a
3,...,a
L},{a
L+1,a
L+2,a
L+3,...,a
2L},...,{a
mL+1,a
2,a
3,...a
n}},
Wherein
Step 4: to the T obtained in step 3
i'={ t
1, t
2..., t
min each subsequence reconstruct in 65536 systems, wherein t
qfor T
i' in q subsequence, t
q={ a
(q-1) L+1, a
(q-1) L+2..., a
qL, 1≤q≤m+1, that is:
N
q=65536
L-1a
(q-1)L+1+65536
L-2a
(q-1)L+2+...+65536a
qL-1+a
qL(1);
If T
i' in element number in last subsequence be less than block length L, then mend 0 at sequence end, if sub-sequence length is L, substitutes in formula (1) and calculate, obtain T
ithe Serial No. R of reconstruct
i, R
i={ N
1, N
2..., N
m, if m is odd number, then at sequence R
iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, composition graphs 2, described ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate
wherein G is the generator point choosing elliptic curve, wherein G={60204628237568865675821348058752611191669876636884684 818,17405033229362203140485755228021941036402348892738665064 1}
Wherein
represent the multiplication on elliptic curve;
Step 5.3: calculate
wherein
represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
nB=28186466892849679686038856807396267537577176687436853369;
Pm is by sequence R
iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
Step 5.4: calculate final encrypt file pT
i, pT
irepresent embedded project file T
ilast ciphertext, then meet:
The step of described elliptic curve encryption algorithm is as follows: pass through Elliptic Curve y
2=x
32 P (x on+ax+bmodp
1, y
1), Q (x
2, y
2), suppose
if P, Q are different points, then calculate:
x
3={λ
2-x
1-x
2}modp(5);
y
3={λ(x
1-x
2)-y
1}modp(6);
Wherein
If P, Q are same point (x
1, y
1),
x
3={λ
2-2x
1}modp(8);
y
3={λ(x
1-x
3)-y
1}modp(9);
Wherein
Addition on elliptic curve meets associative law and law of communication:
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P, then the subtraction rule on elliptic curve meets:
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve, then meets:
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2;
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
As shown in Figure 3, in the decryption method of the embedded project file of a kind of intelligent electric meter of the present invention, be by encryption after the embedded project file of intelligent electric meter be decomposed into subfile one by one, obtain a series of encrypt file pT
i, wherein, 1≤i≤s; Utilize selected Elliptic Curve y simultaneously
2=x
3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT
i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption
2=x
3+ ax+bmodp algorithm, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R
i;
Step 54: by Serial No. R
iin each element N
q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile
i;
Step 55: by T
iin each ASCII value a
jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 method according to step 51, obtains original document.
The foregoing is only the preferred embodiment of invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (5)
1. an encryption method for the embedded project file of intelligent electric meter, is characterized in that: described encryption method comprises the following steps:
Step 1: embedded project file is decomposed into each subfile;
Step 2: by the text character in each subfile of embedded project file according to order, be converted to ASCII character value one by one, obtains the ASCII form T of each subfile of embedded project file
i, i is subfile T
iserial number, wherein, 1≤i≤s, s is the sub-file number of embedded project file, T
ibe the sequence of an ASCII value, T
i={ a
1, a
2, a
3..., a
j..., a
n, wherein a
jfor the ASCII value of character in subfile, n is file T
ithe sum of middle ASCII value;
Step 3: to subfile ASCII form T
iin a series of ASCII value divide into groups in order, according to calculate block length L, T
ibecome after grouping:
T′
i={{a
1,a
2,a
3,...,a
L},{a
L+1,a
L+2,a
L+3,...,a
2L},...,{a
mL+1,a
2,a
3,...a
n}},
Wherein
Step 4: to the T ' obtained in step 3
i={ t
1, t
2..., t
min each subsequence reconstruct in 65536 systems, wherein t
qfor T '
iin q subsequence, t
q={ a
(q-1) L+1, a
(q-1) L+2..., a
qL, 1≤q≤m+1, that is:
N
q=65536
L-1a
(q-1)L+1+65536
L-2a
(q-1)L+2+...+65536a
qL-1+a
qL(1);
If T '
iin element number in last subsequence be less than block length L, then mend 0 at sequence end,
If sub-sequence length is L, substitutes in formula (1) and calculate, obtain T
ithe Serial No. R of reconstruct
i, R
i={ N
1, N
2..., N
m, if m is odd number, then at sequence R
iend fills one 32, that is:
Step 5: utilize elliptic curve encryption algorithm to be encrypted to ASCII subfile, ciphering process is as follows:
Step 5.1: from random selecting integer k 1 to n-1;
Step 5.2: calculate
wherein G is the generator point choosing elliptic curve, wherein
G={60204628237568865675821348058752611191669876636884684818,174050332293622031404857552280219410364023488927386650641}
Wherein
represent the multiplication on elliptic curve;
Step 5.3: calculate
wherein
represent the addition on elliptic curve, pb represents the PKI of enabling decryption of encrypted file, wherein:
pb={2803000786541617331377384897435095499124748881890727495642,4269718021105944287201929298168253040958383009157463900739}
wherein nB is the private key of declassified document,
nB=28186466892849679686038856807396267537577176687436853369;
Pm is by sequence R
iin element-pairwise composition, as elliptic curve cryptography method input expressly, that is:
pm={{N
1,N
2},{N
3,N
4},…}(3);
Calculate:
Step 5.4: calculate final encrypt file pT
i, pT
irepresent embedded project file T
ilast ciphertext, then meet:
Step 6: by the form of the filename called after " censorship unit English name+intelligent electric meter model+software version number+inspector's code+filename " of embedded project file subfile, filename is encrypted as digital ciphertext to the cryptographic algorithm of step 5 by repetition step 2.
Step 7: the storage order of the embedded project file subfile after all encryptions according to original document is stored.
2. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the calculating of the block length L in described encryption section step 3 comprises the steps:
Step 21: p is expressed as 65536 system p ';
Step 22: the digits long L ' calculating p ';
Step 23: block length L=L '-1.
3. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the step of the elliptic curve encryption algorithm encryption in described step 5 is as follows: pass through Elliptic Curve y
2=x
32 P (x on+ax+bmodp
1, y
1), Q (x
2, y
2), suppose
if P, Q are different points, then calculate:
x
3={λ
2-x
1-x
2}modp(31);
y
3={λ(x
1-x
2)-y
1}modp(32);
Wherein
If P, Q are same point (x
1, y
1),
x
3={λ
2-2x
1}modp(34);
y
3={λ(x
1-x
3)-y
1}modp(35);
Wherein
Addition on elliptic curve meets associative law and law of communication:
Cross the parallel lines that some P make y-axis, hand over elliptic curve in the negative unit of another P ', P ' be P, be denoted as-P,
Subtraction rule then on elliptic curve meets:
Namely minuend adds the negative unit of subtrahend, then carries out the multiplication of Point on Elliptic Curve.
4. the encryption method of the embedded project file of a kind of intelligent electric meter according to claim 1, is characterized in that: the elliptic curve side y of described step 3
2=x
3+ ax+bmodp journey meets:
Wherein x, y are the unknown number a of curvilinear equation, and b, p are the parameters of elliptic curve equation, and parameter value is taken as respectively: a=-3;
b=2455155546008943817740293915197451784769108058161191238065;
p=6277101735386680763835789423207666416083908700390324961279。
5. a decryption method for the embedded project file of intelligent electric meter, is characterized in that: the embedded project file of intelligent electric meter after encryption is decomposed into subfile one by one, obtains a series of encrypt file pT
i, wherein, 1≤i≤s; , utilize selected Elliptic Curve y simultaneously
2=x
3+ ax+bmodp algorithm carries out private key and PKI, then generator point G and a series of encrypt file pT
i, its decrypting process comprises the steps:
Step 51: the Elliptic Curve y used according to encryption
2=x
3+ ax+bmodp, obtains private key nB and generator point G;
Step 52: from random selecting integer k 1 to n-1, calculates
Step 53: calculate pm:
Wherein "-" operation be in elliptic curve on subtraction, obtain expressly pm, namely obtain Serial No. R
i;
Step 54: by Serial No. R
iin each element N
q, be converted to corresponding ASCII value, obtain the ASCII value sequence T of embedded project file subfile
i;
Step 55: by T
iin each ASCII value a
jbe converted to corresponding character, obtain project file subfile.
Step 56: the filename of engineering subfile is deciphered to step 55 according to step 51, obtains original document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510833048.5A CN105391551A (en) | 2015-11-25 | 2015-11-25 | Method for encryption and decryption of intelligent electric meter embedded engineering file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510833048.5A CN105391551A (en) | 2015-11-25 | 2015-11-25 | Method for encryption and decryption of intelligent electric meter embedded engineering file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105391551A true CN105391551A (en) | 2016-03-09 |
Family
ID=55423406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510833048.5A Pending CN105391551A (en) | 2015-11-25 | 2015-11-25 | Method for encryption and decryption of intelligent electric meter embedded engineering file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105391551A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040545A (en) * | 2017-05-26 | 2017-08-11 | 中国人民解放军信息工程大学 | Project file Life cycle method for security protection |
CN110430050A (en) * | 2019-07-31 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of smart grid collecting method based on secret protection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101418103B1 (en) * | 2014-04-02 | 2014-07-11 | 에스피브이(주) | Efficient energy management and storage system applied with appropriate storage and supply method of electric power and use of diversified new regeneration energy |
CN104252147A (en) * | 2013-06-27 | 2014-12-31 | 英飞凌科技股份有限公司 | System and method for estimating periodic signal |
CN104376647A (en) * | 2014-11-04 | 2015-02-25 | 国家电网公司 | Real-time charging system used for electric power |
CN204758672U (en) * | 2015-06-04 | 2015-11-11 | 南京国电南自城乡电网自动化工程有限公司 | Digital electric energy meter with ESAM encryption function |
-
2015
- 2015-11-25 CN CN201510833048.5A patent/CN105391551A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104252147A (en) * | 2013-06-27 | 2014-12-31 | 英飞凌科技股份有限公司 | System and method for estimating periodic signal |
KR101418103B1 (en) * | 2014-04-02 | 2014-07-11 | 에스피브이(주) | Efficient energy management and storage system applied with appropriate storage and supply method of electric power and use of diversified new regeneration energy |
CN104376647A (en) * | 2014-11-04 | 2015-02-25 | 国家电网公司 | Real-time charging system used for electric power |
CN204758672U (en) * | 2015-06-04 | 2015-11-11 | 南京国电南自城乡电网自动化工程有限公司 | Digital electric energy meter with ESAM encryption function |
Non-Patent Citations (1)
Title |
---|
侯整风,李岚: "椭圆曲线密码系统(ECC)整体算法设计及优化研究", 《电子学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040545A (en) * | 2017-05-26 | 2017-08-11 | 中国人民解放军信息工程大学 | Project file Life cycle method for security protection |
CN107040545B (en) * | 2017-05-26 | 2019-05-31 | 中国人民解放军信息工程大学 | Project file Life cycle method for security protection |
CN110430050A (en) * | 2019-07-31 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of smart grid collecting method based on secret protection |
CN110430050B (en) * | 2019-07-31 | 2021-11-23 | 湖南匡安网络技术有限公司 | Smart power grid data acquisition method based on privacy protection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103475472B (en) | The full homomorphic cryptography method of NTRU types on ring LWE | |
CN103259662B (en) | A kind of new allograph based on Integer Decomposition problem and verification method | |
CN101764686A (en) | Encryption method for network and information security | |
CN102571357B (en) | Signature realization method and signature realization device | |
Li et al. | Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem | |
CN105488422A (en) | Homomorphically encrypted private data protection based editing distance calculation system | |
CN106452748A (en) | Multiple users-based outsourcing database audit method | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
CN101814985A (en) | Block cipher system using multi-chaotic mapping multi-dynamic S-box | |
CN112052466B (en) | Support vector machine user data prediction method based on multi-party secure computing protocol | |
CN104077356A (en) | Homomorphic encryption based cloud storage platform retrieval method | |
CN103220146A (en) | Zero knowledge digital signature method based on multivariate public key cryptosystem | |
CN106254073A (en) | A kind of operation method for ciphertext number and system | |
CN106209365A (en) | The method that Backup Data is heavily signed is utilized when user cancels under cloud environment | |
JunLi et al. | Email encryption system based on hybrid AES and ECC | |
CN105391551A (en) | Method for encryption and decryption of intelligent electric meter embedded engineering file | |
CN102769528A (en) | Quick large number decomposition method based on cryptographic technology application | |
CN101783728B (en) | Public key encryption method for ergodic matrix over hidden field | |
CN104618098B (en) | Cryptography building method and system that a kind of set member's relation judges | |
CN103716162B (en) | Identity-based safe generalized signcryption method under standard model | |
Yang et al. | Simulation Study Based on Somewhat Homomorphic Encryption | |
CN104601323B (en) | Solves the method for socialism millionaires' problem based on BDD | |
CN116743341A (en) | Measurement data secure sharing method based on homomorphic encryption | |
KR102070061B1 (en) | Batch verification method and apparatus thereof | |
CN103401681B (en) | Model taking method, impression-taking apparatus and chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20190423 |
|
AD01 | Patent right deemed abandoned |