CN106452751A - A mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check - Google Patents
A mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check Download PDFInfo
- Publication number
- CN106452751A CN106452751A CN201610930604.5A CN201610930604A CN106452751A CN 106452751 A CN106452751 A CN 106452751A CN 201610930604 A CN201610930604 A CN 201610930604A CN 106452751 A CN106452751 A CN 106452751A
- Authority
- CN
- China
- Prior art keywords
- electric power
- monitoring system
- power monitoring
- quantum
- definite value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0855—Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
Abstract
The invention discloses a mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check. In this method, engineer stations and electric power monitoring systems complete safe transmission of data through a plurality of quantum routers; quantum entanglement channels are established between the engineer stations and the electric power monitoring system; and then, based on the established quantum entanglement channels and channel self-checking function, safe transmission of relay protection fixed values is completed. According to the mining high-voltage power grid fixed value transmission method based on the quantum entanglement and channel self-check, through usage of quantum entanglement characteristics, eavesdropping by a third party is prevented under the premise of guaranteeing normal transmission of the data and safety of the electric power data is ensured. Simultaneously, the channel self-check function is introduced, and thus resource entanglement resource consumption is reduced.
Description
Technical field
The invention discloses the mining high-voltage electrical network definite value transmission method based on quantum entanglement and channel self checking, belong to coal
Ore deposit high voltage supply network relay protection constant value arranges field.
Background technology
2014, document " quantum key skill upgrading power system secondary protection safety research " analytic demonstration quantum
The feasibility that cipher key technique is combined with Power Secondary guard system;Then, propose a kind of quantum key dispatching system to indulge with electric power
To the concrete combination of encryption authentication device, and inquire into the realization setting up wide area electric power quantal data network in power system
Scheme and networking thinking, but it is not directed to how to realize relay protection constant value in internet using the security of quantum communications
Safe transmission.
In mining high-voltage electrical network, electric power monitoring system can directly be completed to the complex protection device of high-voltage switch gear by substation
The functions such as relay protection constant value setting.Although be capable of the setting of relay protection constant value by electric power monitoring system, electric
Power monitoring system does not usually have relay protection constant value computing function, and the calculating of mining high-voltage electric grid relay protection constant value can
To be calculated and administrative engineer station by relay protection constant value(Abbreviation engineer station)To complete.In order to realize relay protection
The automatic setting of definite value, is currently mostly to complete value data between engineer station and electric power monitoring system by network
Transmission.Engineer station and electric power monitoring system is likely located at a place it is also possible to a good distance off;When relay protection constant value data
During by network transmission, the value data transmitted there is the possibility being ravesdropping.It is fixed in order to relay protection is effectively ensured
Value Data not by other people eavesdroppings it is ensured that mining high-voltage electric network data safety.In document, " mine based on quantum teleportation is high
A kind of mining high-voltage electric-network relay protection based on quantum teleportation is proposed in voltage electric grid relay protection constant value method to set up "
Definite value method to set up, the method, by using the characteristic of quantum entanglement, is capable of the safe transmission of value data, but its definite value
Setting up procedure is complex, needs to consume and more tangles resource;Meanwhile, also it is not set out in the publication how passing through multichannel
Quantum entanglement channel is set up between engineer station and electric power monitoring system by device;In order to realize value data biography safely
On the basis of defeated, reduce further and tangle resource consumption, the present invention proposes mining based on quantum entanglement and channel self checking
High-voltage fence relay protection constant value transmission method, by using quantum entanglement characteristic, on the basis of ensureing data normal transmission,
Prevent third party's eavesdropping it is ensured that electric power data safety.Meanwhile, by introducing channel self checking function, reduce and tangle resource consumption.
Content of the invention
Engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers, and network topology is tied
Structure as shown in Figure 1, sets up comprising the following steps that of quantum entanglement channel between engineer station and electric power monitoring system:
Step 1:Engineer station and electric power monitoring system select paths to complete quantum according to routing rule from mulitpath
Information transfer it is assumed that the path selecting is R1, R2, R3, R4, R5, engineer station pass through classical channel send IP datagram literary composition to
Electric power monitoring system, request and electric power monitoring system set up quantum entanglement channel;
Step 2:Quantum router R1 producesTo entangled quantum pairWith, wherein, the entangled quantum of generation to point
Issue engineer station and R2, the entangled quantum of generation to state is;Quantum router R3 produces
To entangled quantum pairWith, wherein, the entangled quantum of generation is to being distributed to R2 and R4, the entangled quantum pair of generation
State is;Quantum router R5 producesTo entangled quantum pairWith, wherein, produce
Raw entangled quantum to being distributed to R4 and electric power monitoring system, the entangled quantum of generation to state is
;Wherein,;
Step 3:Quantum、、、、WithComposition system:
;
R2 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, system collapse for:
;
R4 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, particleWithRealization is tangled, in engineer
Stand and establish entangled quantum channel and between electric power monitoring system.
After engineer station completes relay protection calculating, need relay protection constant value is arranged automatically.First, engineering
Teacher station needs to set up a TCP connection and electric power monitoring system between, and wherein engineer station is as client, electric power monitoring system
As server;Then, it completes relay protection constant value based on the quantum entanglement channel having built up and channel self checking function
Safe transmission, comprise the following steps that:
Step 1:Engineer station carries out relay protection constant value setting for certain complex protection device it is assumed that the corresponding substation of this complex protection device
Number and complex protection device number represented with A and B respectively, calculate the quick-break definite value obtaining, timed over-currents definite value, overload definite value, regularly
Overcurrent delay value and overload delay value are all multiplied by 1000, quick-break definite value D after being amplified1, timed over-currents definite value D2, excessively negative
Lotus definite value D3, timed over-currents delay value D4With overload delay value D5, control word D6Represent, D6Two bytes of occupancy, only front 3
Position is meaningful, and first 3 are respectively intended to represent that quick-break input, timed over-currents put into and overload puts into;If numerical value is in first 3
1 then it represents that this corresponding protection puts into, if numerical value is 0 then it represents that this corresponding protection does not put into;To be calculated
D1- D612 byte value data be content to be verified, according to CRC algorithm generate 16 bits CRC fixed value checking sequence D7;
Fixed value checking sequence D7For 2 bytes;
Step 2:For D1- D7Amount to the data of 112 bits, the data that electric power monitoring system is directed to 112 bits prepares 112 respectively
Corresponding particleIf, theIndividual bit is 0, then the particle preparingState is;If theIndividual bit is 1, then
The particle preparingState is;The particle state preparing is usedRepresent,,;Then
;
Step 3:Engineer station is by prepare 112 particles()112 preserved with engineer station side are not
Once the particle measuring()Do the Bell state measurement respectively, measuring the four kinds of possible states obtaining is、、With, the different conditions that measure every time all can represent with 2 classical bit informations, stateUse classical bit
01 expression, stateRepresented with classical bit 11, stateRepresented with classical bit 00, stateWith classical bit 10
Represent, the classical information of 224 bits after being measured, can be obtained;
Step 4:The metrical information of obtain 224 bits is encapsulated as definite value content according to the definite value setting form shown in table 1
A TCP message is become to be sent to electric power monitoring system;Wherein, data length field is 28 bytes, and data length L low byte is
0x1C, data length L high byte is 0x00;
Step 5:Electric power monitoring system parses to receiving message, if the 3rd of the TCP message data division receiving the
Byte is equal to 0x01, then show that this message is relay protection constant value setting command;According to the definite value of table 1, message format, electricity are set
Power monitoring system parses the data message of 224 bits from the message receiving, and in order will in units of two bits
It is 112 right that 224 bits are divided into, and every centering comprises two bits;If receiveNumerical value to bit is 00, then electric power is supervised
Not measured the preserving in control systemIndividual particleExecute corresponding unitary transformation,;If received
?It is 01 to the numerical value of bit, then to not measured the preserving in electric power monitoring systemIndividual particleExecution is corresponding
Unitary transformation,;If receiveNumerical value to bit is 10, then to preservation in electric power monitoring system
Not measuredIndividual particleExecute corresponding unitary transformation,;If receiveTo bit
Numerical value is 11, then to not measured the preserving in electric power monitoring systemIndividual particleExecute corresponding unitary transformation,;And to each particle after conversion according to basic vectorWithMeasure, measurement result isRepresent phase
Bit is answered to be 0;Measurement result isRepresent that corresponding bits are 1;The definite value setting data of 14 bytes may finally be obtained, its
In latter two byte be fixed value checking sequence, represented with Q;
Step 6:The data of front 12 bytes to obtain calculates the fixed value checking of 16 as verification object based on CRC algorithm
Sequence H, H is compared with Q;If identical, the content shown in table 2 is packaged into a TCP message and sends out by electric power monitoring system
Give engineer station, represent that definite value sends successfully, execution step 7;If it is different, definite value transmission error, electric power monitoring system will
Content shown in table 3 is packaged into a TCP message and is sent to engineer station, represents that definite value sends error, repeated execution of steps 1;
Step 7:Engineer station sends definite value solidification message, by electric power monitoring system, the definite value solidification message receiving is passed through
There is electric power monitoring system function that the definite value of setting is come into operation.
Brief description
Fig. 1 is quantum communication network topology diagram.
Specific embodiment
Engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers, in engineer station
Comprising the following steps that of quantum entanglement channel is set up and electric power monitoring system between:
Step 1:Engineer station and electric power monitoring system select paths to complete quantum according to routing rule from mulitpath
Information transfer it is assumed that the path selecting is R1, R2, R3, R4, R5, engineer station pass through classical channel send IP datagram literary composition to
Electric power monitoring system, request and electric power monitoring system set up quantum entanglement channel;
Step 2:Quantum router R1 producesTo entangled quantum pairWith, wherein, the entangled quantum pair of generation
It is distributed to engineer station and R2, the entangled quantum of generation to state is;Quantum router R3 producesTo entangled quantum pairWith, wherein, the entangled quantum of generation is to being distributed to R2 and R4, the entangled quantum of generation
To state it is;Quantum router R5 producesTo entangled quantum pairWith, wherein,
Produce entangled quantum to being distributed to R4 and electric power monitoring system, the entangled quantum of generation to state be;Wherein,;
Step 3:Quantum、、、、WithComposition system:
;
R2 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, system collapse for:
;
R4 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, particleWithRealization is tangled, in engineer
Stand and establish entangled quantum channel and between electric power monitoring system.
After engineer station completes relay protection calculating, need relay protection constant value is arranged automatically.First, engineering
Teacher station needs to set up a TCP connection and electric power monitoring system between, and wherein engineer station is as client, electric power monitoring system
As server;Then, it completes relay protection constant value based on the quantum entanglement channel having built up and channel self checking function
Safe transmission, comprise the following steps that:
Step 1:Engineer station is with calculated D1- D612 byte value data be content to be verified, according to CRC algorithm
Generate the CRC fixed value checking sequence D of 16 bits7;Fixed value checking sequence D7For 2 bytes;
Step 2:For D1-D7Amount to the data of 112 bits, the data that electric power monitoring system is directed to 112 bits prepares 112 respectively
Corresponding particleIf, theIndividual bit is 0, then the particle preparingState is;If theIndividual bit is 1, then make
The standby particle obtainingState is;The particle state preparing is usedRepresent,,;Then
;
Step 3:Engineer station is by prepare 112 particles()112 preserved with engineer station side are not
Once the particle measuring()Do the Bell state measurement respectively, measuring the four kinds of possible states obtaining is、、With, the different conditions that measure every time all can represent with 2 classical bit informations, stateUse classical bit
01 expression, stateRepresented with classical bit 11, stateRepresented with classical bit 00, stateWith classical bit 10
Represent, the classical information of 224 bits after being measured, can be obtained;
Step 4:The metrical information of obtain 224 bits is encapsulated as definite value content according to the definite value setting form shown in table 1
A TCP message is become to be sent to electric power monitoring system;Wherein, data length field is 28 bytes, and data length L low byte is
0x1C, data length L high byte is 0x00;
Step 5:Electric power monitoring system parses to receiving message, if the 3rd of the TCP message data division receiving the
Byte is equal to 0x01, then show that this message is relay protection constant value setting command;According to the definite value of table 1, message format, electricity are set
Power monitoring system parses the data message of 224 bits from the message receiving, and in order will in units of two bits
It is 112 right that 224 bits are divided into, and every centering comprises two bits;According to the bit value receiving to preservation in electric power monitoring system
Not measuredIndividual particleExecute corresponding unitary transformation;And to each particle after conversion according to basic vectorWith
Measure, measurement result isRepresent that corresponding bits are 0;Measurement result isRepresent that corresponding bits are 1;May finally obtain
Definite value to 14 bytes arranges data, and wherein latter two byte is fixed value checking sequence, is represented with Q;
Step 6:The data of front 12 bytes to obtain calculates the fixed value checking of 16 as verification object based on CRC algorithm
Sequence H, H is compared with Q;If identical, the content shown in table 2 is packaged into a TCP message and sends out by electric power monitoring system
Give engineer station, represent that definite value sends successfully, execution step 7;If it is different, definite value transmission error, electric power monitoring system will
Content shown in table 3 is packaged into a TCP message and is sent to engineer station, represents that definite value sends error, repeated execution of steps 1;
Step 7:Engineer station sends definite value solidification message, by electric power monitoring system, the definite value solidification message receiving is passed through
There is electric power monitoring system function that the definite value of setting is come into operation.
Claims (1)
1. the mining high-voltage electrical network definite value transmission method based on quantum entanglement and channel self checking is it is characterised in that described
Definite value transmission method comprises the steps:
Step 11, engineer station and electric power monitoring system complete the safe transmission of data by multiple quantum routers, in engineering
Quantum entanglement channel is set up between teacher station and electric power monitoring system;
Step 12, after engineer station completes relay protection calculating, needs relay protection constant value is arranged automatically;First,
Engineer station needs to set up a TCP connection and electric power monitoring system between, and wherein engineer station is as client, power monitoring
System is as server;Then, it completes relay protection based on the quantum entanglement channel having built up and channel self checking function
The safe transmission of definite value;
In step 11, it is substantially carried out following steps:
Step 111:Engineer station and electric power monitoring system select a paths performance according to routing rule from mulitpath
It is assumed that the path selecting is R1, R2, R3, R4, R5, engineer station passes through classical channel and sends IP datagram literary composition for sub-information transmission
To electric power monitoring system, request and electric power monitoring system set up quantum entanglement channel;
Step 112:Quantum router R1 producesTo entangled quantum pairWith, wherein, the entangled quantum pair of generation
It is distributed to engineer station and R2, the entangled quantum of generation to state is;Quantum router R3 producesTo entangled quantum pairWith, wherein, the entangled quantum of generation is to being distributed to R2 and R4, the entangled quantum of generation
To state it is;Quantum router R5 producesTo entangled quantum pairWith, wherein,
Produce entangled quantum to being distributed to R4 and electric power monitoring system, the entangled quantum of generation to state be;Wherein,;
Step 113:Quantum、、、、WithComposition system:
;
R2 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, system collapse for:
;
R4 tangles particle to receiveWithCarry out Bell base measurement, then above formula is rewritten as
It is assumed that select is, then after measuringWithState is, particleWithRealization is tangled, in engineer
Stand and establish entangled quantum channel and between electric power monitoring system;
In step 12, it is substantially carried out following steps:
Step 121:Engineer station carries out relay protection constant value setting for certain complex protection device it is assumed that corresponding point of this complex protection device
Station number and complex protection device number are represented with A and B respectively, calculate the quick-break definite value obtaining, timed over-currents definite value, overload definite value, determine
When overcurrent delay value and overload delay value be all multiplied by 1000, quick-break definite value D after being amplified1, timed over-currents definite value D2, mistake
Load definite value D3, timed over-currents delay value D4With overload delay value D5, control word D6Represent, D6Take two bytes, only
First 3 meaningful, and first 3 are respectively intended to represent that quick-break input, timed over-currents put into and overload puts into;If number in first 3
It is worth for 1 then it represents that this corresponding protection puts into, if numerical value is 0 then it represents that this corresponding protection does not put into;To calculate
The D obtaining1- D612 byte value data be content to be verified, according to CRC algorithm generate 16 bits CRC fixed value checking sequence
Row D7;Fixed value checking sequence D7For 2 bytes;
Step 122:For D1- D7Amount to the data of 112 bits, the data that electric power monitoring system is directed to 112 bits prepares 112 respectively
Individual corresponding particleIf, theIndividual bit is 0, then the particle preparingState is;If theIndividual bit is 1, then
The particle preparingState is;The particle state preparing is usedRepresent,,;Then
;
Step 123:Engineer station is by prepare 112 particles()112 preserving with engineer station side
The particle not measured()Do the Bell state measurement respectively, measuring the four kinds of possible states obtaining is、
、With, the different conditions that measure every time all can represent with 2 classical bit informations, stateWith classical ratio
Special 01 expression, stateRepresented with classical bit 11, stateRepresented with classical bit 00, stateUse classical bit
10 expressions, can obtain the classical information of 224 bits after being measured;
Step 124:The metrical information of obtain 224 bits is arranged as definite value content according to the definite value based on channel self checking
Message format is packaged into a TCP message and is sent to electric power monitoring system;Wherein, data length field is 28 bytes, data
Length L low byte is 0x1C, and data length L high byte is 0x00;
Step 125:Electric power monitoring system parses to receiving message, if the 3rd of the TCP message data division receiving the
Individual byte is equal to 0x01, then show that this message is relay protection constant value setting command;Foundation is set based on the definite value of channel self checking
Put message format, electric power monitoring system parses the data message of 224 bits from the message receiving, with two bits as list
It is 112 right that 224 bits are divided into by position in order, and every centering comprises two bits;If receiveTo the numerical value of bit it is
00, then to not measured the preserving in electric power monitoring systemIndividual particleExecute corresponding unitary transformation,;If receiveIt is 01 to the numerical value of bit, then to not measured the preserving in electric power monitoring systemIndividual particleExecute corresponding unitary transformation,;If receiveNumerical value to bit is 10, then to electricity
Not measured the preserving in power monitoring systemIndividual particleExecute corresponding unitary transformation,;As
Fruit receive theIt is 11 to the numerical value of bit, then to not measured the preserving in electric power monitoring systemIndividual particleExecution
Corresponding unitary transformation,;And to each particle after conversion according to basic vectorWithMeasure, survey
Measuring result isRepresent that corresponding bits are 0;Measurement result isRepresent that corresponding bits are 1;14 bytes may finally be obtained
Definite value setting data, wherein latter two byte be fixed value checking sequence, represented with Q;
Step 126:The data of front 12 bytes to obtain calculates the definite value school of 16 as verification object based on CRC algorithm
Test sequence H, H is compared with Q;If identical, electric power monitoring system will send the successfully content shown in confirmation message form
It is packaged into a TCP message and is sent to engineer station, represent that definite value sends successfully, execution step 127;If it is different, definite value passes
Send mistake, electric power monitoring system will send out the content shown in wrong confirmation message form and is packaged into a TCP message and is sent to work
Cheng Shizhan, represents that definite value sends error, repeated execution of steps 121;
Step 127:Engineer station sends definite value solidification message, by electric power monitoring system, the definite value solidification message receiving is passed through
Existing electric power monitoring system function comes into operation to the definite value of setting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930604.5A CN106452751B (en) | 2016-10-31 | 2016-10-31 | Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930604.5A CN106452751B (en) | 2016-10-31 | 2016-10-31 | Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106452751A true CN106452751A (en) | 2017-02-22 |
CN106452751B CN106452751B (en) | 2019-03-26 |
Family
ID=58178250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610930604.5A Expired - Fee Related CN106452751B (en) | 2016-10-31 | 2016-10-31 | Mining high-voltage power grid definite value transmission method based on quantum entanglement and channel self checking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106452751B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270788A (en) * | 2018-01-23 | 2018-07-10 | 河南理工大学 | A kind of method based on quantum teleportation structure Virtual Private Network |
CN111817792A (en) * | 2019-04-10 | 2020-10-23 | 全球能源互联网研究院有限公司 | Quantum remote state transfer system adaptive to power protection service |
CN111817791A (en) * | 2019-04-10 | 2020-10-23 | 全球能源互联网研究院有限公司 | Quantum remote state transfer device for improving communication safety of power system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1477809A (en) * | 2003-07-11 | 2004-02-25 | 清华大学 | Quantum state classical sequence rearrangement encrypition method in quantum key distribution |
CN102833809A (en) * | 2012-08-03 | 2012-12-19 | 东南大学 | Information transmission method for wireless quantum communication network |
CN104502799A (en) * | 2014-12-16 | 2015-04-08 | 河南理工大学 | Automatic recognition method for short-circuit fault location of mine high voltage distribution network based on quantum communication |
CN104618031A (en) * | 2015-02-12 | 2015-05-13 | 四川师范大学 | Unknown arbitrary two-particle bidirectional controlled quantum teleportation method |
CN105633921A (en) * | 2016-01-19 | 2016-06-01 | 河南理工大学 | Quantum communication based relay protection constant value setting method of 35kV power supply system |
-
2016
- 2016-10-31 CN CN201610930604.5A patent/CN106452751B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1477809A (en) * | 2003-07-11 | 2004-02-25 | 清华大学 | Quantum state classical sequence rearrangement encrypition method in quantum key distribution |
CN102833809A (en) * | 2012-08-03 | 2012-12-19 | 东南大学 | Information transmission method for wireless quantum communication network |
CN104502799A (en) * | 2014-12-16 | 2015-04-08 | 河南理工大学 | Automatic recognition method for short-circuit fault location of mine high voltage distribution network based on quantum communication |
CN104618031A (en) * | 2015-02-12 | 2015-05-13 | 四川师范大学 | Unknown arbitrary two-particle bidirectional controlled quantum teleportation method |
CN105633921A (en) * | 2016-01-19 | 2016-06-01 | 河南理工大学 | Quantum communication based relay protection constant value setting method of 35kV power supply system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108270788A (en) * | 2018-01-23 | 2018-07-10 | 河南理工大学 | A kind of method based on quantum teleportation structure Virtual Private Network |
CN108270788B (en) * | 2018-01-23 | 2020-11-10 | 河南理工大学 | Method for constructing virtual private network based on quantum invisible state |
CN111817792A (en) * | 2019-04-10 | 2020-10-23 | 全球能源互联网研究院有限公司 | Quantum remote state transfer system adaptive to power protection service |
CN111817791A (en) * | 2019-04-10 | 2020-10-23 | 全球能源互联网研究院有限公司 | Quantum remote state transfer device for improving communication safety of power system |
Also Published As
Publication number | Publication date |
---|---|
CN106452751B (en) | 2019-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11662760B2 (en) | Wireless communication systems and methods for intelligent electronic devices | |
CN102983965B (en) | Transformer station's quantum communications model, quantum key distribution center and model implementation method | |
Tang et al. | Quantum-secure microgrid | |
Zhou et al. | Efficient application of GPRS and CDMA networks in SCADA system | |
CN106452751A (en) | A mining high-voltage power grid fixed value transmission method based on quantum entanglement and channel self-check | |
CN106685650A (en) | Electric power wide area industrial control network communication method based on quantum communication technology | |
CN105262587A (en) | Group key distribution method for machine-type communication based on proxy re-encryption | |
CN101841413B (en) | Creation method of end-to-end secure link and system | |
Mehra et al. | Data communication security of advanced metering infrastructure in smart grid | |
CN105633921B (en) | 35kV electric power system relay protection constant value methods to set up based on quantum communications | |
Karim et al. | An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks | |
Zhang et al. | A security mechanism for software-defined networking based communications in vehicle-to-grid | |
Jia et al. | Research and applications of key technologies of quantum secure communication in energy Internet | |
CN105162253A (en) | Wireless communication system for intellectualization of primary equipment | |
Shi et al. | Research on Communication Security Performance of Distribution Network | |
CN101841414B (en) | Creation method of end-to-end communication key and system | |
Wang et al. | Resource-Constrained Unmanned Aerial Vehicle Cluster Autonomous Wireless Communication Security Scheme | |
Cao et al. | Framework and applications of WAMS light communication system | |
Al-Suwaidan et al. | A communication framework for an ad-hoc microgrid for disaster response | |
CN108123798A (en) | Longitudinal difference protection cryptographic communication system and control method based on quantum key distribution | |
CN101964802B (en) | Centralized safety connection establishing system and method | |
Kostadinović et al. | Simulation model of DC servo motor control | |
Aouini et al. | Using IPsec to secure multicast smart energy traffic | |
Jafary | Cyber-security solutions for ensuring smart grid distribution automation functions | |
Kumar et al. | An efficient authentication model in smart grid networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190326 Termination date: 20201031 |