CN109150503A - Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm - Google Patents

Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm Download PDF

Info

Publication number
CN109150503A
CN109150503A CN201811398731.0A CN201811398731A CN109150503A CN 109150503 A CN109150503 A CN 109150503A CN 201811398731 A CN201811398731 A CN 201811398731A CN 109150503 A CN109150503 A CN 109150503A
Authority
CN
China
Prior art keywords
interface
client
digital signature
server
calls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811398731.0A
Other languages
Chinese (zh)
Inventor
葛崇慧
许道强
吴波
管诗骈
谢林枫
王黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Jiangsu Fangtian Power Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201811398731.0A priority Critical patent/CN109150503A/en
Publication of CN109150503A publication Critical patent/CN109150503A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provide a kind of Electric Power Marketing System interface based on RSA Algorithm call in authentication method, interface calls client to be based on RSA Algorithm and generates digital signature, RSA digital signature provides the method for the acknowledged identity an of safety, that is the authenticity of digital signature is guaranteed, prevent it is third-party pretend to be and distort, affirmed the authenticity of digital signature.One is added safety lock to the interface of electric system, guarantees the safety of power system interface, refusal guarantees the interactive safety of electric power system data because illegal interface calls the generation for causing leaking data phenomenon.

Description

Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm
Technical field
The invention belongs to digital signature identification technical field more particularly to a kind of Electric Power Marketing Systems based on RSA Algorithm Authentication method in interface calling.
Background technique
Data interaction is realized by interactive interfacing between electric system, to ensure the efficient, reliable of each system Operation, and the generally existing safety issue of interface requests between electric system, system interface be all it is in the air, do not verify calling Legitimacy, nowadays electric system has spread to electric power enterprise production, in all links of operation and management, therefore electric system The safety of data is safe operation of power system and the guarantee to social reliable power supply.
Existing interface requests verifying solution has these types: 1, server-side generates authorization key, client to request segment End carries authorization key when sending request;2, server-side is taken when sending request to client access username and password, client Band username and password, server-side are called legitimacy verifies to username and password.
Current Electric Power Marketing System interface calls authentication missing, and interface requests verification mode is not safe enough, can not Recipient or other third parties is avoided to forge, to influence the authenticity of verifying, and sender is because to the unfavorable and no of oneself In the case where recognizing, the question at issue of interactive both sides can not be solved.
Summary of the invention
In order to solve the above technical problems, the present invention is provided during a kind of Electric Power Marketing System interface based on RSA Algorithm calls Authentication method.In order to which some aspects of the embodiment to disclosure have a basic understanding, simple summary is shown below. The summarized section is not extensive overview, nor to determine key/critical component or describe the protection model of these embodiments It encloses.Its sole purpose is that some concepts are presented with simple form, in this, as the preamble of following detailed description.
The present invention adopts the following technical scheme:
In some alternative embodiments, provide a kind of Electric Power Marketing System interface based on RSA Algorithm call in recognize Card method, comprising: interface server using itself private key to interface call client send encrypted digital signature into Row decryption, obtains digital signature;The interface server calls the public key of client to sign obtained number with the interface Name is decrypted, and obtains client ends relative;The interface server connects according to client ends relative verification Whether mouth calls the call request of client legal, then allows to call if legal, otherwise forbids calling.
In some alternative embodiments, before this method further include: the interface server and the interface call visitor Family end generates respective public key and private key;The interface calls client to generate digital signature and sends out encrypted digital signature It send to the interface server.
In some alternative embodiments, the interface calls client to generate digital signature and sign encrypted number The process that name is sent to the interface server includes: that the interface calls client to obtain the client ends relative of itself; The interface calls client to encrypt using the private key of itself to the client ends relative and the information that asks for an autograph, raw At digital signature;The interface calls client to add using the public key of the interface server to the digital signature of generation It is close;The interface calls client that encrypted digital signature is sent to the interface server.
In some alternative embodiments, the client ends relative includes: server ip, client coding, MAC Location and timestamp.
In some alternative embodiments, the interface server verifies the interface according to the client ends relative Calling the call request of client, whether legal process includes: in the interface server client ends relative Timestamp and server time difference whether less than 5 minutes;If being judged less than 5 minutes according to the client ends relative Whether calling interface service is had permission;Related data to the interface is returned if having permission and calls client, is otherwise returned and is adjusted Client is called with failure error code to the interface.
The utility model has the advantages that interface of the invention, which calls client to be based on RSA Algorithm, generates digital signature brought by of the invention, Authenticity is guaranteed, it is therefore prevented that and it is third-party to pretend to be and distort, affirm the authenticity of digital signature;Interface can be called Person's legitimacy verifies, and guarantees the safety of power system interface, and refusal is because illegal interface calling causes leaking data existing The generation of elephant guarantees the safety of electric power system data interaction, reinforces the safety for establishing system data, further promotes data peace Full protection ability.
For the above and related purposes, one or more embodiments include being particularly described below and in claim In the feature that particularly points out.Certain illustrative aspects are described in detail in the following description and the annexed drawings, and its instruction is only Some modes in the utilizable various modes of the principle of each embodiment.Other benefits and novel features will be under The detailed description in face is considered in conjunction with the accompanying and becomes obvious, the disclosed embodiments be all such aspects to be included and they Be equal.
Detailed description of the invention
Fig. 1 is that the process of the authentication method during a kind of Electric Power Marketing System interface based on RSA Algorithm of the present invention calls is shown It is intended to;
Fig. 2 is principle of the invention figure.
Specific embodiment
The following description and drawings fully show specific embodiments of the present invention, to enable those skilled in the art to Practice them.Other embodiments may include structure, logic, it is electrical, process and other change.Embodiment Only represent possible variation.Unless explicitly requested, otherwise individual components and functionality is optional, and the sequence operated can be with Variation.The part of some embodiments and feature can be included in or replace part and the feature of other embodiments.This hair The range of bright embodiment includes equivalent obtained by the entire scope of claims and all of claims Object.
As illustrated in fig. 1 and 2, in some illustrative embodiments, a kind of Electric Power Marketing System based on RSA Algorithm is provided Authentication method in interface calling.
RSA public-key encryptosystem has used RSA Algorithm to be digitally signed, in practice in view of RSA Algorithm The safety being proved to, RSA public-key encryptosystem are widely applied in many safety standards.RSA Algorithm, including Signature algorithm and verifying signature algorithm, RSA public-key encryptosystem is the original of the algorithms for encryption and decryption of the RSA Algorithm utilized A kind of digital signature carried out is managed, is realized indeed through a hash function.The present invention be by MD5 message pluck The institute's object to be encrypted for wanting algorithm to generate eap-message digest to realize.
Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm of the invention, comprising:
101: interface server and interface call client to generate respective public key and private key.
102: interface calling client obtains the client ends relative of itself.
Wherein, client ends relative includes: server ip, client coding, MAC Address and timestamp.
103: interface calls client to add using the private key of itself to client ends relative and the information that asks for an autograph It is close, generate digital signature.
104: interface calls client to encrypt using the public key of interface server to the digital signature of generation, and will add Digital signature after close is sent to interface server.
105: the encrypted digital signature that interface server receiving interface calls client to send, and using the private of itself Key is decrypted, and obtains digital signature.
106: interface server calls the public key of client that obtained digital signature is decrypted with interface, obtains visitor Family end relevant information.
After interface server obtains client ends relative, client is called according to client ends relative validation interface Whether call request is legal, then allows to call if legal, otherwise forbids calling, and the mode of legal verifying promotes the standard of interface calling True property, and verification mode is simple and fast, accelerates whole calling processing speed,
Wherein, interface server according to the client ends relative validation interface call client call request whether Legal process includes:
107: whether interface server compares the timestamp in institute's client ends relative with server time difference less than 5 points Clock;If carrying out step 108 less than 5 minutes, step 110 is otherwise carried out.
108: interface server judges whether there is permission calling interface service according to client ends relative, if having permission Step 109 is carried out, step 110 is otherwise carried out.
109: interface server returns to related data to interface and calls client.
110: interface server returns to malloc failure malloc error code to interface and calls client.
The characteristics of digital signature is that it represents the feature of message, and message in case of changing, also will by the value of digital signature It changes, different message will obtain different digital signature.The digital signature of safety makes the available guarantee of recipient: disappearing Breath is actually from sender.Because the private key of signature only has sender oneself preservation, other people can not do the same digital signature, such as Fruit third party pretends to be sender to issue a message, and recipient uses sender's when digital signature is decrypted Public-key cryptography encrypts the digital signature come and the number by calculating as long as third party does not know the private cipher key of sender It signs necessarily different, which provides the methods of the acknowledged identity of a safety, i.e., digital signature is true Property is guaranteed.
For digital signature similar to manual signature, it has property below: being able to verify that the identity of signature producer, and produces The date and time of raw signature;It can be used to confirm by label message content;Digital signature can be by third-party authentication, so as to solve The dispute of interaction both sides.
Therefore, interface of the invention calls client to be based on RSA Algorithm and generates digital signature, and authenticity is guaranteed, Prevent it is third-party pretend to be and distort, affirmed the authenticity of digital signature;Interface caller legitimacy can be verified, Guarantee the safety of power system interface, refusal guarantees electric power because illegal interface calls the generation for causing leaking data phenomenon The safety of system data interaction reinforces the safety for establishing system data, further promotes data safety protective capacities.
It should also be appreciated by one skilled in the art that various illustrative logical boxs, mould in conjunction with the embodiments herein description Electronic hardware, computer software or combinations thereof may be implemented into block, circuit and algorithm steps.In order to clearly demonstrate hardware and Interchangeability between software surrounds its function to various illustrative components, frame, module, circuit and step above and carries out It is generally described.Hardware is implemented as this function and is also implemented as software, depends on specific application and to entire The design constraint that system is applied.Those skilled in the art can be directed to each specific application, be realized in a manner of flexible Described function, still, this realization decision should not be construed as a departure from the scope of protection of this disclosure.

Claims (5)

1. the authentication method in the Electric Power Marketing System interface calling based on RSA Algorithm characterized by comprising
Interface server is decrypted using the encrypted digital signature that the private key of itself calls client to send interface, is obtained To digital signature;
The interface server calls the public key of client that obtained digital signature is decrypted with the interface, obtains visitor Family end relevant information;
The interface server according to the client ends relative verify the interface call client call request whether It is legal, then allow to call if legal, otherwise forbids calling.
2. the authentication method in the Electric Power Marketing System interface calling according to claim 1 based on RSA Algorithm, this method Before further include:
The interface server and the interface call client to generate respective public key and private key;
The interface calls client to generate digital signature and encrypted digital signature is sent to the interface server.
3. the authentication method in the Electric Power Marketing System interface calling according to claim 2 based on RSA Algorithm, feature It is, the interface calls client to generate digital signature and encrypted digital signature is sent to the interface server Process includes:
The interface calling client obtains the client ends relative of itself;
The interface calls client to add using the private key of itself to the client ends relative and the information that asks for an autograph It is close, generate digital signature;
The interface calls client to encrypt using the public key of the interface server to the digital signature of generation;
The interface calls client that encrypted digital signature is sent to the interface server.
4. the authentication method in the Electric Power Marketing System interface calling according to claim 3 based on RSA Algorithm, feature It is, the client ends relative includes: server ip, client coding, MAC Address and timestamp.
5. the authenticating party in the Electric Power Marketing System interface calling according to any one of claims 1 to 4 based on RSA Algorithm Method, which is characterized in that the interface server verifies the tune that the interface calls client according to the client ends relative With request, whether legal process includes:
Whether the timestamp and server time difference in the interface server client ends relative are less than 5 points Clock;
If judging whether there is permission calling interface service according to the client ends relative less than 5 minutes;
Related data to the interface is returned if having permission and calls client, is otherwise returned to malloc failure malloc error code and is connect to described Mouth calls client.
CN201811398731.0A 2018-11-22 2018-11-22 Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm Pending CN109150503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811398731.0A CN109150503A (en) 2018-11-22 2018-11-22 Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811398731.0A CN109150503A (en) 2018-11-22 2018-11-22 Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm

Publications (1)

Publication Number Publication Date
CN109150503A true CN109150503A (en) 2019-01-04

Family

ID=64806146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811398731.0A Pending CN109150503A (en) 2018-11-22 2018-11-22 Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm

Country Status (1)

Country Link
CN (1) CN109150503A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328415A (en) * 2020-11-27 2021-02-05 杭州安恒信息技术股份有限公司 Interface calling method and device, computer equipment and readable storage medium
CN113938328A (en) * 2021-12-18 2022-01-14 中建电子商务有限责任公司 Interface label checking method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618610A (en) * 2013-12-06 2014-03-05 上海千贯节能科技有限公司 Information safety algorithm based on energy information gateway in smart power grid
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
US20160277179A1 (en) * 2015-03-20 2016-09-22 Cryptography Research, Inc. Multiplicative blinding for cryptographic operations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618610A (en) * 2013-12-06 2014-03-05 上海千贯节能科技有限公司 Information safety algorithm based on energy information gateway in smart power grid
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
US20160277179A1 (en) * 2015-03-20 2016-09-22 Cryptography Research, Inc. Multiplicative blinding for cryptographic operations

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328415A (en) * 2020-11-27 2021-02-05 杭州安恒信息技术股份有限公司 Interface calling method and device, computer equipment and readable storage medium
CN113938328A (en) * 2021-12-18 2022-01-14 中建电子商务有限责任公司 Interface label checking method and system

Similar Documents

Publication Publication Date Title
CN108092776B (en) System based on identity authentication server and identity authentication token
US7974415B2 (en) System and method for updating keys used for public key cryptography
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
CN111224788B (en) Electronic contract management method, device and system based on block chain
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN102916971B (en) Electronic data curing system and method
CN110048849B (en) Multi-layer protection session key negotiation method
CN109728909A (en) Identity identifying method and system based on USBKey
CN106790064B (en) The method that both sides are communicated in credible root server-cloud computing server model
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN111526023A (en) Block chain uplink data security authentication method and system based on IPK
CN103078742A (en) Generation method and system of digital certificate
CN110086659A (en) A kind of security update System and method for of FPGA configuration file
CN111130798A (en) Request authentication method and related equipment
CN113886771A (en) Software authorization authentication method
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
CN110929231A (en) Digital asset authorization method and device and server
CN114553441B (en) Electronic contract signing method and system
CN109150503A (en) Authentication method in Electric Power Marketing System interface calling based on RSA Algorithm
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN117335989A (en) Safety application method in internet system based on national cryptographic algorithm
CN104065483B (en) Identity-based cryptograph (IBC) classified using method of electronic communication identities
KR20130100032A (en) Method for distributting smartphone application by using code-signing scheme
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN114372241A (en) Internet of things terminal identity authentication method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104

RJ01 Rejection of invention patent application after publication