CN111680316B - Information security sharing method for multiple business bodies in power industry - Google Patents

Information security sharing method for multiple business bodies in power industry Download PDF

Info

Publication number
CN111680316B
CN111680316B CN202010807488.4A CN202010807488A CN111680316B CN 111680316 B CN111680316 B CN 111680316B CN 202010807488 A CN202010807488 A CN 202010807488A CN 111680316 B CN111680316 B CN 111680316B
Authority
CN
China
Prior art keywords
key
requirement
service
security
leaf node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010807488.4A
Other languages
Chinese (zh)
Other versions
CN111680316A (en
Inventor
胡若云
郭兰兰
陈仕军
沈然
王舒颦
叶盛
谷泓杰
孙钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Marketing Service Center of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Marketing Service Center of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Marketing Service Center of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN202010807488.4A priority Critical patent/CN111680316B/en
Publication of CN111680316A publication Critical patent/CN111680316A/en
Application granted granted Critical
Publication of CN111680316B publication Critical patent/CN111680316B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The information security sharing method for the multiple service bodies in the power industry provided by the embodiment of the application comprises the steps of classifying the multiple service bodies in the power industry according to different service categories, and acquiring security requirements which correspond to each type of service body and comprise service body codes; converting the obtained multiple safety requirements into an expression mode of the same description language; constructing a key generation tree, and controlling the key generation tree to generate leaf nodes containing keys based on the initial generation codes; the method includes the steps that keys in leaf nodes are distributed to different safety requirements, encryption and decryption operations are carried out on the converted safety requirements according to the keys, the randomness of the keys is improved by means of randomly generating the leaf nodes in a key generation tree, meanwhile, the keys are limited by the attribute of the validity period, the keys can be used for encryption and decryption only in the validity period, and the complexity of the keys is increased based on the two dimensions, so that the safety of information transmission is guaranteed.

Description

Information security sharing method for multiple business bodies in power industry
Technical Field
The application belongs to the field of information security, and particularly relates to an information security sharing method for multiple business bodies in the power industry.
Background
The power industry generally refers to power production and power management enterprises related to national power grids; including the power supply unit and the power management unit of each province. The safety of power data transmission is very important, and the information safety protection technology is used for the safety protection of a production control area and a management information area in the power industry; the production control area is communicated with the management information area; the production control area and the management information area are respectively in communication connection with corresponding service terminals; the service terminal of the production control area comprises a power distribution automation terminal, and the service terminal of the management information area comprises a centralized meter reading terminal and/or a conversion acquisition device.
At present, the number of main bodies in the power industry is large, and the information transmission quantity including business data, equipment operation data and enterprise report data among the main bodies is very large. Because the data types and transmission requirements in the main bodies are different, a uniform information encryption mode is not available to ensure the safety of the information transmission, and the safety of the information transmission among the business main bodies cannot be practically guaranteed.
Disclosure of Invention
In order to solve the defects and shortcomings in the prior art, the method for safely sharing the information of the multi-service main body in the power industry is provided.
Specifically, the information security sharing method for multiple service agents in the power industry provided by the embodiment of the present application includes:
classifying the multiple service bodies in the power industry according to different service categories, and acquiring the safety requirements containing service body codes corresponding to each type of service body;
converting the obtained multiple safety requirements into an expression mode of the same description language;
constructing a key generation tree, and controlling the key generation tree to generate leaf nodes containing keys based on the initial generation codes;
distributing the key in the leaf node to different security requirements, and encrypting and decrypting the converted security requirements according to the key;
wherein the keys in the leaf nodes and the leaf nodes share a validity period controlled by the initial generation code.
Optionally, the classifying the multiple service bodies in the power industry according to the service categories to obtain the security requirement including the service body code corresponding to each service body category includes:
obtaining the classification of business bodies of the current power industry, classifying the power selling companies in the current area according to a business body classification list, and giving business body codes to each class;
determining the business mode of each type of business main body, and generating business requirements corresponding to each type of business mode;
selecting a security requirement which emphasizes the security aspect and contains a service main body code from the service requirements;
the business subject classification comprises independent power distribution enterprises, large power generation enterprises, energy-saving service companies, distributed energy companies, power grid power selling companies and large industrial park power selling companies.
Optionally, the converting the obtained multiple security requirements into an expression mode of the same description language includes:
analyzing the obtained multiple safety requirements to obtain safety requirement contents including a safety requirement sender, a safety requirement receiver, a safety requirement name, safety requirement details and a safety requirement data index;
constructing a data structure for describing the security requirement aiming at the security requirement content;
and selecting a program language as a description language according to the character length in the constructed data structure, and compiling the safety requirement content based on the selected program language to obtain a compiled program package.
Optionally, the program language includes Python language.
Optionally, the constructing a key generation tree, and controlling the key generation tree to generate leaf nodes including keys based on the initial generated code includes:
step one, selecting a basic tree structure model as a key generation tree;
determining a generation level of the basic tree structure model based on the initial generation code, and obtaining a leaf node of a last level;
setting a random number generation algorithm, introducing an initial generation code into the random number generation algorithm to generate a random number value with a preset length, taking the obtained random number value as a key at a leaf node of a last level, and adding validity periods corresponding to different safety requirements into the key;
and repeating the operation from the second step to the third step at preset time intervals until the transmission of the safety requirement is finished.
Optionally, the method further includes:
and adjusting the hierarchy number of the leaf nodes according to the service subject code.
Optionally, the distributing the key in the leaf node to different security requirements, and performing encryption and decryption operations on the converted security requirements according to the key includes:
encrypting the converted security requirement based on a key in the leaf node on the security requirement sending side;
the converted security requirement is decrypted at the security requirement receiving side based on the key in the leaf node.
Optionally, the method further includes:
verifying the validity period in the key;
encrypting and decrypting the security requirement represented by the description language according to the secret key only when the secret key is in the valid period;
and distributing the key in the leaf node to different security requirements, and encrypting and decrypting the converted security requirements according to the key.
Optionally, the encrypting the converted security requirement based on the key in the leaf node on the security requirement sending side includes:
receiving a key in a leaf node, and extracting an effective period in the key;
judging whether the current time is in the valid period;
if the current safety requirement sending side is in the validity period, selecting the validity period according to the service category corresponding to the current safety requirement sending side, and encrypting the safety requirement corresponding to the description language based on the secret key;
and transmitting the encrypted ciphertext to a security requirement receiving side.
Optionally, the decrypting the converted security requirement based on the key in the leaf node on the security requirement receiving side includes:
sending a request for acquiring a secret key to a secret key generating tree, and extracting the validity period of the received secret key;
judging whether the time of receiving the ciphertext is in the valid period;
and if the key is in the validity period, decrypting the ciphertext based on the received key, otherwise, feeding back the information of key invalidation to the security requirement sending side.
The beneficial effect that technical scheme that this application provided brought is:
the randomness of the key is improved by means of randomly generating leaf nodes in the key generation tree, and the attribute limit of the life validity period is added to the key; the complexity of the key is increased based on the two dimensions so as to ensure the safety of information transmission.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information security sharing method for multiple service entities in the power industry according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of step 12 according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating step 13 according to an embodiment of the present application.
Fig. 4 is a flowchart of step 14 according to an embodiment of the present application.
Detailed Description
To make the structure and advantages of the present application clearer, the structure of the present application will be further described with reference to the accompanying drawings.
Example one
Specifically, the information security sharing method for multiple service entities in the power industry, as shown in fig. 1, includes:
11. classifying the multiple service bodies in the power industry according to different service categories, and acquiring the safety requirements of each type of service body, which correspond to the service body and contain the service body codes.
12. And converting the obtained multiple safety requirements into an expression mode of the same description language.
13. And constructing a key generation tree, and controlling the key generation tree to generate leaf nodes containing keys based on the initial generation codes.
14. And distributing the key in the leaf node to different security requirements, and encrypting and decrypting the converted security requirements according to the key.
Wherein the keys in the leaf nodes and the leaf nodes share a validity period controlled by the initial generation code.
In implementation, in order to provide security guarantee for an information sharing process among multiple services in the power industry, the embodiment provides an operation of encrypting and decrypting an information transmission process in the information sharing process, which is different from the prior art in that a key used for encrypting and decrypting the information transmission process is obtained by means of a key generation tree in a random generation mode, a validity period is set for the key, normal encrypting and decrypting operations can be performed only within the validity period of the key, and the complexity of the key is increased based on the two dimensions, so that the security of information transmission is ensured.
It should be noted that the initial generation code performs validity control on the key in such a way that a time acquisition field is provided in the initial generation code. When a leaf node is generated according to an initial generated code, a countdown module is added in the leaf node and a secret key according to a program language for executing a time acquisition field, when the secret key is called to encrypt and decrypt information, whether the time in the countdown module in the current system time returns to zero or not needs to be acquired, if the time in the countdown module in the current system time returns to zero, the validity period of the secret key is exceeded, the secret key is invalidated, otherwise, the secret key is valid, and information encryption and decryption operation can be carried out according to the secret key.
Before information encryption and decryption are carried out, various requirements of a multi-service main body in the applicable power industry need to be acquired, and then various safety requirements are converted into the same language to be encrypted and decrypted by using the generated secret key. Namely, the specific content of step 11 is executed, including:
111. the method comprises the steps of obtaining the classification of business bodies of the current power industry, classifying the power selling companies in the current area according to a business body classification list, and giving business body codes to each class.
112. And determining the business mode of each type of business main body, and generating the business requirement corresponding to each type of business mode.
113. And selecting the security requirement which focuses on the security aspect and contains the business subject code from the business requirements.
Wherein, the classification of the business body comprises: independent power distribution enterprises, large power generation enterprises, energy-saving service companies, distributed energy companies, power grid power selling companies and large industrial park power selling companies.
In implementation, since services related to each service principal are numerous, the security sharing method proposed in the embodiment of the present application only relates to security requirements in service requirements, such as critical data upload, machine control critical parameters, and the like, where there is an encryption requirement for data transmission. And after the three substeps in the step 11 are executed, adding a service body code to the obtained security requirement to indicate the industry category of the security requirement, so that the subsequent encryption and decryption stage adjusts the number of the hierarchies representing the leaf nodes according to the service body code.
Because the leaf nodes are obtained on the basis of the leaf nodes of the previous layer, the generation time and the generation content of each layer of leaf nodes are only controlled by the initial generation code. The increase of the hierarchical number of the leaf nodes means the increase of the randomness of the keys in the leaf nodes, and the corresponding keys are more complex, namely, the hierarchical number of the leaf nodes corresponds to the difficulty degree of key generation, so that the encryption and decryption levels corresponding to the service body are determined after the service body codes are obtained.
In addition, in the tree structure, all nodes except the root node have one and only one parent node, the root node has no parent node, all nodes except leaf child nodes have one or more child nodes, and the leaf nodes have no child nodes. Based on the above theory, the key is generated only in the leaf node in each level in the tree structure, and in order to meet the higher encryption and decryption requirements, child nodes capable of continuously generating the leaf node are still reserved in the current level.
The key generation tree proposed in this embodiment is a basic tree structure model, and the tree structure is not improved, but only the randomness of the keys located in the leaf nodes is improved by using the tree structure to generate the randomly generated leaf nodes at each layer. On the basis, a key positioned at a leaf node is generated based on a random value, and a field with a validity period is added in the key to control the information encryption and decryption process based on the key. The operation of generating the leaf nodes including determining the leaf node hierarchy is controlled by an initial generated code, wherein the initial generated code comprises codes corresponding to different power service bodies and encryption and decryption level feature codes, and if the requirement of high encryption and decryption level is met, the format length of the corresponding level feature codes is complex, such as the content including upper and lower case alphanumeric symbols; on the contrary, if the encryption level requirement is low, the format length of the corresponding level feature code is simpler, for example, only the single-format content of alphanumerics is used.
Example two
The foregoing first embodiment provides a basic framework of an information security sharing method for multiple service entities in the power industry, and the present embodiment describes the basic framework in more detail based on the obtained basic framework.
The foregoing step 12 proposes an execution content for converting the obtained multiple security requirements into an expression manner of the same description language, as shown in fig. 2, and specifically includes:
0121. and analyzing the obtained multiple safety requirements to obtain safety requirement contents comprising a safety requirement sender, a safety requirement receiver, a safety requirement name, safety requirement details and a safety requirement data index.
0122. A data structure describing security requirements is constructed for the security requirement content.
0123. And selecting a program language as a description language according to the character length in the constructed data structure, and compiling the safety requirement content based on the selected program language to obtain a compiled program package.
In implementation, before the conversion process of the same description language is performed on the safety requirements, the safety requirements obtained in the previous step need to be completely analyzed, and the safety requirement content including the safety requirement sender, the safety requirement receiver, the safety requirement name, the safety requirement details and the safety requirement data index is obtained.
Because the security requirement comes from different service main bodies, setting a separate key for each service main body greatly wastes computing resources, and therefore, the information security sharing method provided by the embodiment of the application adopts a mode of sharing the key by multiple service main bodies, so that on one hand, the consumption of the computing resources is saved, and on the other hand, the information sharing process is also convenient to monitor.
After the detailed security requirement content is obtained, a data structure for describing the security requirement needs to be constructed. The data structure is constructed based on the data structure with the largest usage amount in the safety requirement content, and aims to reduce the time and the calculation amount for converting the safety requirement content to the maximum extent. And selecting a proper description language based on the constructed data structure to compile the safety requirement described by the constructed data structure to obtain a program package.
The compiling performed herein is specifically processed using a compiler, typically a Python language compiler, and examples include:
the program language grammar is used for defining the program language specification and the coding rule, so that a user can digitize the business rule by means of a high-level programming language which is simple and easy to learn.
And the lexical module is used for extracting morphemes in the intelligent contract codes, wherein the morphemes comprise identifiers, and operators and keywords defined in the programming language grammar.
And the syntactic semantic module is used for verifying the correctness of the intelligent contract code according to the grammatical rule and generating an abstract syntax tree and structured metadata information according to the morpheme set generated by lexical analysis.
And the compiling module is used for generating an executable binary contract file with a checksum according to the abstract syntax tree and the metadata information generated by the syntax semantic module.
The aforementioned step 13 proposes to construct a key generation tree, and control the key generation tree to generate leaf nodes including keys based on the initial generation code, as shown in fig. 3, specifically including:
step one, selecting a basic tree structure model as a key generation tree.
And step two, determining the generation level of the basic tree structure model based on the initial generation code, and obtaining the leaf node of the last level.
Setting a random number generation algorithm, importing an initial generation code into the random number generation algorithm to generate a random number value with a preset length, taking the obtained random number value as a key at a leaf node of a last level, and adding validity periods corresponding to different safety requirements into the key.
And repeating the operation from the second step to the third step at preset time intervals until the transmission of the safety requirement is finished.
In implementation, the process of generating leaf nodes of the key generation tree is controlled using the initial generation code. Because the direction and the value of the leaf node generated at each structure level have randomness, and the key generation process at the leaf node at the last layer is also obtained by combining the random number generation algorithm based on the initial generation code, the key at the leaf node obtained based on the key generation tree has great randomness, and the process of encrypting the security requirement based on the key has higher security.
Because the leaf nodes are obtained on the basis of the leaf node of the previous hierarchy, the generation time and the generation content of each layer of leaf nodes are only controlled by the initial generation code, and the requirement for adjusting the encryption level cannot be embodied, the content capable of adjusting the number of the hierarchies of the leaf nodes according to the service subject code is further provided, so that the encryption and decryption levels, namely the number of the hierarchies of the leaf nodes, can be controlled according to the change of the content when the service subject shares information. If the encryption and decryption levels are improved, the number of the leaf node levels is correspondingly increased.
Meanwhile, each key has a validity period, so that in order to ensure the continuous updating characteristic of the key, the content of the second step and the third step needs to be repeated at intervals of a preset time length, wherein the preset time length is a time length larger than the longest key validity period.
Optionally, step 14 proposes to assign the key in the leaf node to different security requirements, and perform encryption and decryption operations on the converted security requirements according to the key, as shown in fig. 4, which specifically includes:
0141. the converted security requirement is encrypted based on a key in the leaf node on the security requirement sending side.
0142. The converted security requirement is decrypted at the security requirement receiving side based on the key in the leaf node.
In implementation, the security requirement transmission process involves two execution entities: and the security requirement sending side and the security requirement receiving side are respectively used for executing the operation of encrypting and decrypting the security requirement based on the key in the leaf node. Before specific encryption and decryption operations are carried out, the validity period of the key needs to be verified, the validity period of the corresponding key is independently controlled by combining an initial generated code with different security requirements, the different security requirements correspond to the key with different validity periods, and the encryption and decryption processing is carried out on the security requirements corresponding to the description language only when the key is in the validity period.
Specifically, step 0141, which represents an encryption process, includes:
and receiving the key in the leaf node, and extracting the validity period in the key.
And judging whether the current time is in the valid period.
And if the current safety requirement is within the validity period, selecting the validity period according to the service category corresponding to the current safety requirement sending side, and encrypting the safety requirement corresponding to the description language based on the secret key.
And transmitting the encrypted ciphertext to a security requirement receiving side.
In contrast, step 0142, representing the decryption process, includes:
and sending a request for acquiring the key to the key generation tree, and extracting the validity period of the received key.
And judging whether the time when the ciphertext is received is in the valid period.
And if the key is in the validity period, decrypting the ciphertext based on the received key, otherwise, feeding back the information of key invalidation to the security requirement sending side.
The sequence numbers in the above embodiments are merely for description, and do not represent the sequence of the assembly or the use of the components.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (1)

1. The information security sharing method of the multi-service main body in the power industry is characterized by comprising the following steps:
classifying the multiple service bodies in the power industry according to different service categories, and acquiring the safety requirements containing service body codes corresponding to each type of service body;
converting the obtained multiple safety requirements into an expression mode of the same description language;
constructing a key generation tree, and controlling the key generation tree to generate leaf nodes containing keys based on the initial generation codes;
distributing the key in the leaf node to different security requirements, and encrypting and decrypting the converted security requirements according to the key;
the key and the leaf node in the leaf node share the validity period controlled by the initial generation code;
wherein, the building of the key generation tree and the control of the key generation tree to generate leaf nodes containing keys based on the initial generated code comprises:
step one, selecting a basic tree structure model as a key generation tree;
determining the generation levels of the basic tree structure model based on the initial generation codes, and randomly selecting a generation direction in each level to obtain leaf nodes of the last level;
setting a random number generation algorithm, introducing an initial generation code into the random number generation algorithm to generate a random number value with a preset length, taking the obtained random number value as a key at a leaf node of a last level, and adding validity periods corresponding to different safety requirements into the key;
repeating the operation from the second step to the third step at intervals of preset duration until the transmission of the safety requirement is finished;
the preset time length is a time length longer than the longest key validity period;
the classifying the multiple service bodies in the power industry according to different service categories to obtain the safety requirement containing the service body code corresponding to each type of service body comprises the following steps:
obtaining the classification of business bodies of the current power industry, classifying the power selling companies in the current area according to a business body classification list, and giving business body codes to each class;
determining the business mode of each type of business main body, and generating business requirements corresponding to each type of business mode;
selecting a security requirement which emphasizes the security aspect and contains a service main body code from the service requirements;
the business main body classification comprises independent power distribution enterprises, large power generation enterprises, energy-saving service companies, distributed energy companies, power grid power selling companies and large industrial park power selling companies;
wherein, the converting the obtained multiple safety requirements into the expression mode of the same description language comprises:
analyzing the obtained multiple safety requirements to obtain safety requirement contents including a safety requirement sender, a safety requirement receiver, a safety requirement name, safety requirement details and a safety requirement data index;
constructing a data structure for describing the security requirement aiming at the security requirement content;
selecting a program language as a description language according to the character length in the constructed data structure, and compiling the safety requirement content based on the selected program language to obtain a compiled program package; the program language comprises a Python language;
wherein, distribute the key in the leaf node to different security demands, carry out the encryption and decryption operation to the security demand after the conversion according to the key, include:
encrypting the converted security requirement based on a key in the leaf node on the security requirement sending side;
decrypting the converted security requirement based on a key in the leaf node on the security requirement receiving side;
the method further comprises the following steps:
verifying the validity period in the key;
encrypting and decrypting the security requirement compiled by the description language according to the secret key only when the secret key is in the validity period;
wherein, the encrypting the converted security requirement based on the key in the leaf node on the security requirement sending side comprises:
receiving a key in a leaf node, and extracting an effective period in the key;
judging whether the current time is in the valid period;
if the current safety requirement is in the validity period, selecting the validity period according to the service category corresponding to the current safety requirement sending side, and encrypting the safety requirement compiled by the description language based on the secret key;
transmitting the encrypted ciphertext to a security requirement receiving side;
wherein decrypting the converted security requirement based on a key in the leaf node on the security requirement receiving side comprises:
sending a request for acquiring a secret key to a secret key generating tree, and extracting the validity period of the received secret key;
judging whether the time of receiving the ciphertext is in the valid period;
if the key is in the validity period, the cipher text is decrypted based on the received key, otherwise, the information that the key is invalid is fed back to the security requirement sending side;
the method comprises the following steps that a time acquisition field is arranged in an initial generation code, a countdown module is added in a leaf node and a secret key according to a program language for executing the time acquisition field when the leaf node is generated according to the initial generation code, when the secret key is called for information encryption and decryption, whether the time in the countdown module under the current system time returns to zero or not needs to be acquired, if the time returns to zero, the validity period of the secret key is exceeded, the secret key is invalidated, otherwise, the secret key is valid, and information encryption and decryption operation is carried out according to the secret key;
generating a key positioned at a leaf node based on a random number generation algorithm, and simultaneously controlling an information encryption and decryption process based on the key by adding a field with a validity period in the key, wherein the operation of generating the leaf node including determining the leaf node hierarchy is controlled by an initial generated code, the initial generated code adopted comprises service body codes corresponding to different power service bodies and encryption and decryption level feature codes, and if the requirement of high encryption and decryption level is met, the format length of the corresponding level feature codes is complex; on the contrary, if the requirement of low encryption level is met, the format length of the corresponding level feature code is simple.
CN202010807488.4A 2020-08-12 2020-08-12 Information security sharing method for multiple business bodies in power industry Active CN111680316B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010807488.4A CN111680316B (en) 2020-08-12 2020-08-12 Information security sharing method for multiple business bodies in power industry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010807488.4A CN111680316B (en) 2020-08-12 2020-08-12 Information security sharing method for multiple business bodies in power industry

Publications (2)

Publication Number Publication Date
CN111680316A CN111680316A (en) 2020-09-18
CN111680316B true CN111680316B (en) 2020-11-20

Family

ID=72458274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010807488.4A Active CN111680316B (en) 2020-08-12 2020-08-12 Information security sharing method for multiple business bodies in power industry

Country Status (1)

Country Link
CN (1) CN111680316B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272086B (en) * 2020-10-23 2024-06-11 中科美络科技股份有限公司 Data encryption transmission method, system and intelligent terminal
CN113569262B (en) * 2021-07-30 2022-05-10 立信(重庆)数据科技股份有限公司 Ciphertext storage method and system based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256615B (en) * 2007-02-27 2011-07-27 中国科学院研究生院 Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
CN101908176A (en) * 2010-08-02 2010-12-08 国电南瑞科技股份有限公司 Method for modeling on basis of power information data and applying metadata management
CN102111273B (en) * 2010-12-30 2014-03-19 中国电力科学研究院 Pre-sharing-based secure data transmission method for electric load management system
CN104780175B (en) * 2015-04-24 2018-03-13 广东电网有限责任公司信息中心 The authorization management method that the classification of based role accesses
CN105100116A (en) * 2015-08-31 2015-11-25 云南电网有限责任公司电力科学研究院 Efficient and safe power data interaction method in wireless communication mode

Also Published As

Publication number Publication date
CN111680316A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
Cervesato et al. A meta-notation for protocol analysis
CN111680316B (en) Information security sharing method for multiple business bodies in power industry
CN102831352B (en) Equipment authorization use method and equipment for method
Chen et al. Design and implementation of bilingual digital reader based on artificial intelligence and big data technology
CN112394974A (en) Code change comment generation method and device, electronic equipment and storage medium
Cortier et al. A composable computational soundness notion
CN108804091A (en) A kind of software code generation method
CN111144133B (en) System and method for modifying and tracing translation manuscript keyword based on block chain
CN102325143B (en) Cloud platform based information collection, storage, encryption and retrieval system
Matsui et al. Leximin asymmetric multiple objective distributed constraint optimization problem
Fedrecheski et al. SmartABAC: enabling constrained IoT devices to make complex policy-based access control decisions
Ye et al. Evolutionary game analysis on competition strategy choice of application providers
CN112307449B (en) Authority hierarchical management method, device, electronic equipment and readable storage medium
WO2022148087A1 (en) Method and apparatus for training programming language translation model, device, and storage medium
Veichtlbauer et al. Advanced metering and data access infrastructures in smart grid environments
CN104809664A (en) Information integration method for power distribution master station
Robertson Advanced synchrophasor protocol (asp) development and demonstration project
CN114254373B (en) Encryption transmission method, device and system
Liu et al. A fusion data security protection scheme for sensitive E-documents in the open network environment
Dogiwal et al. Internet of things based real-time monitoring system for grid data
CN116521146B (en) Secondary development system of cloud GIS platform
CN113987529B (en) User and authority control method combining multiple roles
CN113282810B (en) Block chain hash-based encrypted electric power transaction data post-verification method and device
CN111224930B (en) Data security transmission method, system, computer equipment and readable storage medium
Sanchez et al. using microsoft office infopath to generate XACML policies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant