CN114374550A - Electric power measurement platform that possesses high security - Google Patents
Electric power measurement platform that possesses high security Download PDFInfo
- Publication number
- CN114374550A CN114374550A CN202111643556.9A CN202111643556A CN114374550A CN 114374550 A CN114374550 A CN 114374550A CN 202111643556 A CN202111643556 A CN 202111643556A CN 114374550 A CN114374550 A CN 114374550A
- Authority
- CN
- China
- Prior art keywords
- metering
- end server
- metering terminal
- terminal
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005259 measurement Methods 0.000 title description 2
- 238000012545 processing Methods 0.000 claims abstract description 4
- 230000004913 activation Effects 0.000 claims description 29
- 238000000034 method Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 6
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/60—Arrangements in telecontrol or telemetry systems for transmitting utility meters data, i.e. transmission of data from the reader of the utility meter
Abstract
The invention provides an electric power metering platform with high safety, which comprises a metering master station, a metering terminal, a front-end server and an application authentication system, wherein the metering terminal collects service data from a plurality of electric energy meters, encrypts the service data and uploads the encrypted data to the front-end server; the front-end server is used for receiving and caching the encrypted data from the metering terminal, calling the application authentication system through an API (application programming interface) interface to realize identity authentication of the metering terminal and decryption of the encrypted data, and uploading the decrypted service data to the metering master station; the application authentication system is used for realizing user authentication on the metering terminal, decrypting uploaded data of the metering terminal and encrypting returned data and control messages of the front-end server; and the metering master station is used for sending a control message to the front-end server and simultaneously performing storage processing on the decrypted service data.
Description
Technical Field
The invention relates to the technical field of electric power metering, in particular to an electric power metering platform with high safety.
Background
The metering system master station is connected with the metering terminal through a communication channel, and functions of collecting electric energy data, managing data, bidirectionally transmitting data, forwarding or executing control commands and the like are achieved. The current security protection system of the metering system does not establish a security protection system structure of a main station-terminal-meter which is matched with a service structure. Safety protection measures are lacked in a concentrator, a station acquisition terminal, a load management terminal and a distribution transformer monitoring terminal, data are transmitted in a plaintext mode, and risks such as illegal data stealing and cross-network intrusion of hackers are easily suffered.
Disclosure of Invention
The present invention is directed to a power metering platform with high safety to solve the problems of the background art.
The invention is realized by the following technical scheme: a high-safety power metering platform comprises a metering master station, a metering terminal, a front-end server and an application authentication system, wherein the metering terminal and the application authentication system both comprise the same key bank,
the metering terminal collects service data from a plurality of electric energy meters, encrypts the service data and uploads the encrypted data to the front-end server;
the front-end server is used for receiving and caching the encrypted data from the metering terminal, calling the application authentication system through an API (application programming interface) interface to realize identity authentication of the metering terminal and decryption of the encrypted data, and uploading the decrypted service data to the metering master station;
the application authentication system is used for realizing user authentication on the metering terminal, decrypting uploaded data of the metering terminal and encrypting returned data and control messages of the front-end server;
and the metering master station is used for sending a control message to the front-end server and simultaneously performing storage processing on the decrypted service data.
Optionally, before encrypting the service data, the metering terminal needs to perform a registration operation, and the specific process includes: the method comprises the steps that a user inputs factory codes to a metering terminal, the metering terminal sends first clear code messages to a front-end server based on the factory codes, and the front-end server feeds back identification codes to the metering terminal according to the first clear code messages.
Optionally, before encrypting the service data, the metering terminal needs to perform key activation and identity authentication, and the specific process includes:
the metering terminal sends a second clear message to the front-end server, the front-end server verifies the metering terminal based on the second clear message, if the verification is successful, a first activation message is transmitted back to the metering terminal, and the metering terminal activates a key bank according to the first activation message;
the metering terminal encrypts the identity authentication request data through the key bank, sends the encrypted identity authentication request data to the front-end server, the front-end server calls the application authentication system to decrypt and verify, and if the verification is successful, authentication success information is returned to the metering terminal.
Optionally, when the metering terminal sends the second clear message to the front-end server and the front-end server fails to verify based on the second clear message, the metering terminal repeatedly sends the second clear message N times, and if the front-end server fails to verify the second clear message N times, the front-end server performs packet loss operation on the second clear message received N +1 times.
Optionally, when the metering terminal sends the encrypted authentication request data to the front-end server and the verification of the front-end server based on the encrypted authentication request data fails, the metering terminal repeatedly sends the encrypted authentication request data M times, and if the verification of the encrypted authentication request data M times by the front-end server fails, the front-end server performs a packet loss operation on the encrypted authentication request data received M +1 th time.
Optionally, the key library includes a plurality of cryptographic algorithms, and the metering terminal activates the key library according to the first activation packet and selects a corresponding cryptographic algorithm.
Optionally, after the time t interval, the front-end server switches the cryptographic algorithm used in the application authentication system, and sends a second activation instruction to the metering terminal after the switching is successful, and the metering terminal selects a corresponding cryptographic algorithm from a key bank of the metering terminal according to the second activation instruction to perform encryption/decryption operation.
Optionally, during time T, the front-end server calls the application authentication system to decrypt the metering terminal service data encrypted by using the old country cryptographic algorithm, and after time T, only the metering terminal service data encrypted by using the new country cryptographic algorithm is decrypted.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a high-security electric power metering platform, a metering terminal of the platform firstly needs to send a corresponding plain code message to a front-end server for double activation operation of key activation authentication and identity authentication, after the double activation operation is successful, the service data collected by the metering terminal is encrypted through the key bank of the metering terminal, and transmits the data to the prepositive server for pre-storage, the prepositive server calls the application authentication system through an API (application programming interface) interface to decrypt the encrypted data and uploads the decrypted service data to the metering master station, when the metering master station sends a downlink control instruction to the metering terminal, the prepositive server is also required to call the application authentication system to encrypt the downlink control instruction, after the encrypted data is transmitted to the metering terminal, the metering terminal decrypts the encrypted data and executes corresponding operation according to the downlink control instruction.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only preferred embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a structural diagram of an electric power metering platform with high safety provided by the present invention.
In the figure, 1 metering master station, 2 metering terminals, 3 front-end server, 4 application authentication system.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, exemplary embodiments according to the present invention will be described in detail below with reference to the accompanying drawings. It is to be understood that the described embodiments are merely a subset of embodiments of the invention and not all embodiments of the invention, with the understanding that the invention is not limited to the example embodiments described herein. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the invention described herein without inventive step, shall fall within the scope of protection of the invention.
In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without one or more of these specific details. In other instances, well-known features have not been described in order to avoid obscuring the invention.
It is to be understood that the present invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes any and all combinations of the associated listed items.
In order to provide a thorough understanding of the present invention, a detailed structure will be set forth in the following description in order to explain the present invention. Alternative embodiments of the invention are described in detail below, however, the invention may be practiced in other embodiments that depart from these specific details.
Referring to fig. 1, a power metering platform with high security structurally includes a metering master station 1, a metering terminal 2, a front-end server 3, and an application authentication system 4, where the metering terminal 2 and the application authentication system 4 both include the same keystore, and in which,
the metering terminal 2 collects service data from a plurality of electric energy meters, encrypts the service data and uploads the encrypted data to the front-end server 3;
the front-end server 3 is used for receiving and caching the encrypted data from the metering terminal 2, calling the application authentication system 4 through an API (application programming interface) interface to realize identity authentication of the metering terminal 2 and decryption of the encrypted data, and uploading the decrypted service data to the metering master station 1;
the application authentication system 4 is used for implementing user authentication on the metering terminal 2, decrypting uploaded data of the metering terminal 2 and encrypting returned data and control messages of the front-end server 3;
and the metering master station 1 is used for sending a control message to the front-end server 3 and simultaneously performing storage processing on the decrypted service data.
When the invention is implemented, the metering terminal 2 firstly needs to send a corresponding plain code message to the front-end server 3 to carry out double activation operation of key activation authentication and identity authentication, after the double activation operation is successful, the service data collected by the metering terminal 2 is encrypted through the key bank of the metering terminal, and transmits the data to the front-end server 3 for pre-storage, the front-end server 3 calls the application authentication system 4 through an API (application programming interface) interface to decrypt the encrypted data, uploads the decrypted service data to the metering master station 1, when the metering master station 1 sends a downlink control instruction to the metering terminal 2, the prepositive server 3 is also required to call the application authentication system 4 to encrypt the downlink control instruction, after the encrypted data is transmitted to the metering terminal 2, the metering terminal 2 decrypts the encrypted data and executes corresponding operation according to the downlink control instruction.
Further, before encrypting the service data, the metering terminal 2 needs to perform a registration operation, and the specific process includes: the method comprises the steps that a user inputs factory code to a metering terminal 2, wherein the factory code is given to the user in advance by a factory when the metering terminal 2 is installed, the metering terminal 2 sends a first clear code message to a front-end server 3 based on the factory code, the first clear code message comprises a terminal address and the factory code, the front-end server 3 feeds back an identification code to the metering terminal 2 according to the first clear code message, and the identification code gives a unique English + number set of each accessed metering terminal 2 to the front-end server 3.
Further, before encrypting the service data, the metering terminal 2 needs to perform key activation and identity authentication, and the specific process includes:
the metering terminal 2 sends a second clear message to the front-end server 3, wherein the second clear message comprises the address, the identification code and the request message of the metering terminal 2, the front-end server 3 verifies the metering terminal 2 based on the second clear message, namely, the correct condition of the address and the identification code of the metering terminal 2 is verified, and whether the request message meets the specified format requirement is verified, if the address, the identification code and the request message of the metering terminal 2 are correct and meet the requirement, the front-end server 3 verifies the metering terminal 2 correctly, and transmits a first activation message back to the metering terminal 2, the metering terminal 2 activates the keystore according to the first activation message, the first activation message is composed of single English or number, and each single English or number refers to a unique cryptographic algorithm in the key bank.
In an embodiment of the present invention, when the metering terminal 2 sends a second clear message to the front-end server 3 and the front-end server 3 fails to verify based on the second clear message, the metering terminal 2 repeatedly sends the second clear message N times, and if the front-end server 3 fails to verify the second clear message N times, the front-end server 3 performs a packet loss operation on the second clear message received at the N +1 th time, that is, the front-end server 3 does not receive the second clear message data from the metering terminal 2 any more.
Further, when the metering terminal 2 sends the second clear message to the front end server 3, the front end server 3 selects a cryptographic algorithm in the key bank of the application authentication system 4, and generates a corresponding first activation message based on a selection result, for example, the cryptographic algorithm in the key bank includes an SM2 asymmetric encryption algorithm, an SM3 cryptographic hash algorithm, an SM4 group encryption algorithm, an SM7 group encryption algorithm, and an SM9 identification-based asymmetric cryptographic algorithm, when the front end server 3 selects an SM4 group encryption algorithm, the first activation message referring to the SM4 group encryption algorithm is generated, and the metering terminal 2 activates the key bank according to the first activation message and selects the SM4 group encryption algorithm to encrypt the service data.
In an embodiment of the present invention, after the key of the metering terminal 2 is successfully activated, the metering terminal 2 encrypts the identity authentication request data through a cryptographic algorithm selected in a key library, where the identity authentication request data includes a metering terminal 2 address, an identity authentication request message, and an identification code, and after the identity authentication request data is encrypted through a corresponding cryptographic algorithm, the encrypted identity authentication request data is obtained and sent to the front-end server 3, the front-end server 3 calls the application authentication system 4 to decrypt and verify, and if the verification is successful, authentication success information is returned to the metering terminal 2.
Further, when the metering terminal 2 sends the encrypted authentication request data to the front-end server 3 and the front-end server 3 fails to verify the encrypted authentication request data, the metering terminal 2 repeatedly sends the encrypted authentication request data M times, and if the front-end server 3 fails to verify the encrypted authentication request data M times, the front-end server 3 performs a packet loss operation on the encrypted authentication request data received M +1 th time, that is, the front-end server 3 does not receive the second plain text data from the metering terminal 2 any more.
In some embodiments of the present invention, after the time t interval, the front-end server 3 switches the cryptographic algorithm used in the application authentication system 4, for example, switches from the SM4 packet encryption algorithm to the SM7 packet encryption algorithm, and sends a second activation instruction to the metering terminal 2 after the switching is successful, where the second activation instruction includes an activation packet corresponding to the SM7 packet encryption algorithm, and the metering terminal 2 selects a corresponding cryptographic algorithm from the key store of the metering terminal 2 according to the second activation instruction for performing encryption/decryption operations.
Optionally, during the time T, the front-end server 3 calls the application authentication system 4 to decrypt the service data of the metering terminal 2 encrypted by the old country cryptographic algorithm, and after the time T, only the service data of the metering terminal 2 encrypted by the new country cryptographic algorithm is decrypted.
In some embodiments of the present invention, when the metering master station 1 sends the downlink control instruction to the metering terminal 2, the front-end server 3 is also required to call the application authentication system 4 to encrypt the downlink control instruction, and after the encrypted data is transmitted to the metering terminal 2, the metering terminal 2 decrypts the encrypted data and executes a corresponding operation according to the downlink control instruction.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (8)
1. A power metering platform with high safety is characterized by comprising a metering master station, a metering terminal, a front-end server and an application authentication system, wherein the metering terminal and the application authentication system both comprise the same key bank,
the metering terminal collects service data from a plurality of electric energy meters, encrypts the service data and uploads the encrypted data to the front-end server;
the front-end server is used for receiving and caching the encrypted data from the metering terminal, calling the application authentication system through an API (application programming interface) interface to realize identity authentication of the metering terminal and decryption of the encrypted data, and uploading the decrypted service data to the metering master station;
the application authentication system is used for realizing user authentication on the metering terminal, decrypting uploaded data of the metering terminal and encrypting returned data and control messages of the front-end server;
and the metering master station is used for sending a control message to the front-end server and simultaneously performing storage processing on the decrypted service data.
2. The power metering platform with high security according to claim 1, wherein the metering terminal needs to perform a registration operation before encrypting the service data, and the specific process includes: the method comprises the steps that a user inputs factory codes to a metering terminal, the metering terminal sends first clear code messages to a front-end server based on the factory codes, and the front-end server feeds back identification codes to the metering terminal according to the first clear code messages.
3. The power metering platform with high security according to claim 1, wherein the metering terminal needs to perform key activation and identity authentication before encrypting the service data, and the specific process includes:
the metering terminal sends a second clear message to the front-end server, the front-end server verifies the metering terminal based on the second clear message, if the verification is successful, a first activation message is transmitted back to the metering terminal, and the metering terminal activates a key bank according to the first activation message;
the metering terminal encrypts the identity authentication request data through the key bank, sends the encrypted identity authentication request data to the front-end server, the front-end server calls the application authentication system to decrypt and verify, and if the verification is successful, authentication success information is returned to the metering terminal.
4. The electric power metering platform with high security according to claim 3, wherein when the metering terminal sends the second clear message to the front-end server and the front-end server fails to verify based on the second clear message, the metering terminal repeatedly sends the second clear message N times, and if the front-end server fails to verify the second clear message N times, the front-end server performs a packet dropping operation on the second clear message received N +1 times.
5. The electric power metering platform with high security according to claim 4, wherein when the metering terminal sends the encrypted authentication request data to the front-end server and the front-end server fails to verify based on the encrypted authentication request data, the metering terminal repeatedly sends the encrypted authentication request data M times, and if the front-end server fails to verify the encrypted authentication request data M times, the front-end server performs a packet loss operation on the encrypted authentication request data received M +1 th time.
6. The electric power metering platform with high security according to claim 3, wherein the key bank comprises a plurality of cryptographic algorithms, and the metering terminal activates the key bank according to the first activation message and selects a corresponding cryptographic algorithm.
7. The power metering platform with high security according to claim 6, wherein after the time t interval, the front-end server switches a cryptographic algorithm used in the application authentication system, and after the switching is successful, the metering terminal sends a second activation instruction to the metering terminal, and the metering terminal selects a corresponding cryptographic algorithm from a key bank of the metering terminal according to the second activation instruction to perform encryption/decryption operation.
8. The power metering platform with high security according to claim 7, wherein the front end server calls the application authentication system to decrypt the metering terminal service data encrypted by the old country cryptographic algorithm during the time T, and only decrypts the metering terminal service data encrypted by the new country cryptographic algorithm after the time T.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111643556.9A CN114374550A (en) | 2021-12-29 | 2021-12-29 | Electric power measurement platform that possesses high security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111643556.9A CN114374550A (en) | 2021-12-29 | 2021-12-29 | Electric power measurement platform that possesses high security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114374550A true CN114374550A (en) | 2022-04-19 |
Family
ID=81141715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111643556.9A Pending CN114374550A (en) | 2021-12-29 | 2021-12-29 | Electric power measurement platform that possesses high security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114374550A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115134113A (en) * | 2022-05-13 | 2022-09-30 | 山东鲁软数字科技有限公司 | Platform data security authentication method, system, terminal and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005093A1 (en) * | 2003-07-01 | 2005-01-06 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
CN102750813A (en) * | 2012-06-12 | 2012-10-24 | 上海市电力公司 | Power use information acquisition system |
CN105721490A (en) * | 2015-07-01 | 2016-06-29 | 北京东润环能科技股份有限公司 | Intelligent collection terminal, master station system and data processing method |
US20170005995A1 (en) * | 2014-03-14 | 2017-01-05 | Rowem Inc. | Confidential data management method and device, and security authentication method and system |
CN107018134A (en) * | 2017-04-06 | 2017-08-04 | 北京中电普华信息技术有限公司 | A kind of distribution terminal secure accessing platform and its implementation |
WO2017177435A1 (en) * | 2016-04-15 | 2017-10-19 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
CN109450854A (en) * | 2018-10-11 | 2019-03-08 | 珠海许继芝电网自动化有限公司 | A kind of distribution terminal communication security protection method and system |
US20190278890A1 (en) * | 2014-06-17 | 2019-09-12 | Electro Industries/Gauge Tech | Security through layers in an intelligent electronic device |
CN112104604A (en) * | 2020-08-07 | 2020-12-18 | 国电南瑞科技股份有限公司 | System and method for realizing safety access service based on electric power internet of things management platform |
CN112671710A (en) * | 2020-11-26 | 2021-04-16 | 中国大唐集团科学技术研究院有限公司 | Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method |
-
2021
- 2021-12-29 CN CN202111643556.9A patent/CN114374550A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050005093A1 (en) * | 2003-07-01 | 2005-01-06 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
CN102750813A (en) * | 2012-06-12 | 2012-10-24 | 上海市电力公司 | Power use information acquisition system |
US20170005995A1 (en) * | 2014-03-14 | 2017-01-05 | Rowem Inc. | Confidential data management method and device, and security authentication method and system |
US20190278890A1 (en) * | 2014-06-17 | 2019-09-12 | Electro Industries/Gauge Tech | Security through layers in an intelligent electronic device |
CN105721490A (en) * | 2015-07-01 | 2016-06-29 | 北京东润环能科技股份有限公司 | Intelligent collection terminal, master station system and data processing method |
WO2017177435A1 (en) * | 2016-04-15 | 2017-10-19 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
CN107018134A (en) * | 2017-04-06 | 2017-08-04 | 北京中电普华信息技术有限公司 | A kind of distribution terminal secure accessing platform and its implementation |
CN109450854A (en) * | 2018-10-11 | 2019-03-08 | 珠海许继芝电网自动化有限公司 | A kind of distribution terminal communication security protection method and system |
CN112104604A (en) * | 2020-08-07 | 2020-12-18 | 国电南瑞科技股份有限公司 | System and method for realizing safety access service based on electric power internet of things management platform |
CN112671710A (en) * | 2020-11-26 | 2021-04-16 | 中国大唐集团科学技术研究院有限公司 | Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115134113A (en) * | 2022-05-13 | 2022-09-30 | 山东鲁软数字科技有限公司 | Platform data security authentication method, system, terminal and storage medium |
CN115134113B (en) * | 2022-05-13 | 2024-04-09 | 山东鲁软数字科技有限公司 | Platform data security authentication method, system, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105656941B (en) | Identification authentication system and method | |
CN106357396A (en) | Digital signature method, digital signature system and quantum key card | |
CN113114460B (en) | Quantum encryption-based power distribution network information secure transmission method | |
CN102333093A (en) | Data encryption transmission method and system | |
CN108650028B (en) | Multiple identity authentication system and method based on quantum communication network and true random number | |
CN107094138B (en) | A kind of smart home safe communication system and communication means | |
CN101820629A (en) | Identity authentication method, device and system in wireless local area network (WLAN) | |
CN105141635A (en) | Method and system for safe communication of group sending messages | |
CN108964895B (en) | User-to-User identity authentication system and method based on group key pool and improved Kerberos | |
CN107249002B (en) | Method, system and device for improving safety of intelligent electric energy meter | |
CN110049045B (en) | Safety certification system for power line carrier | |
CN111224958A (en) | Data transmission method and system | |
CN114374550A (en) | Electric power measurement platform that possesses high security | |
CN102045343A (en) | DC (Digital Certificate) based communication encrypting safety method, server and system | |
CN102413463B (en) | Wireless media access layer authentication and key agreement method for filling variable sequence length | |
CN107659405B (en) | The encrypting and decrypting method of data communication between a kind of substation boss station | |
CN106487761B (en) | Message transmission method and network equipment | |
CN111510294A (en) | Method for improving office system security by using secret key | |
CN108965266B (en) | User-to-User identity authentication system and method based on group key pool and Kerberos | |
CN101242453B (en) | A transmission method and system for dual-audio multi-frequency signal | |
CN108882182B (en) | Short message encryption and decryption device | |
CN113271586B (en) | Power equipment body area network safety communication method and system and storage medium | |
CN101640840B (en) | Broadcast or multicast-based safe communication method and broadcast or multicast-based safe communication device | |
CN112054905A (en) | Secure communication method and system of mobile terminal | |
CN112039663A (en) | Data transmission method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |