CN115051840A - Safety monitoring system for data transmission - Google Patents

Safety monitoring system for data transmission Download PDF

Info

Publication number
CN115051840A
CN115051840A CN202210610790.XA CN202210610790A CN115051840A CN 115051840 A CN115051840 A CN 115051840A CN 202210610790 A CN202210610790 A CN 202210610790A CN 115051840 A CN115051840 A CN 115051840A
Authority
CN
China
Prior art keywords
data
module
processing module
data packet
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210610790.XA
Other languages
Chinese (zh)
Other versions
CN115051840B (en
Inventor
孙佳丽
胡聪
王鹏
张翠翠
孙琦
卢锐轩
刘翠玲
洪德华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd filed Critical Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority to CN202210610790.XA priority Critical patent/CN115051840B/en
Publication of CN115051840A publication Critical patent/CN115051840A/en
Application granted granted Critical
Publication of CN115051840B publication Critical patent/CN115051840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a safety monitoring system for data transmission, in particular to the technical field of data transmission, which comprises a monitoring acquisition terminal, an acquisition terminal processing module, a transmission module and a main database which are sequentially connected through a wireless network, wherein: the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal; the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end; the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database; and the main database downloads and performs back-end processing on the uploaded data. The invention encrypts the transmitted data packet for multiple times, the encrypted key is associated with the content involved in the whole data transmission process, the whole association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the safety of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.

Description

一种数据传输用安全监控系统A security monitoring system for data transmission

技术领域technical field

本发明涉及数据传输技术领域,更具体地说,本发明涉及一种数据传输用安全监控系统。The present invention relates to the technical field of data transmission, and more particularly, to a security monitoring system for data transmission.

背景技术Background technique

三大电信运营商的公网通信资源卡台帐、工作流程、流程监控等系统已初具规模,无线网通信终端配置、告警、性能信息基本实现了数据监控,但是针对当前电网无线终端采集数据获取及传输的完整性、准确性、实时性以及安全性存在不足。尤其是数据安全传输方面,无线采集平台至通信终端,至无线通信综合网管系统都没有有效的通信终端接入安全认证机制,存在非法获取相关电力无线公网业务数据等非法入侵隐患。The public network communication resource card account, workflow, process monitoring and other systems of the three major telecom operators have begun to take shape, and the wireless network communication terminal configuration, alarm, and performance information have basically realized data monitoring, but the current power grid wireless terminals collect data. Inadequate integrity, accuracy, timeliness and security of acquisition and transmission. Especially in terms of data security transmission, there is no effective communication terminal access security authentication mechanism from the wireless acquisition platform to the communication terminal and the wireless communication integrated network management system.

现有采集数据传输存在以下安全问题:现阶段数据传输采用运营商提供的网络,对于终端设备信息传输虽然有数字认证等认证机制,但是需要把预先设置不能重复的密钥安全TF卡安装到各设备中,终端被窃取遗失后容易造成数据的泄露,且数据在存储过程中容易被非法截获利用。The existing collection data transmission has the following security problems: At this stage, the data transmission adopts the network provided by the operator. Although there are authentication mechanisms such as digital authentication for terminal equipment information transmission, it is necessary to install the pre-set non-repeatable key security TF card to each device. In the device, data leakage is likely to occur after the terminal is stolen and lost, and the data is easily intercepted and used illegally during the storage process.

发明内容SUMMARY OF THE INVENTION

为实现上述目的,本发明提供如下技术方案:一种数据传输用安全监控系统,包括通过无线网络依次连接的监控采集端、采集端处理模块、传输模块和主数据库,其中:In order to achieve the above object, the present invention provides the following technical solutions: a security monitoring system for data transmission, comprising a monitoring collection terminal, a collection terminal processing module, a transmission module and a master database sequentially connected through a wireless network, wherein:

监控采集端用于对电力设备终端的运行数据进行采集;The monitoring and collecting terminal is used to collect the operation data of the power equipment terminal;

采集端处理模块对监控采集端收集的终端数据进行处理后并上传;The acquisition terminal processing module processes and uploads the terminal data collected by the monitoring acquisition terminal;

传输模块用于将采集端处理模块处理后的数据包上传至主数据库中;The transmission module is used to upload the data packets processed by the acquisition-end processing module to the main database;

主数据库对上传后的数据进行下载和后端处理。The main database downloads and processes the uploaded data.

在一个优选地实施方式中,采集端处理模块还包括加密模块和压缩模块。In a preferred embodiment, the acquisition-end processing module further includes an encryption module and a compression module.

在一个优选地实施方式中,在采集端处理模块接收监控采集端采集的数据时,通过压缩模块对采集的数据进行压缩打包,然后利用加密模块对压缩后的数据包进行数字加密;In a preferred embodiment, when the collection-end processing module receives the data collected by the monitoring collection-end, the collected data is compressed and packaged by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;

采集端处理模块在数据被压缩的过程中,获取数据包的压缩时间,并将压缩时间标记为A;In the process of data compression, the acquisition-end processing module obtains the compression time of the data packet, and marks the compression time as A;

采集端处理模块在数据包被数字加密的过程中,获取数据包的加密时间,并将加密时间标记为B。The acquisition-end processing module obtains the encryption time of the data packet during the process of digital encryption of the data packet, and marks the encryption time as B.

在一个优选地实施方式中,在传输模块对采集端处理模块加密后的压缩包进行上传的过程中,时间标记A和时间标记B会随着加密后的压缩包一起上传至主数据库中。In a preferred embodiment, when the transmission module uploads the compressed package encrypted by the acquisition-end processing module, the time stamp A and the time stamp B will be uploaded to the main database together with the encrypted compressed package.

在一个优选地实施方式中,时间标记A和时间标记B为具体的时间数值,其取值范围至分秒。In a preferred embodiment, the time mark A and the time mark B are specific time values, and their values range from minutes to seconds.

在一个优选地实施方式中,主数据库还包括二次加密模块、后端处理模块和随机数模块。In a preferred embodiment, the main database further includes a secondary encryption module, a back-end processing module and a random number module.

在一个优选地实施方式中,主数据库会接收传输模块上传的加密数据包,并将加密数据包进行下载后,利用后端处理模块进行后端处理;In a preferred embodiment, the main database will receive the encrypted data packet uploaded by the transmission module, and after downloading the encrypted data packet, use the back-end processing module to perform back-end processing;

后端处理模块会在主数据库接收加密数据包的同时,根据加密数据包的时间戳信息获取加密数据包在传输过程中所用的时间,标记为C。When the main database receives the encrypted data packet, the back-end processing module obtains the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet, which is marked as C.

在一个优选地实施方式中,后端处理模块的具体处理过程中为:In a preferred embodiment, the specific processing process of the back-end processing module is:

a、提取传输数据中的标记时间A和标记时间B;a. Extract the marked time A and the marked time B in the transmission data;

b、随机数模块随机生成一个随机数α,根据随机数α的值,计算(A+B+C)/ α的值x,b. The random number module randomly generates a random number α, and calculates the value x of (A+B+C)/α according to the value of the random number α,

c、利用二次加密模块对接收的压缩数据包进行二次加密,加密的密钥为 x。c. Use the secondary encryption module to perform secondary encryption on the received compressed data packet, and the encrypted key is x.

本发明的技术效果和优点:Technical effects and advantages of the present invention:

系统中进行传输的数据包进行了多次加密,且加密的密钥与整个数据传输过程中所涉及的内容相关联,整体关联性强,加密后的数据包在进行读取时需要进行密钥匹配,因此单个环节的内容出现泄露时不会影响整体数据的安全性,能够大幅度的降低数据泄漏的可能性。The data packets transmitted in the system are encrypted many times, and the encrypted key is associated with the content involved in the entire data transmission process, and the overall correlation is strong. The encrypted data packet needs to be encrypted when reading. Therefore, when the content of a single link is leaked, it will not affect the security of the overall data, which can greatly reduce the possibility of data leakage.

附图说明Description of drawings

图1为本发明的系统框架示意图。FIG. 1 is a schematic diagram of the system framework of the present invention.

具体实施方式Detailed ways

下面结合附图和具体实施方式对本发明作进一步详细的说明。本发明的实施例是为了示例和描述起见而给出的,而并不是无遗漏的或者将本发明限于所公开的形式。很多修改和变化对于本领域的普通技术人员而言是显而易见的。选择和描述实施例是为了更好说明本发明的原理和实际应用,并且使本领域的普通技术人员能够理解本发明从而设计适于特定用途的带有各种修改的各种实施例。The present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention are presented for purposes of illustration and description, and are not intended to be exhaustive or to limit the invention to the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to better explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use.

实施例1Example 1

一种数据传输用安全监控系统,包括通过无线网络依次连接的监控采集端、采集端处理模块、传输模块和主数据库,其中:A security monitoring system for data transmission, comprising a monitoring collection terminal, a collection terminal processing module, a transmission module and a main database sequentially connected through a wireless network, wherein:

监控采集端用于对电力设备终端的运行数据进行采集;The monitoring and collecting terminal is used to collect the operation data of the power equipment terminal;

采集端处理模块对监控采集端收集的终端数据进行处理后并上传;The acquisition terminal processing module processes and uploads the terminal data collected by the monitoring acquisition terminal;

传输模块用于将采集端处理模块处理后的数据包上传至主数据库中;The transmission module is used to upload the data packets processed by the acquisition-end processing module to the main database;

主数据库对上传后的数据进行下载和后端处理。The main database downloads and processes the uploaded data.

采集端处理模块还包括加密模块和压缩模块。The acquisition-end processing module also includes an encryption module and a compression module.

在采集端处理模块接收监控采集端采集的数据时,通过压缩模块对采集的数据进行压缩打包,然后利用加密模块对压缩后的数据包进行数字加密;When the acquisition-end processing module receives the data collected by the monitoring and acquisition-end, it compresses and packs the collected data through the compression module, and then uses the encryption module to digitally encrypt the compressed data packets;

采集端处理模块在数据被压缩的过程中,获取数据包的压缩时间,并将压缩时间标记为A;In the process of data compression, the acquisition-end processing module obtains the compression time of the data packet, and marks the compression time as A;

采集端处理模块在数据包被数字加密的过程中,获取数据包的加密时间,并将加密时间标记为B。The acquisition-end processing module obtains the encryption time of the data packet during the process of digital encryption of the data packet, and marks the encryption time as B.

在传输模块对采集端处理模块加密后的压缩包进行上传的过程中,时间标记A和时间标记B会随着加密后的压缩包一起上传至主数据库中。In the process of uploading the compressed package encrypted by the processing module of the acquisition end by the transmission module, the time stamp A and the time stamp B will be uploaded to the main database together with the encrypted compressed package.

时间标记A和时间标记B为具体的时间数值,其取值范围至分秒。Time mark A and time mark B are specific time values, and the value ranges from minutes to seconds.

主数据库还包括二次加密模块、后端处理模块和随机数模块。The main database also includes a secondary encryption module, a back-end processing module and a random number module.

主数据库会接收传输模块上传的加密数据包,并将加密数据包进行下载后,利用后端处理模块进行后端处理;The main database will receive the encrypted data packets uploaded by the transmission module, download the encrypted data packets, and use the back-end processing module for back-end processing;

后端处理模块会在主数据库接收加密数据包的同时,根据加密数据包的时间戳信息获取加密数据包在传输过程中所用的时间,标记为C。When the main database receives the encrypted data packet, the back-end processing module obtains the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet, which is marked as C.

后端处理模块的具体处理过程中为:The specific processing process of the back-end processing module is as follows:

a、提取传输数据中的标记时间A和标记时间B;a. Extract the marked time A and the marked time B in the transmission data;

b、随机数模块随机生成一个随机数α,根据随机数α的值,计算(A+B+C)/ α的值x,b. The random number module randomly generates a random number α, and calculates the value x of (A+B+C)/α according to the value of the random number α,

c、利用二次加密模块对接收的压缩数据包进行二次加密,加密的密钥为 x。c. Use the secondary encryption module to perform secondary encryption on the received compressed data packet, and the encrypted key is x.

实施例2Example 2

一种数据传输用安全监控系统,包括通过无线网络依次连接的监控采集端、采集端处理模块、传输模块和主数据库,其中:A security monitoring system for data transmission, comprising a monitoring collection terminal, a collection terminal processing module, a transmission module and a main database sequentially connected through a wireless network, wherein:

监控采集端用于对电力设备终端的运行数据进行采集;The monitoring and collecting terminal is used to collect the operation data of the power equipment terminal;

采集端处理模块对监控采集端收集的终端数据进行处理后并上传;The acquisition terminal processing module processes and uploads the terminal data collected by the monitoring acquisition terminal;

传输模块用于将采集端处理模块处理后的数据包上传至主数据库中;The transmission module is used to upload the data packets processed by the acquisition-end processing module to the main database;

主数据库对上传后的数据进行下载和后端处理。The main database downloads and processes the uploaded data.

采集端处理模块还包括加密模块和压缩模块。The acquisition-end processing module also includes an encryption module and a compression module.

在采集端处理模块接收监控采集端采集的数据时,通过压缩模块对采集的数据进行压缩打包,然后利用加密模块对压缩后的数据包进行数字加密;When the acquisition-end processing module receives the data collected by the monitoring and acquisition-end, it compresses and packs the collected data through the compression module, and then uses the encryption module to digitally encrypt the compressed data packets;

采集端处理模块在数据被压缩的过程中,获取数据包的压缩时间,并将压缩时间标记为A;In the process of data compression, the acquisition-end processing module obtains the compression time of the data packet, and marks the compression time as A;

采集端处理模块在数据包被数字加密的过程中,获取数据包的加密时间,并将加密时间标记为B。The acquisition-end processing module obtains the encryption time of the data packet during the process of digital encryption of the data packet, and marks the encryption time as B.

在传输模块对采集端处理模块加密后的压缩包进行上传的过程中,时间标记A和时间标记B会随着加密后的压缩包一起上传至主数据库中。In the process of uploading the compressed package encrypted by the processing module of the acquisition end by the transmission module, the time stamp A and the time stamp B will be uploaded to the main database together with the encrypted compressed package.

时间标记A和时间标记B为具体的时间数值,其取值范围至分秒。Time mark A and time mark B are specific time values, and the value ranges from minutes to seconds.

主数据库还包括二次加密模块、后端处理模块和随机数模块。The main database also includes a secondary encryption module, a back-end processing module and a random number module.

主数据库会接收传输模块上传的加密数据包,并将加密数据包进行下载后,利用后端处理模块进行后端处理;The main database will receive the encrypted data packets uploaded by the transmission module, download the encrypted data packets, and use the back-end processing module for back-end processing;

后端处理模块会在主数据库接收加密数据包的同时,根据加密数据包的时间戳信息获取加密数据包在传输过程中所用的时间,标记为C。When the main database receives the encrypted data packet, the back-end processing module obtains the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet, which is marked as C.

后端处理模块的具体处理过程中为:The specific processing process of the back-end processing module is as follows:

a、提取传输数据中的标记时间A和标记时间B;a. Extract the marked time A and the marked time B in the transmission data;

b、随机数模块随机生成一个随机数α,根据随机数α的值,计算(A+B+C)/ α的值x;b. The random number module randomly generates a random number α, and calculates the value x of (A+B+C)/α according to the value of the random number α;

c、利用二次加密模块对接收的压缩数据包进行二次加密,加密的密钥为 x。c. Use the secondary encryption module to perform secondary encryption on the received compressed data packet, and the encrypted key is x.

其中,随机数α的值会随着压缩数据包数量的增加而变化,每日的随机数都会进行重置,每日首个随机数α生成后,后面每新增加一个压缩数据包,其密钥x便会重新计算,具体为:Among them, the value of the random number α will change with the increase of the number of compressed data packets, and the random number will be reset every day. The key x will be recalculated as follows:

1、在每个首个随机数生成后的第一个数据包进行加密时,其密钥为 (A+B+C)/α;1. When encrypting the first data packet after each first random number is generated, its key is (A+B+C)/α;

2、第二个数据包进行加密时,其密钥为(A+B+C)/(α+1);2. When the second data packet is encrypted, its key is (A+B+C)/(α+1);

3、第三个数据包进行加密时,其密钥为(A+B+C)/(α+2);3. When the third data packet is encrypted, its key is (A+B+C)/(α+2);

4、第n个数据包进行加密时,其密钥为(A+B+C)/(α+n)。4. When the nth data packet is encrypted, its key is (A+B+C)/(α+n).

实施例3Example 3

进一步的,系统也可对随机数的生成进行限定,设定一个随机数Q,在数据包进行Q轮之后,再次随机生成一个新的随机数α,在新生成的随机数α的基础上,进行数据包加密。Further, the system can also limit the generation of random numbers, and set a random number Q. After the data packet goes through Q rounds, a new random number α is randomly generated again. On the basis of the newly generated random number α, Packet encryption is performed.

在上述的基础上,系统中进行传输的数据包进行了多次加密,且加密的密钥与整个数据传输过程中所涉及的内容相关联,整体关联性强,加密后的数据包在进行读取时需要进行密钥匹配,因此单个环节的内容出现泄露时不会影响整体数据的安全性,能够大幅度的降低数据泄漏的可能性。On the basis of the above, the data packets transmitted in the system are encrypted many times, and the encrypted key is associated with the content involved in the entire data transmission process, and the overall correlation is strong, and the encrypted data packets are being read. Key matching is required at the time of retrieval, so if the content of a single link is leaked, it will not affect the security of the overall data, which can greatly reduce the possibility of data leakage.

显然,所描述的实施例仅仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域及相关领域的普通技术人员在没有作出创造性劳动的前提下所获得的所有其他实施例,都应属于本发明保护的范围。本发明中未具体描述和解释说明的结构、装置以及操作方法,如无特别说明和限定,均按照本领域的常规手段进行实施。Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art and related fields without creative work shall fall within the protection scope of the present invention. The structures, devices and operation methods that are not specifically described and explained in the present invention are implemented according to conventional means in the art unless otherwise specified and limited.

Claims (8)

1. The utility model provides a safety monitoring system for data transmission which characterized in that includes the control collection end, gathers end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
2. The security monitoring system for data transmission according to claim 1, wherein: the acquisition-side processing module further comprises an encryption module and a compression module.
3. A security monitoring system for data transmission according to claim 2, characterized in that: when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
4. A security monitoring system for data transmission according to claim 3, characterized in that: in the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
5. A security monitoring system for data transmission according to claim 3, characterized in that: the time stamp a and the time stamp B are specific time values ranging from minutes to seconds.
6. The security monitoring system for data transmission according to claim 4, wherein: the main database also comprises a secondary encryption module, a back-end processing module and a random number module.
7. The security monitoring system for data transmission according to claim 6, wherein: the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then carries out back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
8. The security monitoring system for data transmission according to claim 7, wherein: the specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
CN202210610790.XA 2022-05-31 2022-05-31 A security monitoring system for data transmission Active CN115051840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 A security monitoring system for data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 A security monitoring system for data transmission

Publications (2)

Publication Number Publication Date
CN115051840A true CN115051840A (en) 2022-09-13
CN115051840B CN115051840B (en) 2023-11-07

Family

ID=83158661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610790.XA Active CN115051840B (en) 2022-05-31 2022-05-31 A security monitoring system for data transmission

Country Status (1)

Country Link
CN (1) CN115051840B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140017955A (en) * 2012-08-02 2014-02-12 현대유엔아이 주식회사 Global realtime wireless reefer monitoring system
CN105867245B (en) * 2016-05-14 2018-08-21 东北电力大学 A kind of electric power information monitoring system
CN108768542B (en) * 2018-05-02 2021-10-19 三峡大学 A Random Number-Based Quantum Encrypted Communication System for Voice Signals
CN111314469A (en) * 2020-02-20 2020-06-19 国网山东省电力公司宁阳县供电公司 Power equipment remote monitoring system and method based on big data cloud computing
CN114167905A (en) * 2021-12-03 2022-03-11 湖北科技学院 A power station ecological flow monitoring system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN115051840B (en) 2023-11-07

Similar Documents

Publication Publication Date Title
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN107317856A (en) A kind of date storage method and device based on block chain
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
CN110633575B (en) Data encryption method, device, equipment and storage medium
CN103888241A (en) Method for implementing digital-forensics-oriented digital evidence supervision chain
CN115174255B (en) Industrial Internet platform data transmission safety protection system
CN111917555A (en) Data processing method and device
CN106789842B (en) A security development middleware and control method for power mobile inspection terminals
CN110570197B (en) Data processing method and device based on block chain
CN111367686A (en) Service interface calling method and device, computer equipment and storage medium
CN113225339A (en) Network security monitoring method and device, computer equipment and storage medium
CN108458724B (en) Step counting method and device
CN112087301A (en) Gas meter safety certification system based on state cryptographic algorithm
CN115051840A (en) Safety monitoring system for data transmission
CN111490880B (en) File receiving method and device
CN213122985U (en) PIS authentication system
CN117319517B (en) Multi-protocol-based water supply equipment data integration and forwarding method
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN117014223B (en) Concentrator, data transmission method and device thereof and storage medium
CN115314227B (en) Charging pile access authentication method, system and equipment
CN118138383A (en) Charging method and system for Internet of things equipment
CN111506913B (en) Audio encryption method and device, storage medium and electronic device
KR101795259B1 (en) Metering data randomization system for privacy
US20240281545A1 (en) System and method for secure data messaging
CN115883245B (en) Data decryption method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant