CN115051840A - Safety monitoring system for data transmission - Google Patents
Safety monitoring system for data transmission Download PDFInfo
- Publication number
- CN115051840A CN115051840A CN202210610790.XA CN202210610790A CN115051840A CN 115051840 A CN115051840 A CN 115051840A CN 202210610790 A CN202210610790 A CN 202210610790A CN 115051840 A CN115051840 A CN 115051840A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- processing module
- data packet
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 51
- 238000012544 monitoring process Methods 0.000 title claims abstract description 32
- 238000012545 processing Methods 0.000 claims abstract description 64
- 238000000034 method Methods 0.000 claims abstract description 22
- 238000007906 compression Methods 0.000 claims description 16
- 230000006835 compression Effects 0.000 claims description 16
- 238000013144 data compression Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention discloses a safety monitoring system for data transmission, in particular to the technical field of data transmission, which comprises a monitoring acquisition terminal, an acquisition terminal processing module, a transmission module and a main database which are sequentially connected through a wireless network, wherein: the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal; the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end; the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database; and the main database downloads and performs back-end processing on the uploaded data. The invention encrypts the transmitted data packet for multiple times, the encrypted key is associated with the content involved in the whole data transmission process, the whole association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the safety of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a safety monitoring system for data transmission.
Background
The public network communication resource card account, the work flow, the flow monitoring and other systems of three telecom operators are in initial scale, data monitoring is basically realized by wireless network communication terminal configuration, alarm and performance information, but the system is insufficient for the integrity, accuracy, instantaneity and safety of data acquisition and transmission of the current power grid wireless terminal. Particularly, in the aspect of data security transmission, an effective communication terminal access security authentication mechanism is not available from a wireless acquisition platform to a communication terminal and from a wireless communication comprehensive network management system, and the hidden danger of illegal invasion such as illegal acquisition of related electric wireless public network service data exists.
The existing collected data transmission has the following safety problems: the existing data transmission adopts a network provided by an operator, and although the information transmission of terminal equipment has authentication mechanisms such as digital authentication, a secret key safety TF card which is preset and can not be repeated needs to be installed in each equipment, so that the data is easily leaked after the terminal is stolen and lost, and the data is easily illegally intercepted and utilized in the storage process.
Disclosure of Invention
In order to achieve the purpose, the invention provides the following technical scheme: the utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
In a preferred embodiment, the acquisition-side processing module further comprises an encryption module and a compression module.
In a preferred embodiment, when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In a preferred embodiment, during the uploading of the compressed packet encrypted by the acquisition-side processing module by the transmission module, the timestamp a and the timestamp B are uploaded to the master database along with the encrypted compressed packet.
In a preferred embodiment, the time stamps a and B are specific time values ranging from minutes to seconds.
In a preferred embodiment, the master database further comprises a secondary encryption module, a back-end processing module and a random number module.
In a preferred embodiment, the master database receives the encrypted data packet uploaded by the transmission module, and after downloading the encrypted data packet, performs back-end processing by using the back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
In a preferred embodiment, the specific processing procedures of the back-end processing module are as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
The invention has the technical effects and advantages that:
the data packet transmitted in the system is encrypted for multiple times, the encrypted key is associated with the content involved in the whole data transmission process, the overall association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the security of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Drawings
FIG. 1 is a system framework diagram of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
The utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
The acquisition-side processing module further comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
The time stamp A and the time stamp B are specific time values, and the value range thereof is up to minutes and seconds.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then performs back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
Example 2
The utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
The acquisition-side processing module further comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
The time stamp A and the time stamp B are specific time values, and the value range thereof is up to minutes and seconds.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then carries out back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, and calculates the value x of (A + B + C)/alpha according to the value of the random number alpha;
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
The value of the random number α changes with the increase of the number of the compressed data packets, the random number per day is reset, and after the first random number α is generated per day, the key x is recalculated every time a compressed data packet is newly added later, specifically:
1. when the first data packet generated by each first random number is encrypted, the key of the first data packet is (A + B + C)/alpha;
2. when the second data packet is encrypted, the key is (A + B + C)/(alpha + 1);
3. when the third data packet is encrypted, the key is (A + B + C)/(alpha + 2);
4. when the nth packet is encrypted, the key is (a + B + C)/(α + n).
Example 3
Further, the system may limit generation of the random number, set a random number Q, randomly generate a new random number α again after performing Q rounds on the packet, and encrypt the packet based on the newly generated random number α.
On the basis, the data packet transmitted in the system is encrypted for multiple times, the encrypted key is associated with the content related in the whole data transmission process, the whole association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the safety of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
It should be apparent that the described embodiments are only some of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention. Structures, devices, and methods of operation not specifically described or illustrated herein are generally practiced in the art without specific recitation or limitation.
Claims (8)
1. The utility model provides a safety monitoring system for data transmission which characterized in that includes the control collection end, gathers end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
2. The security monitoring system for data transmission according to claim 1, wherein: the acquisition-side processing module further comprises an encryption module and a compression module.
3. A security monitoring system for data transmission according to claim 2, characterized in that: when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
4. A security monitoring system for data transmission according to claim 3, characterized in that: in the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
5. A security monitoring system for data transmission according to claim 3, characterized in that: the time stamp a and the time stamp B are specific time values ranging from minutes to seconds.
6. The security monitoring system for data transmission according to claim 4, wherein: the main database also comprises a secondary encryption module, a back-end processing module and a random number module.
7. The security monitoring system for data transmission according to claim 6, wherein: the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then carries out back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
8. The security monitoring system for data transmission according to claim 7, wherein: the specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610790.XA CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610790.XA CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115051840A true CN115051840A (en) | 2022-09-13 |
CN115051840B CN115051840B (en) | 2023-11-07 |
Family
ID=83158661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210610790.XA Active CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115051840B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140017955A (en) * | 2012-08-02 | 2014-02-12 | 현대유엔아이 주식회사 | Global realtime wireless reefer monitoring system |
CN105867245B (en) * | 2016-05-14 | 2018-08-21 | 东北电力大学 | A kind of electric power information monitoring system |
CN108768542B (en) * | 2018-05-02 | 2021-10-19 | 三峡大学 | Voice signal quantum encryption communication system based on random number |
CN111314469A (en) * | 2020-02-20 | 2020-06-19 | 国网山东省电力公司宁阳县供电公司 | Power equipment remote monitoring system and method based on big data cloud computing |
CN114167905A (en) * | 2021-12-03 | 2022-03-11 | 湖北科技学院 | Power station ecological flow monitoring system |
-
2022
- 2022-05-31 CN CN202210610790.XA patent/CN115051840B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115051840B (en) | 2023-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3501136B1 (en) | Method, transmitter, and receiver for authenticating and protecting the integrity of message contents | |
US20070257813A1 (en) | Secure network bootstrap of devices in an automatic meter reading network | |
CN111555872B (en) | Communication data processing method, device, computer system and storage medium | |
CN111209334A (en) | Block chain-based power terminal data security management method | |
CN109348479B (en) | Data communication method, device, equipment and system of electric power centralized meter reading system | |
CN112671710B (en) | Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method | |
CN108900540B (en) | Service data processing method of power distribution terminal based on double encryption | |
CN113783683A (en) | Cloud platform privacy protection verifiable data aggregation method based on sensor network | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption | |
CN113987525A (en) | System data protection method based on block cipher algorithm | |
CN110278077B (en) | Method, device, equipment and storage medium for acquiring data information of electric energy meter | |
CN115051840B (en) | Safety monitoring system for data transmission | |
CN115883679B (en) | Data security transmission method and system based on block chain | |
CN111314382A (en) | Network safety protection method suitable for high-frequency emergency control system | |
CN108174344B (en) | GIS position information transmission encryption method and device in trunking communication | |
CN114286204B (en) | Remote communication method and system of intelligent air switch | |
CN115694931A (en) | Relay protection remote operation and maintenance intrusion prevention and detection method and system | |
CN109587155B (en) | Wireless vehicle brake test system for guaranteeing information safety | |
CN114244635A (en) | Encryption type data coding method of communication equipment | |
CN114423001A (en) | Decryption method, server and storage medium | |
CN111083129A (en) | Data secure transmission method, heterogeneous data transmission layer and system | |
CN111030804A (en) | Fault information transmission method, device, system, equipment and storage medium | |
US20240281545A1 (en) | System and method for secure data messaging | |
CN113536350B (en) | Upgrading packet encryption and decryption method and system based on OTA technology | |
CN113162678B (en) | Method, terminal, electronic device and medium for key switching and data transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |