CN115051840A - Safety monitoring system for data transmission - Google Patents

Safety monitoring system for data transmission Download PDF

Info

Publication number
CN115051840A
CN115051840A CN202210610790.XA CN202210610790A CN115051840A CN 115051840 A CN115051840 A CN 115051840A CN 202210610790 A CN202210610790 A CN 202210610790A CN 115051840 A CN115051840 A CN 115051840A
Authority
CN
China
Prior art keywords
data
module
processing module
data packet
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210610790.XA
Other languages
Chinese (zh)
Other versions
CN115051840B (en
Inventor
孙佳丽
胡聪
王鹏
张翠翠
孙琦
卢锐轩
刘翠玲
洪德华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd filed Critical Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority to CN202210610790.XA priority Critical patent/CN115051840B/en
Publication of CN115051840A publication Critical patent/CN115051840A/en
Application granted granted Critical
Publication of CN115051840B publication Critical patent/CN115051840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a safety monitoring system for data transmission, in particular to the technical field of data transmission, which comprises a monitoring acquisition terminal, an acquisition terminal processing module, a transmission module and a main database which are sequentially connected through a wireless network, wherein: the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal; the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end; the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database; and the main database downloads and performs back-end processing on the uploaded data. The invention encrypts the transmitted data packet for multiple times, the encrypted key is associated with the content involved in the whole data transmission process, the whole association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the safety of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.

Description

Safety monitoring system for data transmission
Technical Field
The invention relates to the technical field of data transmission, in particular to a safety monitoring system for data transmission.
Background
The public network communication resource card account, the work flow, the flow monitoring and other systems of three telecom operators are in initial scale, data monitoring is basically realized by wireless network communication terminal configuration, alarm and performance information, but the system is insufficient for the integrity, accuracy, instantaneity and safety of data acquisition and transmission of the current power grid wireless terminal. Particularly, in the aspect of data security transmission, an effective communication terminal access security authentication mechanism is not available from a wireless acquisition platform to a communication terminal and from a wireless communication comprehensive network management system, and the hidden danger of illegal invasion such as illegal acquisition of related electric wireless public network service data exists.
The existing collected data transmission has the following safety problems: the existing data transmission adopts a network provided by an operator, and although the information transmission of terminal equipment has authentication mechanisms such as digital authentication, a secret key safety TF card which is preset and can not be repeated needs to be installed in each equipment, so that the data is easily leaked after the terminal is stolen and lost, and the data is easily illegally intercepted and utilized in the storage process.
Disclosure of Invention
In order to achieve the purpose, the invention provides the following technical scheme: the utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
In a preferred embodiment, the acquisition-side processing module further comprises an encryption module and a compression module.
In a preferred embodiment, when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In a preferred embodiment, during the uploading of the compressed packet encrypted by the acquisition-side processing module by the transmission module, the timestamp a and the timestamp B are uploaded to the master database along with the encrypted compressed packet.
In a preferred embodiment, the time stamps a and B are specific time values ranging from minutes to seconds.
In a preferred embodiment, the master database further comprises a secondary encryption module, a back-end processing module and a random number module.
In a preferred embodiment, the master database receives the encrypted data packet uploaded by the transmission module, and after downloading the encrypted data packet, performs back-end processing by using the back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
In a preferred embodiment, the specific processing procedures of the back-end processing module are as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
The invention has the technical effects and advantages that:
the data packet transmitted in the system is encrypted for multiple times, the encrypted key is associated with the content involved in the whole data transmission process, the overall association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the security of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Drawings
FIG. 1 is a system framework diagram of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
The utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
The acquisition-side processing module further comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
The time stamp A and the time stamp B are specific time values, and the value range thereof is up to minutes and seconds.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then performs back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
Example 2
The utility model provides a safety monitoring system for data transmission, includes the control collection end, collection end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
The acquisition-side processing module further comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
In the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
The time stamp A and the time stamp B are specific time values, and the value range thereof is up to minutes and seconds.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then carries out back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, and calculates the value x of (A + B + C)/alpha according to the value of the random number alpha;
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
The value of the random number α changes with the increase of the number of the compressed data packets, the random number per day is reset, and after the first random number α is generated per day, the key x is recalculated every time a compressed data packet is newly added later, specifically:
1. when the first data packet generated by each first random number is encrypted, the key of the first data packet is (A + B + C)/alpha;
2. when the second data packet is encrypted, the key is (A + B + C)/(alpha + 1);
3. when the third data packet is encrypted, the key is (A + B + C)/(alpha + 2);
4. when the nth packet is encrypted, the key is (a + B + C)/(α + n).
Example 3
Further, the system may limit generation of the random number, set a random number Q, randomly generate a new random number α again after performing Q rounds on the packet, and encrypt the packet based on the newly generated random number α.
On the basis, the data packet transmitted in the system is encrypted for multiple times, the encrypted key is associated with the content related in the whole data transmission process, the whole association is strong, and the encrypted data packet needs to be subjected to key matching when being read, so that the safety of the whole data cannot be influenced when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
It should be apparent that the described embodiments are only some of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention. Structures, devices, and methods of operation not specifically described or illustrated herein are generally practiced in the art without specific recitation or limitation.

Claims (8)

1. The utility model provides a safety monitoring system for data transmission which characterized in that includes the control collection end, gathers end processing module, transmission module and the main database that connect gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the acquisition end processing module processes and uploads terminal data collected by the monitoring acquisition end;
the transmission module is used for uploading the data packet processed by the acquisition terminal processing module to the main database;
and the main database downloads and performs back-end processing on the uploaded data.
2. The security monitoring system for data transmission according to claim 1, wherein: the acquisition-side processing module further comprises an encryption module and a compression module.
3. A security monitoring system for data transmission according to claim 2, characterized in that: when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packaged through the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the acquisition end processing module acquires the compression time of a data packet in the process of data compression and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet and marks the encryption time as B.
4. A security monitoring system for data transmission according to claim 3, characterized in that: in the process that the transmission module uploads the compressed packet encrypted by the processing module at the acquisition terminal, the time stamp A and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
5. A security monitoring system for data transmission according to claim 3, characterized in that: the time stamp a and the time stamp B are specific time values ranging from minutes to seconds.
6. The security monitoring system for data transmission according to claim 4, wherein: the main database also comprises a secondary encryption module, a back-end processing module and a random number module.
7. The security monitoring system for data transmission according to claim 6, wherein: the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet and then carries out back-end processing by using a back-end processing module;
and the back-end processing module acquires the time used by the encrypted data packet in the transmission process according to the timestamp information of the encrypted data packet while receiving the encrypted data packet in the main database, and the time is marked as C.
8. The security monitoring system for data transmission according to claim 7, wherein: the specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A + B + C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by using a secondary encryption module, wherein the encrypted key is x.
CN202210610790.XA 2022-05-31 2022-05-31 Safety monitoring system for data transmission Active CN115051840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Publications (2)

Publication Number Publication Date
CN115051840A true CN115051840A (en) 2022-09-13
CN115051840B CN115051840B (en) 2023-11-07

Family

ID=83158661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610790.XA Active CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Country Status (1)

Country Link
CN (1) CN115051840B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140017955A (en) * 2012-08-02 2014-02-12 현대유엔아이 주식회사 Global realtime wireless reefer monitoring system
CN105867245B (en) * 2016-05-14 2018-08-21 东北电力大学 A kind of electric power information monitoring system
CN108768542B (en) * 2018-05-02 2021-10-19 三峡大学 Voice signal quantum encryption communication system based on random number
CN111314469A (en) * 2020-02-20 2020-06-19 国网山东省电力公司宁阳县供电公司 Power equipment remote monitoring system and method based on big data cloud computing
CN114167905A (en) * 2021-12-03 2022-03-11 湖北科技学院 Power station ecological flow monitoring system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN115051840B (en) 2023-11-07

Similar Documents

Publication Publication Date Title
EP3501136B1 (en) Method, transmitter, and receiver for authenticating and protecting the integrity of message contents
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN111209334A (en) Block chain-based power terminal data security management method
CN109348479B (en) Data communication method, device, equipment and system of electric power centralized meter reading system
CN112671710B (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN108900540B (en) Service data processing method of power distribution terminal based on double encryption
CN113783683A (en) Cloud platform privacy protection verifiable data aggregation method based on sensor network
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN113987525A (en) System data protection method based on block cipher algorithm
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN115051840B (en) Safety monitoring system for data transmission
CN115883679B (en) Data security transmission method and system based on block chain
CN111314382A (en) Network safety protection method suitable for high-frequency emergency control system
CN108174344B (en) GIS position information transmission encryption method and device in trunking communication
CN114286204B (en) Remote communication method and system of intelligent air switch
CN115694931A (en) Relay protection remote operation and maintenance intrusion prevention and detection method and system
CN109587155B (en) Wireless vehicle brake test system for guaranteeing information safety
CN114244635A (en) Encryption type data coding method of communication equipment
CN114423001A (en) Decryption method, server and storage medium
CN111083129A (en) Data secure transmission method, heterogeneous data transmission layer and system
CN111030804A (en) Fault information transmission method, device, system, equipment and storage medium
US20240281545A1 (en) System and method for secure data messaging
CN113536350B (en) Upgrading packet encryption and decryption method and system based on OTA technology
CN113162678B (en) Method, terminal, electronic device and medium for key switching and data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant