CN115051840B - Safety monitoring system for data transmission - Google Patents
Safety monitoring system for data transmission Download PDFInfo
- Publication number
- CN115051840B CN115051840B CN202210610790.XA CN202210610790A CN115051840B CN 115051840 B CN115051840 B CN 115051840B CN 202210610790 A CN202210610790 A CN 202210610790A CN 115051840 B CN115051840 B CN 115051840B
- Authority
- CN
- China
- Prior art keywords
- data packet
- data
- module
- end processing
- processing module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 44
- 238000012544 monitoring process Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 59
- 238000000034 method Methods 0.000 claims abstract description 27
- 230000006835 compression Effects 0.000 claims description 16
- 238000007906 compression Methods 0.000 claims description 16
- 230000003203 everyday effect Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention discloses a safety monitoring system for data transmission, in particular to the technical field of data transmission, which comprises a monitoring acquisition end, an acquisition end processing module, a transmission module and a main database which are sequentially connected through a wireless network, wherein: the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal; the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded; the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database; and the main database downloads and processes the uploaded data at the back end. The invention encrypts the data packet for transmission for multiple times, and the encrypted secret key is related to the content related in the whole data transmission process, so that the whole relevance is strong, the secret key matching is needed when the encrypted data packet is read, the safety of the whole data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Description
Technical Field
The invention relates to the technical field of data transmission, in particular to a safety monitoring system for data transmission.
Background
The public network communication resource card account, workflow, flow monitoring and other systems of three telecom operators are of a first scale, and the wireless network communication terminal configuration, alarm and performance information basically realize data monitoring, but the integrity, accuracy, instantaneity and safety of acquiring and transmitting data aiming at the current power grid wireless terminal are insufficient. In particular to the aspect of data safety transmission, the wireless acquisition platform to the communication terminal and the wireless communication comprehensive network management system have no effective communication terminal access safety authentication mechanism, and have illegal invasion hidden dangers such as illegal acquisition of related power wireless public network service data.
The existing collected data transmission has the following safety problems: in the current stage, the data transmission adopts a network provided by an operator, and the information transmission of the terminal equipment has authentication mechanisms such as digital authentication, but a preset key security TF card which cannot be repeated is required to be installed in each equipment, so that the data is easy to leak after the terminal is stolen and lost, and the data is easy to be illegally intercepted and utilized in the storage process.
Disclosure of Invention
In order to achieve the above purpose, the present invention provides the following technical solutions: the utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
In a preferred embodiment, the collecting-end processing module further comprises an encryption module and a compression module.
In a preferred embodiment, when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In a preferred embodiment, in the process that the transmission module uploads the compressed packet encrypted by the acquisition end processing module, the time stamp a and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
In a preferred embodiment, time stamp a and time stamp B are specific time values ranging from a fraction of a second.
In a preferred embodiment, the primary database further comprises a secondary encryption module, a back-end processing module, and a random number module.
In a preferred embodiment, the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then uses the back-end processing module to perform back-end processing;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
In a preferred embodiment, the specific processing procedure of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
The invention has the technical effects and advantages that:
the data packet transmitted in the system is encrypted for multiple times, the encrypted secret key is related to the content related in the whole data transmission process, the overall relevance is strong, and the secret key matching is needed when the encrypted data packet is read, so that the safety of the overall data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Drawings
FIG. 1 is a schematic diagram of a system framework of the present invention.
Detailed Description
The invention will be described in further detail with reference to the drawings and the detailed description. The embodiments of the invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
The utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
The acquisition end processing module also comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to the main database along with the encrypted compressed package.
Time stamp a and time stamp B are specific time values ranging from a fraction of a second.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
Example 2
The utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
The acquisition end processing module also comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to the main database along with the encrypted compressed package.
Time stamp a and time stamp B are specific time values ranging from a fraction of a second.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, and calculates the value x of (A+B+C)/alpha according to the value of the random number alpha;
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
The value of the random number α changes along with the increase of the number of the compressed data packets, the random number is reset every day, and after the first random number α is generated every day, a compressed data packet is added every time later, and the secret key x is recalculated, specifically:
1. when the first data packet after each first random number is generated is encrypted, the key is (A+B+C)/alpha;
2. when the second data packet is encrypted, the key is (A+B+C)/(alpha+1);
3. when the third data packet is encrypted, the key is (A+B+C)/(alpha+2);
4. when the nth packet is encrypted, the key is (A+B+C)/(alpha+n).
Example 3
Further, the system may limit the generation of the random number, set a random number Q, randomly generate a new random number α again after the data packet is subjected to Q rounds, and encrypt the data packet based on the newly generated random number α.
On the basis of the above, the data packet transmitted in the system is encrypted for multiple times, the encrypted secret key is related to the content related in the whole data transmission process, the whole relevance is strong, and the secret key matching is needed when the encrypted data packet is read, so that the security of the whole data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art and which are included in the embodiments of the present invention without the inventive step, are intended to be within the scope of the present invention. Structures, devices and methods of operation not specifically described and illustrated herein, unless otherwise indicated and limited, are implemented according to conventional means in the art.
Claims (1)
1. The utility model provides a data transmission is with safety monitoring system which characterized in that, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
the main database downloads and processes the uploaded data at the back end;
the acquisition end processing module also comprises an encryption module and a compression module;
when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B;
in the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to a main database along with the encrypted compressed package;
the time mark A and the time mark B are specific time values, and the values range from minutes to seconds;
the main database also comprises a secondary encryption module, a back-end processing module and a random number module;
the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module obtains the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C;
the specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. performing secondary encryption on the received compressed data packet by using a secondary encryption module, wherein an encryption key is x;
the value of the random number α changes along with the increase of the number of the compressed data packets, the random number is reset every day, and after the first random number α is generated every day, a compressed data packet is added every time later, and the secret key x is recalculated, specifically:
when the first data packet after each first random number is generated is encrypted, the key is (A+B+C)/alpha:
the second data packet has the key of (A+B+C)/(alpha+1) when encrypting, and the third data packet has the key of (A+B+C)/(alpha+2) when encrypting;
when the nth data packet is encrypted, the key is (A+B+C)/(alpha+n);
the system can limit the generation of random numbers, set a random number Q, randomly generate a new random number alpha again after the data packet is subjected to Q rounds, and encrypt the data packet based on the newly generated random number alpha.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610790.XA CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210610790.XA CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115051840A CN115051840A (en) | 2022-09-13 |
CN115051840B true CN115051840B (en) | 2023-11-07 |
Family
ID=83158661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210610790.XA Active CN115051840B (en) | 2022-05-31 | 2022-05-31 | Safety monitoring system for data transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115051840B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140017955A (en) * | 2012-08-02 | 2014-02-12 | 현대유엔아이 주식회사 | Global realtime wireless reefer monitoring system |
CN105867245A (en) * | 2016-05-14 | 2016-08-17 | 东北电力大学 | System for monitoring electric power information |
CN108768542A (en) * | 2018-05-02 | 2018-11-06 | 三峡大学 | A kind of voice signal quantum encryption communication system based on random number |
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
CN111314469A (en) * | 2020-02-20 | 2020-06-19 | 国网山东省电力公司宁阳县供电公司 | Power equipment remote monitoring system and method based on big data cloud computing |
CN114167905A (en) * | 2021-12-03 | 2022-03-11 | 湖北科技学院 | Power station ecological flow monitoring system |
-
2022
- 2022-05-31 CN CN202210610790.XA patent/CN115051840B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140017955A (en) * | 2012-08-02 | 2014-02-12 | 현대유엔아이 주식회사 | Global realtime wireless reefer monitoring system |
CN105867245A (en) * | 2016-05-14 | 2016-08-17 | 东北电力大学 | System for monitoring electric power information |
CN108768542A (en) * | 2018-05-02 | 2018-11-06 | 三峡大学 | A kind of voice signal quantum encryption communication system based on random number |
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
CN111314469A (en) * | 2020-02-20 | 2020-06-19 | 国网山东省电力公司宁阳县供电公司 | Power equipment remote monitoring system and method based on big data cloud computing |
CN114167905A (en) * | 2021-12-03 | 2022-03-11 | 湖北科技学院 | Power station ecological flow monitoring system |
Also Published As
Publication number | Publication date |
---|---|
CN115051840A (en) | 2022-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111555872B (en) | Communication data processing method, device, computer system and storage medium | |
CN111797431B (en) | Encrypted data anomaly detection method and system based on symmetric key system | |
CN115174255B (en) | Industrial Internet platform data transmission safety protection system | |
CN112671710A (en) | Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method | |
CN113987525A (en) | System data protection method based on block cipher algorithm | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption | |
CN115051840B (en) | Safety monitoring system for data transmission | |
CN107995616B (en) | User behavior data processing method and device | |
CN112202808A (en) | Data security management system based on cloud computing | |
CN116114280A8 (en) | Key management method and communication device | |
CN114244635B (en) | Encryption type data coding method of communication equipment | |
CN109587155B (en) | Wireless vehicle brake test system for guaranteeing information safety | |
CN112839044B (en) | Audio processing method and device | |
CN113346999B (en) | Splitting encryption-based brain central system | |
CN115347675A (en) | Smart power grid data secure access method and system | |
CN113395174B (en) | Terminal fault processing method for remotely controlling Internet of things | |
CN111490880B (en) | File receiving method and device | |
CN114900365A (en) | Innovative service resource data processing and secure interaction method | |
CN114423001A (en) | Decryption method, server and storage medium | |
CN113536350B (en) | Upgrading packet encryption and decryption method and system based on OTA technology | |
CN108600185A (en) | A kind of data security transmission network system and its method | |
CN113162678B (en) | Method, terminal, electronic device and medium for key switching and data transmission | |
CN112491929B (en) | Information security method based on digital feature recognition | |
CN113747431B (en) | Data encryption system and data encryption method of mobile equipment | |
CN114710671B (en) | Distributed energy safety intelligent terminal based on multiple communication modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |