CN115051840B - Safety monitoring system for data transmission - Google Patents

Safety monitoring system for data transmission Download PDF

Info

Publication number
CN115051840B
CN115051840B CN202210610790.XA CN202210610790A CN115051840B CN 115051840 B CN115051840 B CN 115051840B CN 202210610790 A CN202210610790 A CN 202210610790A CN 115051840 B CN115051840 B CN 115051840B
Authority
CN
China
Prior art keywords
data packet
data
module
end processing
processing module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210610790.XA
Other languages
Chinese (zh)
Other versions
CN115051840A (en
Inventor
孙佳丽
胡聪
王鹏
张翠翠
孙琦
卢锐轩
刘翠玲
洪德华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd filed Critical Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority to CN202210610790.XA priority Critical patent/CN115051840B/en
Publication of CN115051840A publication Critical patent/CN115051840A/en
Application granted granted Critical
Publication of CN115051840B publication Critical patent/CN115051840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a safety monitoring system for data transmission, in particular to the technical field of data transmission, which comprises a monitoring acquisition end, an acquisition end processing module, a transmission module and a main database which are sequentially connected through a wireless network, wherein: the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal; the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded; the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database; and the main database downloads and processes the uploaded data at the back end. The invention encrypts the data packet for transmission for multiple times, and the encrypted secret key is related to the content related in the whole data transmission process, so that the whole relevance is strong, the secret key matching is needed when the encrypted data packet is read, the safety of the whole data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.

Description

Safety monitoring system for data transmission
Technical Field
The invention relates to the technical field of data transmission, in particular to a safety monitoring system for data transmission.
Background
The public network communication resource card account, workflow, flow monitoring and other systems of three telecom operators are of a first scale, and the wireless network communication terminal configuration, alarm and performance information basically realize data monitoring, but the integrity, accuracy, instantaneity and safety of acquiring and transmitting data aiming at the current power grid wireless terminal are insufficient. In particular to the aspect of data safety transmission, the wireless acquisition platform to the communication terminal and the wireless communication comprehensive network management system have no effective communication terminal access safety authentication mechanism, and have illegal invasion hidden dangers such as illegal acquisition of related power wireless public network service data.
The existing collected data transmission has the following safety problems: in the current stage, the data transmission adopts a network provided by an operator, and the information transmission of the terminal equipment has authentication mechanisms such as digital authentication, but a preset key security TF card which cannot be repeated is required to be installed in each equipment, so that the data is easy to leak after the terminal is stolen and lost, and the data is easy to be illegally intercepted and utilized in the storage process.
Disclosure of Invention
In order to achieve the above purpose, the present invention provides the following technical solutions: the utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
In a preferred embodiment, the collecting-end processing module further comprises an encryption module and a compression module.
In a preferred embodiment, when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data is compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In a preferred embodiment, in the process that the transmission module uploads the compressed packet encrypted by the acquisition end processing module, the time stamp a and the time stamp B are uploaded to the main database together with the encrypted compressed packet.
In a preferred embodiment, time stamp a and time stamp B are specific time values ranging from a fraction of a second.
In a preferred embodiment, the primary database further comprises a secondary encryption module, a back-end processing module, and a random number module.
In a preferred embodiment, the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then uses the back-end processing module to perform back-end processing;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
In a preferred embodiment, the specific processing procedure of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
The invention has the technical effects and advantages that:
the data packet transmitted in the system is encrypted for multiple times, the encrypted secret key is related to the content related in the whole data transmission process, the overall relevance is strong, and the secret key matching is needed when the encrypted data packet is read, so that the safety of the overall data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
Drawings
FIG. 1 is a schematic diagram of a system framework of the present invention.
Detailed Description
The invention will be described in further detail with reference to the drawings and the detailed description. The embodiments of the invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
The utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
The acquisition end processing module also comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to the main database along with the encrypted compressed package.
Time stamp a and time stamp B are specific time values ranging from a fraction of a second.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
Example 2
The utility model provides a data transmission is with safety monitoring system, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
and the main database downloads and processes the uploaded data at the back end.
The acquisition end processing module also comprises an encryption module and a compression module.
When the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
and the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B.
In the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to the main database along with the encrypted compressed package.
Time stamp a and time stamp B are specific time values ranging from a fraction of a second.
The main database also comprises a secondary encryption module, a back-end processing module and a random number module.
The main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module can obtain the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C.
The specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, and calculates the value x of (A+B+C)/alpha according to the value of the random number alpha;
c. and carrying out secondary encryption on the received compressed data packet by utilizing a secondary encryption module, wherein the encryption key is x.
The value of the random number α changes along with the increase of the number of the compressed data packets, the random number is reset every day, and after the first random number α is generated every day, a compressed data packet is added every time later, and the secret key x is recalculated, specifically:
1. when the first data packet after each first random number is generated is encrypted, the key is (A+B+C)/alpha;
2. when the second data packet is encrypted, the key is (A+B+C)/(alpha+1);
3. when the third data packet is encrypted, the key is (A+B+C)/(alpha+2);
4. when the nth packet is encrypted, the key is (A+B+C)/(alpha+n).
Example 3
Further, the system may limit the generation of the random number, set a random number Q, randomly generate a new random number α again after the data packet is subjected to Q rounds, and encrypt the data packet based on the newly generated random number α.
On the basis of the above, the data packet transmitted in the system is encrypted for multiple times, the encrypted secret key is related to the content related in the whole data transmission process, the whole relevance is strong, and the secret key matching is needed when the encrypted data packet is read, so that the security of the whole data is not affected when the content of a single link is leaked, and the possibility of data leakage can be greatly reduced.
It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art and which are included in the embodiments of the present invention without the inventive step, are intended to be within the scope of the present invention. Structures, devices and methods of operation not specifically described and illustrated herein, unless otherwise indicated and limited, are implemented according to conventional means in the art.

Claims (1)

1. The utility model provides a data transmission is with safety monitoring system which characterized in that, includes monitoring collection end, collection end processing module, transmission module and the main database that connects gradually through wireless network, wherein:
the monitoring acquisition end is used for acquiring the operation data of the power equipment terminal;
the terminal data collected by the monitoring acquisition end is processed by the acquisition end processing module and uploaded;
the transmission module is used for uploading the data packet processed by the acquisition end processing module to the main database;
the main database downloads and processes the uploaded data at the back end;
the acquisition end processing module also comprises an encryption module and a compression module;
when the acquisition end processing module receives data acquired by the monitoring acquisition end, the acquired data are compressed and packed by the compression module, and then the compressed data packet is digitally encrypted by the encryption module;
the method comprises the steps that in the process of compressing data, an acquisition end processing module obtains the compression time of a data packet and marks the compression time as A;
the acquisition end processing module acquires the encryption time of the data packet in the process of digitally encrypting the data packet, and marks the encryption time as B;
in the process that the transmission module uploads the compressed package encrypted by the acquisition end processing module, the time mark A and the time mark B are uploaded to a main database along with the encrypted compressed package;
the time mark A and the time mark B are specific time values, and the values range from minutes to seconds;
the main database also comprises a secondary encryption module, a back-end processing module and a random number module;
the main database receives the encrypted data packet uploaded by the transmission module, downloads the encrypted data packet, and then carries out back-end processing by using the back-end processing module;
the back-end processing module obtains the time used by the encrypted data packet in the transmission process according to the time stamp information of the encrypted data packet while the main database receives the encrypted data packet, and the time is marked as C;
the specific processing process of the back-end processing module is as follows:
a. extracting a marking time A and a marking time B in the transmission data;
b. the random number module randomly generates a random number alpha, calculates the value x of (A+B+C)/alpha according to the value of the random number alpha,
c. performing secondary encryption on the received compressed data packet by using a secondary encryption module, wherein an encryption key is x;
the value of the random number α changes along with the increase of the number of the compressed data packets, the random number is reset every day, and after the first random number α is generated every day, a compressed data packet is added every time later, and the secret key x is recalculated, specifically:
when the first data packet after each first random number is generated is encrypted, the key is (A+B+C)/alpha:
the second data packet has the key of (A+B+C)/(alpha+1) when encrypting, and the third data packet has the key of (A+B+C)/(alpha+2) when encrypting;
when the nth data packet is encrypted, the key is (A+B+C)/(alpha+n);
the system can limit the generation of random numbers, set a random number Q, randomly generate a new random number alpha again after the data packet is subjected to Q rounds, and encrypt the data packet based on the newly generated random number alpha.
CN202210610790.XA 2022-05-31 2022-05-31 Safety monitoring system for data transmission Active CN115051840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610790.XA CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Publications (2)

Publication Number Publication Date
CN115051840A CN115051840A (en) 2022-09-13
CN115051840B true CN115051840B (en) 2023-11-07

Family

ID=83158661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610790.XA Active CN115051840B (en) 2022-05-31 2022-05-31 Safety monitoring system for data transmission

Country Status (1)

Country Link
CN (1) CN115051840B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140017955A (en) * 2012-08-02 2014-02-12 현대유엔아이 주식회사 Global realtime wireless reefer monitoring system
CN105867245A (en) * 2016-05-14 2016-08-17 东北电力大学 System for monitoring electric power information
CN108768542A (en) * 2018-05-02 2018-11-06 三峡大学 A kind of voice signal quantum encryption communication system based on random number
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium
CN111314469A (en) * 2020-02-20 2020-06-19 国网山东省电力公司宁阳县供电公司 Power equipment remote monitoring system and method based on big data cloud computing
CN114167905A (en) * 2021-12-03 2022-03-11 湖北科技学院 Power station ecological flow monitoring system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140017955A (en) * 2012-08-02 2014-02-12 현대유엔아이 주식회사 Global realtime wireless reefer monitoring system
CN105867245A (en) * 2016-05-14 2016-08-17 东北电力大学 System for monitoring electric power information
CN108768542A (en) * 2018-05-02 2018-11-06 三峡大学 A kind of voice signal quantum encryption communication system based on random number
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium
CN111314469A (en) * 2020-02-20 2020-06-19 国网山东省电力公司宁阳县供电公司 Power equipment remote monitoring system and method based on big data cloud computing
CN114167905A (en) * 2021-12-03 2022-03-11 湖北科技学院 Power station ecological flow monitoring system

Also Published As

Publication number Publication date
CN115051840A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN111797431B (en) Encrypted data anomaly detection method and system based on symmetric key system
CN115174255B (en) Industrial Internet platform data transmission safety protection system
CN112671710A (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN113987525A (en) System data protection method based on block cipher algorithm
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN115051840B (en) Safety monitoring system for data transmission
CN107995616B (en) User behavior data processing method and device
CN112202808A (en) Data security management system based on cloud computing
CN116114280A8 (en) Key management method and communication device
CN114244635B (en) Encryption type data coding method of communication equipment
CN109587155B (en) Wireless vehicle brake test system for guaranteeing information safety
CN112839044B (en) Audio processing method and device
CN113346999B (en) Splitting encryption-based brain central system
CN115347675A (en) Smart power grid data secure access method and system
CN113395174B (en) Terminal fault processing method for remotely controlling Internet of things
CN111490880B (en) File receiving method and device
CN114900365A (en) Innovative service resource data processing and secure interaction method
CN114423001A (en) Decryption method, server and storage medium
CN113536350B (en) Upgrading packet encryption and decryption method and system based on OTA technology
CN108600185A (en) A kind of data security transmission network system and its method
CN113162678B (en) Method, terminal, electronic device and medium for key switching and data transmission
CN112491929B (en) Information security method based on digital feature recognition
CN113747431B (en) Data encryption system and data encryption method of mobile equipment
CN114710671B (en) Distributed energy safety intelligent terminal based on multiple communication modes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant