CN115065524A - Method for encrypting client side comprehensive energy public information transmission data - Google Patents

Method for encrypting client side comprehensive energy public information transmission data Download PDF

Info

Publication number
CN115065524A
CN115065524A CN202210654464.9A CN202210654464A CN115065524A CN 115065524 A CN115065524 A CN 115065524A CN 202210654464 A CN202210654464 A CN 202210654464A CN 115065524 A CN115065524 A CN 115065524A
Authority
CN
China
Prior art keywords
data
encryption
algorithm
information transmission
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210654464.9A
Other languages
Chinese (zh)
Inventor
杨斌
仲春林
阮文骏
任禹丞
刘述波
王国际
方超
崔强
张毅恒
钱融
杨杰
石璐
邵恩泽
张航通
陈天欣
杨子跃
郑安宁
张凡
姚鹏
王子涵
姜宇轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Original Assignee
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Jiangsu Electric Power Co Ltd, Jiangsu Fangtian Power Technology Co Ltd filed Critical State Grid Jiangsu Electric Power Co Ltd
Priority to CN202210654464.9A priority Critical patent/CN115065524A/en
Publication of CN115065524A publication Critical patent/CN115065524A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种客户侧综合能源公共信息传输数据加密的方法,包括在数据传输的整个过程中进行数据加密处理;数据加密处理后,接收方根据密钥解密数据;其中,数据加密处理包括:根据数据来源、数据类型进行加密等级判定;根据加密等级选择不同的加密方法进行加密处理;所述不同的加密方法包括对称加密算法和非对称加密算法,本发明通过对业务数据应用全过程进行加密,从而保证数据来源的可靠性、数据传输的准确性、数据信息的安全性、保证用户隐私,在实际应用中取得了良好效果。

Figure 202210654464

The invention discloses a method for encrypting data in the transmission of comprehensive energy public information on the client side, which includes performing data encryption processing in the whole process of data transmission; after the data encryption processing, the receiver decrypts the data according to a key; wherein, the data encryption processing includes: : determine the encryption level according to the data source and data type; select different encryption methods to perform encryption processing according to the encryption level; the different encryption methods include symmetric encryption algorithms and asymmetric encryption algorithms, and the present invention applies the whole process to the business data. Encryption, thereby ensuring the reliability of data sources, the accuracy of data transmission, the security of data information, and ensuring user privacy, has achieved good results in practical applications.

Figure 202210654464

Description

一种客户侧综合能源公共信息传输数据加密的方法A method for data encryption of client-side integrated energy public information transmission

技术领域technical field

本发明涉及一种客户侧综合能源公共信息传输数据加密的方法,属于安全防护技术领域。The invention relates to a method for encrypting data of client-side integrated energy public information transmission, and belongs to the technical field of security protection.

背景技术Background technique

随着我国经济社会持续发展,能源生产和消费模式正在发生重大转变,能源产业肩负着提高能源效率、保障能源安全、促进新能源消纳和推动环境保护等重要使命。传统能源系统建设以单一系统的纵向延伸为主,能源系统间物理互联和信息交互较少,水、电、油、气、热等多种能源子系统间存在技术、体制和市场壁垒。With the continuous development of my country's economy and society, the energy production and consumption patterns are undergoing major changes. The energy industry shoulders important missions such as improving energy efficiency, ensuring energy security, promoting new energy consumption and promoting environmental protection. The traditional energy system construction is mainly based on the vertical extension of a single system. There are few physical interconnections and information exchanges between energy systems. There are technical, institutional and market barriers among various energy subsystems such as water, electricity, oil, gas, and heat.

在这种背景下,综合能源服务,一种能够互补互济、多系统协调优化、大幅度提升能源开发使用效率、提高可再生能源消纳比例的综合能源供应和消费模式孕育而生。综合能源服务从满足用户需求出发,推动能源供应从产品向服务转型升级,并同其他领域高新技术紧密结合,将助力把能源技术及其关联产业培育成带动我国产业升级的新增长点。In this context, comprehensive energy services, a comprehensive energy supply and consumption model that can complement each other, coordinate and optimize multiple systems, greatly improve the efficiency of energy development and use, and increase the proportion of renewable energy consumption, were born. The comprehensive energy service starts from meeting the needs of users, promotes the transformation and upgrading of energy supply from products to services, and is closely integrated with high-tech in other fields, which will help to cultivate energy technology and its related industries into new growth points that drive my country's industrial upgrading.

综合能源服务业务全面覆盖各类能效客户,主要包括城市综合体、锻造行业、纺织行业、钢铁行业、水泥厂、交通枢纽、微电子、信息产业、学校、医院等。服务主体是社会化用户,主要服务应用部署在公网,涉及用户自身隐私信息、敏感数据、用户档案等属于重要信息,在系统应用、数据传输时,数据的安全防护尤其重要。The comprehensive energy service business covers all types of energy efficiency customers, mainly including urban complexes, forging industry, textile industry, steel industry, cement plant, transportation hub, microelectronics, information industry, schools, hospitals, etc. The main body of the service is the socialized user, and the main service application is deployed on the public network, which involves the user's own private information, sensitive data, user files and other important information. In the system application and data transmission, data security protection is particularly important.

现有技术缺乏一种较好的用来保证数据来源的可靠性、数据传输的准确性、数据信息的安全性、保证用户隐私的数据传输方法。The prior art lacks a better data transmission method for ensuring the reliability of data sources, the accuracy of data transmission, the security of data information, and the privacy of users.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于克服现有技术中的不足,提供一种客户侧综合能源公共信息传输数据加密的方法,对业务数据应用全过程进行加密,从而保证数据来源的可靠性、数据传输的准确性、数据信息的安全性、保证用户隐私。The purpose of the present invention is to overcome the deficiencies in the prior art, and to provide a method for encrypting the transmission data of comprehensive energy public information on the client side, which encrypts the entire process of application of business data, thereby ensuring the reliability of data sources and the accuracy of data transmission. , data information security, to ensure user privacy.

为达到上述目的,本发明是采用下述技术方案实现的:To achieve the above object, the present invention adopts the following technical solutions to realize:

本发明提供了一种客户侧综合能源公共信息传输数据加密的方法,包括:The present invention provides a method for encrypting the transmission data of integrated energy public information on the client side, including:

在数据传输的整个过程中进行数据加密处理;Encrypt data during the entire process of data transmission;

数据加密处理后,接收方根据密钥解密数据;After the data is encrypted, the receiver decrypts the data according to the key;

其中,数据加密处理包括:Among them, the data encryption processing includes:

根据数据来源、数据类型进行加密等级判定;Determine the encryption level according to the data source and data type;

根据加密等级选择不同的加密方法进行加密处理。According to the encryption level, choose different encryption methods for encryption processing.

进一步的,所述不同的加密方法包括对称加密算法和非对称加密算法。Further, the different encryption methods include symmetric encryption algorithms and asymmetric encryption algorithms.

进一步的,所述数据传输的整个过程包括数据录入、数据采集、数据打包、数据上送、数据交互中的一种或多种。Further, the entire process of data transmission includes one or more of data entry, data collection, data packaging, data upload, and data interaction.

进一步的,所述数据包括:客户信息、设备信息、用电信息、用能信息、建筑信息以及经济气象信息汇总的一种或多种。Further, the data includes one or more of: customer information, equipment information, electricity consumption information, energy consumption information, building information and economic weather information.

进一步的,所述对称加密算法包括AES算法、DES算法和3DES算法,其中,所述DES算法为一种数据加密标准,适用于加密大量数据。Further, the symmetric encryption algorithm includes the AES algorithm, the DES algorithm and the 3DES algorithm, wherein the DES algorithm is a data encryption standard suitable for encrypting a large amount of data.

进一步的,所述3DES算法为基于DES算法,对同一数据用三个不同的密钥进行三次加密处理。Further, the 3DES algorithm is based on the DES algorithm, and the same data is encrypted three times with three different keys.

进一步的,所述AES算法是一个使用128为分组块的分组加密算法,分组块和128、192或256位的密钥一起作为输入,对4×4的字节数组上进行操作。Further, the AES algorithm is a block encryption algorithm using a block of 128, and the block and a key of 128, 192 or 256 bits are used as input, and operations are performed on a 4×4 byte array.

进一步的,所述非对称加密算法包括RSA算法、DSA算法、ECC算法,其中,所述DSA算法为数字签名算法,是一种标准的数字签名标准,ECC算法为椭圆曲线密码编码学。Further, the asymmetric encryption algorithm includes RSA algorithm, DSA algorithm, and ECC algorithm, wherein the DSA algorithm is a digital signature algorithm, which is a standard digital signature standard, and the ECC algorithm is elliptic curve cryptography.

进一步的,所述RSA算法是一个支持变长密钥的公共密钥算法,其加密的文件块的长度可变。Further, the RSA algorithm is a public key algorithm that supports a variable length key, and the length of the encrypted file block is variable.

进一步的,对数据加密的处理过程进行复查审核处理,包括:Further, review and review the processing of data encryption, including:

抽查传输数据的完整性、复查审核当前加密方式是否匹配;Randomly check the integrity of the transmitted data, and review whether the current encryption method matches;

制定对数据传输安全策略的变更进行审核的审核方案,包括更改数据等级、修改加密方式、修改加密算法;Formulate an audit plan for auditing changes to data transmission security policies, including changing data levels, modifying encryption methods, and modifying encryption algorithms;

部署对通道安全配置、密码算法配置、密钥管理的保护措施。Deploy protection measures for channel security configuration, cryptographic algorithm configuration, and key management.

与现有技术相比,本发明所达到的有益效果:Compared with the prior art, the beneficial effects achieved by the present invention:

本发明提供一种客户侧综合能源公共信息传输数据加密的方法,通过对业务数据应用全过程进行加密,从而保证数据来源的可靠性、数据传输的准确性、数据信息的安全性、保证用户隐私,在实际应用中取得了良好效果。The present invention provides a method for encrypting the data transmission data of integrated energy public information on the client side. By encrypting the whole process of business data application, the reliability of data source, the accuracy of data transmission, the security of data information and the privacy of users are ensured. , and achieved good results in practical applications.

附图说明Description of drawings

图1是本发明实施例提供的数据加密信息图;Fig. 1 is a data encryption information diagram provided by an embodiment of the present invention;

图2是本发明实施例提供的数据传输加密流程图。FIG. 2 is a flowchart of data transmission encryption provided by an embodiment of the present invention.

具体实施方式Detailed ways

下面结合附图对本发明作进一步描述。以下实施例仅用于更加清楚地说明本发明的技术方案,而不能以此来限制本发明的保护范围。The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and cannot be used to limit the protection scope of the present invention.

实施例1Example 1

本实施例介绍一种客户侧综合能源公共信息传输数据加密的方法,包括:This embodiment introduces a method for encrypting data transmitted by a client-side integrated energy public information, including:

在数据传输的整个过程中进行数据加密处理;Encrypt data during the entire process of data transmission;

数据加密处理后,接收方根据密钥解密数据;After the data is encrypted, the receiver decrypts the data according to the key;

其中,数据加密处理包括:Among them, the data encryption processing includes:

根据数据来源、数据类型进行加密等级判定;Determine the encryption level according to the data source and data type;

根据加密等级选择不同的加密方法进行加密处理。According to the encryption level, choose different encryption methods for encryption processing.

本实施例提供的客户侧综合能源公共信息传输数据加密的方法,其应用过程具体涉及如下步骤:The application process of the method for encrypting the transmission data of integrated energy public information on the client side provided by this embodiment specifically involves the following steps:

①数据加密组织建设①Data encryption organization construction

A:基于客户侧综合能源类信息化平台数据量庞大、业务分明。由此区分不同数据加密业务场景设计数据加密小组。包括数据录入、数据采集、数据打包、数据上送、数据交互。A: Based on the customer-side comprehensive energy information platform, the data volume is huge and the business is clear. Therefore, design a data encryption team to distinguish different data encryption business scenarios. Including data entry, data collection, data packaging, data upload, data interaction.

B:数据加密小组人员管理数据加密密钥,负责整体的加密原则和编码工作。B: The data encryption team members manage the data encryption keys and are responsible for the overall encryption principles and coding.

②数据加密制度建立②Establishment of data encryption system

客户侧综合能源类信息化平台公共信息数据加密采用对称加密与非对称加密混合加密的方式。按照数据信息的加密等级分别使用对称加密和不对称加密。The public information data encryption of the comprehensive energy information platform on the client side adopts a hybrid encryption method of symmetric encryption and asymmetric encryption. According to the encryption level of data information, symmetric encryption and asymmetric encryption are used respectively.

A:对称加密。客户侧综合能源类信息化平台使用的对称加密算法有:AES、DES、3DES。A: Symmetric encryption. The symmetric encryption algorithms used by the integrated energy information platform on the client side include: AES, DES, and 3DES.

(1)DES(Data Encryption Standard):数据加密标准,速度较快,适用于加密大量数据的场合。(1) DES (Data Encryption Standard): Data encryption standard, fast, suitable for encrypting a large amount of data.

(2)3DES(Triple DES):是基于DES,对一块数据用三个不同的密钥进行三次加密,强度更高。(2) 3DES (Triple DES): Based on DES, a piece of data is encrypted three times with three different keys, with higher strength.

(3)AES(Advanced Encryption Standard):高级加密标准,是下一代的加密算法标准,速度快,安全级别高;AES是一个使用128为分组块的分组加密算法,分组块和128、192或256位的密钥一起作为输入,对4×4的字节数组上进行操作。(3) AES (Advanced Encryption Standard): Advanced Encryption Standard, is the next-generation encryption algorithm standard with fast speed and high security level; AES is a block encryption algorithm that uses 128 as the block, and the block and 128, 192 or 256 The bits of the key are taken together as input to operate on a 4x4 byte array.

B:非对称加密。客户侧综合能源类信息化平台使用的非对称加密算法有:RSA、DSA、ECC。B: Asymmetric encryption. The asymmetric encryption algorithms used by the client-side comprehensive energy information platform are: RSA, DSA, and ECC.

(1)RSA:由RSA公司发明,是一个支持变长密钥的公共密钥算法,需要加密的文件块的长度也是可变的。(1) RSA: Invented by RSA, it is a public key algorithm that supports variable length keys, and the length of the file block to be encrypted is also variable.

(2)DSA(Digital Signature Algorithm):数字签名算法,是一种标准的DSS(数字签名标准)。(2) DSA (Digital Signature Algorithm): Digital Signature Algorithm, which is a standard DSS (Digital Signature Standard).

(3)ECC(Elliptic Curves Cryptography):椭圆曲线密码编码学。ECC和RSA相比,具有多方面的绝对优势,主要有:抗攻击性强。相同的密钥长度,其抗攻击性要强很多倍。计算量小,处理速度快。ECC总的速度比RSA、DSA要快得多。存储空间占用小。ECC的密钥尺寸和系统参数与RSA、DSA相比要小得多,意味着它所占的存贮空间要小得多。(3) ECC (Elliptic Curves Cryptography): Elliptic Curve Cryptography. Compared with RSA, ECC has absolute advantages in many aspects, mainly including: strong anti-attack. With the same key length, its attack resistance is many times stronger. The calculation amount is small and the processing speed is fast. The overall speed of ECC is much faster than that of RSA and DSA. Small storage space usage. Compared with RSA and DSA, the key size and system parameters of ECC are much smaller, which means that it occupies much smaller storage space.

③数据加密复查审核③Data encryption review and audit

A:抽查传输数据的完整性、复查审核当前加密方式是否匹配。A: Randomly check the integrity of the transmitted data, and review whether the current encryption method matches.

B:明确对数据传输安全策略的变更进行审核的审核方案,包括更改数据等级、修改加密方式、修改加密算法。B: A clear audit plan for auditing changes to data transmission security policies, including changing data levels, modifying encryption methods, and modifying encryption algorithms.

C:部署对通道安全配置、密码算法配置、密钥管理等保护措施。C: Deploy protection measures such as channel security configuration, cryptographic algorithm configuration, and key management.

本实施例提供一种客户侧综合能源公共信息传输数据加密的方法,利用该方法对业务数据应用全过程进行加密。从而保证数据来源的可靠性、数据传输的准确性、数据信息的安全性、保证用户隐私。客户侧综合能源类信息化平台数据交互内容包括:客户信息、设备信息、用电信息、用能信息、建筑信息以及经济气象等其他信息,在数据传输交互时增加数据加密,在实际应用中取得了良好效果。The present embodiment provides a method for encrypting the transmission data of integrated energy public information on the client side, and the method is used to encrypt the whole process of application of business data. In order to ensure the reliability of data sources, the accuracy of data transmission, the security of data information, and ensure user privacy. The data interaction content of the customer-side comprehensive energy information platform includes: customer information, equipment information, electricity consumption information, energy consumption information, building information, economic weather and other information. Data encryption is added during data transmission and interaction, and it can be obtained in practical applications. good effect.

下面结合附图对本发明作进一步描述。数据加密存在于整个数据传输的过程中。The present invention will be further described below in conjunction with the accompanying drawings. Data encryption exists throughout the data transmission process.

如图2所示,本发明包括以下步骤:①数据传输从数据采集开始,平台从不同的途径获取数据,之后数据存储,数据按照一定的分类方式进行分类建档存储数据,然后数据上送,上送至平台管理员处,最后为数据交互,此处体现为客户或者管理员依据自己权限进行数据查看;②在整个业务流程中,业务员根据数据来源、数据类型进行加密等级判定。再根据加密等级选择对称加密和不对称加密。接收方根据密钥解密数据。As shown in Figure 2, the present invention includes the following steps: 1. data transmission starts from data collection, the platform obtains data from different ways, and then the data is stored, the data is classified and archived according to a certain classification method, and then the data is uploaded, It is sent to the platform administrator, and finally is the data interaction, which is reflected in the customer or administrator viewing the data according to their own authority; ② In the entire business process, the salesperson determines the encryption level according to the data source and data type. Then choose symmetric encryption and asymmetric encryption according to the encryption level. The receiver decrypts the data according to the key.

以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明技术原理的前提下,还可以做出若干改进和变形,这些改进和变形也应视为本发明的保护范围。The above are only the preferred embodiments of the present invention. It should be pointed out that for those skilled in the art, without departing from the technical principle of the present invention, several improvements and modifications can also be made. These improvements and modifications It should also be regarded as the protection scope of the present invention.

Claims (10)

1. A method for encrypting client-side integrated energy public information transmission data is characterized by comprising the following steps:
carrying out data encryption processing in the whole data transmission process;
after the data are encrypted, the receiver decrypts the data according to the secret key;
wherein, the data encryption processing comprises:
judging the encryption level according to the data source and the data type;
and selecting different encryption methods for encryption processing according to the encryption levels.
2. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the different encryption methods include a symmetric encryption algorithm and an asymmetric encryption algorithm.
3. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the whole process of the data transmission comprises one or more of data input, data acquisition, data packaging, data uploading and data interaction.
4. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the data includes: one or more of customer information, equipment information, electricity usage information, energy usage information, building information, and economic weather information.
5. The method for encrypting client-side integrated energy common information transmission data according to claim 2, wherein: the symmetric encryption algorithm comprises an AES algorithm, a DES algorithm and a 3DES algorithm, wherein the DES algorithm is a data encryption standard and is suitable for encrypting a large amount of data.
6. The method for encrypting client-side integrated energy common information transmission data according to claim 5, wherein: the 3DES algorithm is based on the DES algorithm, and three times of encryption processing is carried out on the same data by using three different keys.
7. The method for encrypting the client-side integrated energy common information transmission data according to claim 5, wherein: the AES algorithm is a block encryption algorithm using 128 blocks of packets, which operate on 4 x 4 byte groups together with 128, 192 or 256 bit keys as inputs.
8. The method for encrypting client-side integrated energy common information transmission data according to claim 2, wherein: the asymmetric encryption algorithm comprises an RSA algorithm, a DSA algorithm and an ECC algorithm, wherein the DSA algorithm is a digital signature algorithm and is a standard digital signature standard, and the ECC algorithm is elliptic curve cryptography.
9. The method for encrypting client-side integrated energy common information transmission data according to claim 8, wherein: the RSA algorithm is a public key algorithm supporting variable-length keys, and the length of the encrypted file blocks is variable.
10. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the process of data encryption is checked and audited, which comprises the following steps:
checking the integrity of the transmitted data, and rechecking and checking whether the current encryption modes are matched;
making an auditing scheme for auditing the change of the data transmission security strategy, wherein the auditing scheme comprises changing the data grade, modifying the encryption mode and modifying the encryption algorithm;
and deploying protection measures for channel security configuration, cryptographic algorithm configuration and key management.
CN202210654464.9A 2022-06-10 2022-06-10 Method for encrypting client side comprehensive energy public information transmission data Pending CN115065524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210654464.9A CN115065524A (en) 2022-06-10 2022-06-10 Method for encrypting client side comprehensive energy public information transmission data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210654464.9A CN115065524A (en) 2022-06-10 2022-06-10 Method for encrypting client side comprehensive energy public information transmission data

Publications (1)

Publication Number Publication Date
CN115065524A true CN115065524A (en) 2022-09-16

Family

ID=83200810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210654464.9A Pending CN115065524A (en) 2022-06-10 2022-06-10 Method for encrypting client side comprehensive energy public information transmission data

Country Status (1)

Country Link
CN (1) CN115065524A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502251A (en) * 2023-06-21 2023-07-28 东方空间技术(山东)有限公司 Data encryption storage method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160028540A1 (en) * 2014-07-25 2016-01-28 Cheng-Han KO Multiple encrypting method and system for encrypting a file and/or a protocol
CN112583833A (en) * 2020-12-14 2021-03-30 珠海格力电器股份有限公司 Data encryption processing method and device, electronic equipment and storage medium
WO2021120615A1 (en) * 2019-12-19 2021-06-24 肖光昱 Encryption apparatus, encryption system and data encryption method
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain
CN113271319A (en) * 2021-07-19 2021-08-17 广州市威士丹利智能科技有限公司 Communication data encryption method and system based on block chain
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160028540A1 (en) * 2014-07-25 2016-01-28 Cheng-Han KO Multiple encrypting method and system for encrypting a file and/or a protocol
WO2021120615A1 (en) * 2019-12-19 2021-06-24 肖光昱 Encryption apparatus, encryption system and data encryption method
CN112583833A (en) * 2020-12-14 2021-03-30 珠海格力电器股份有限公司 Data encryption processing method and device, electronic equipment and storage medium
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain
CN113271319A (en) * 2021-07-19 2021-08-17 广州市威士丹利智能科技有限公司 Communication data encryption method and system based on block chain
CN113836558A (en) * 2021-09-27 2021-12-24 西安万像电子科技有限公司 File encryption method, device and file decryption method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502251A (en) * 2023-06-21 2023-07-28 东方空间技术(山东)有限公司 Data encryption storage method, device, equipment and storage medium
CN116502251B (en) * 2023-06-21 2024-04-16 东方空间技术(山东)有限公司 Data encryption storage method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
Rezai et al. Key management issue in SCADA networks: A review
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
US20120134491A1 (en) Cloud Storage Data Encryption Method, Apparatus and System
CN107734021A (en) block chain data uploading method, system, computer system and storage medium
CN107135061B (en) A Distributed Privacy Preserving Machine Learning Method Under 5G Communication Standard
CN105488422A (en) Homomorphically encrypted private data protection based editing distance calculation system
CN109688143B (en) A privacy-preserving clustering data mining method in cloud environment
CN105187425B (en) Facing cloud calculus communication system safety without certificate thresholding decryption method
Anwar et al. Message transmission based on DNA cryptography
CN113114454B (en) Efficient privacy outsourcing k-means clustering method
CN100561449C (en) A hard disk sector-level data encryption and decryption method and system
CN103607278A (en) A Safe Data Cloud Storage Method
CN104994069A (en) Cloud-storage data integrity proving method based on data repeatability verification
CN111510464A (en) Epidemic situation information sharing method and system for protecting user privacy
CN109120399A (en) A kind of data ciphering method based on asymmetric encryption, decryption method and system
CN117034287A (en) Multiparty joint modeling safety enhancement method based on privacy computing interconnection and interworking technology
CN118041684A (en) Federal prediction method for regional taxi order demands
CN115065524A (en) Method for encrypting client side comprehensive energy public information transmission data
CN114580011B (en) Electric power facility security situation sensing method and system based on federal privacy training
CN115037479A (en) Client side comprehensive energy public information data storage protection method
CN109302282A (en) A method for sending business secrets based on data encryption technology
CN104113543A (en) Block cipher based message authentication method
Yin et al. Two-step efficient quantum dialogue with three-particle entangled W state
CN112215719A (en) Garden plant growth information traceability method based on block chain
Liu et al. Blockchain data anti-counterfeiting sharing model of Power Material Alliance based on attribute-based encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220916