CN115065524A - Method for encrypting client side comprehensive energy public information transmission data - Google Patents
Method for encrypting client side comprehensive energy public information transmission data Download PDFInfo
- Publication number
- CN115065524A CN115065524A CN202210654464.9A CN202210654464A CN115065524A CN 115065524 A CN115065524 A CN 115065524A CN 202210654464 A CN202210654464 A CN 202210654464A CN 115065524 A CN115065524 A CN 115065524A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- algorithm
- encrypting
- information transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 40
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012545 processing Methods 0.000 claims abstract description 15
- 230000008569 process Effects 0.000 claims abstract description 9
- 238000013478 data encryption standard Methods 0.000 claims description 13
- 230000003993 interaction Effects 0.000 claims description 8
- 230000005611 electricity Effects 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 3
- 238000004806 packaging method and process Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 3
- 238000005265 energy consumption Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 229910000831 Steel Inorganic materials 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000004568 cement Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- -1 electricity Substances 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 239000004753 textile Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for encrypting client side comprehensive energy public information transmission data, which comprises the steps of encrypting the data in the whole data transmission process; after the data are encrypted, the receiver decrypts the data according to the secret key; wherein, the data encryption processing comprises: judging the encryption level according to the data source and the data type; selecting different encryption methods for encryption processing according to the encryption grades; the different encryption methods comprise a symmetric encryption algorithm and an asymmetric encryption algorithm, and the invention encrypts the service data in the whole process of application, thereby ensuring the reliability of data sources, the accuracy of data transmission, the safety of data information and the privacy of users, and obtaining good effect in practical application.
Description
Technical Field
The invention relates to a method for encrypting client side comprehensive energy public information transmission data, and belongs to the technical field of safety protection.
Background
With the continuous development of economic society of China, the energy production and consumption modes are greatly changed, and the energy industry bears important missions of improving energy efficiency, guaranteeing energy safety, promoting new energy consumption, promoting environmental protection and the like. The traditional energy system construction mainly takes the longitudinal extension of a single system, physical interconnection and information interaction among energy systems are less, and technical, system and market barriers exist among various energy subsystems such as water, electricity, oil, gas and heat.
Under the background, the comprehensive energy service is a comprehensive energy supply and consumption mode which can complement and mutually supplement, coordinate and optimize multiple systems, greatly improve the energy development and use efficiency and improve the renewable energy consumption ratio. The comprehensive energy service starts from meeting the user requirements, promotes the transformation and upgrading of energy supply from products to services, is tightly combined with high and new technologies in other fields, and develops the energy technology and related industries to form a new growth point for upgrading the industry in China.
The comprehensive energy service business covers various energy efficiency customers comprehensively, and mainly comprises an urban complex, a forging industry, a textile industry, a steel industry, a cement plant, a transportation hub, a microelectronic industry, an information industry, schools, hospitals and the like. The service main body is a social user, the main service application is deployed in a public network, the main service application relates to important information such as user privacy information, sensitive data and user files, and the safety protection of the data is particularly important in system application and data transmission.
The prior art lacks a better data transmission method for ensuring the reliability of data sources, the accuracy of data transmission, the safety of data information and the privacy of users.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a method for encrypting the public information transmission data of the comprehensive energy resources at the client side, which is used for encrypting the whole application process of service data, so that the reliability of data sources, the accuracy of data transmission, the safety of data information and the privacy of users are ensured.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
the invention provides a method for encrypting client side comprehensive energy public information transmission data, which comprises the following steps:
carrying out data encryption processing in the whole data transmission process;
after the data are encrypted, the receiver decrypts the data according to the secret key;
wherein, the data encryption processing comprises:
judging the encryption level according to the data source and the data type;
and selecting different encryption methods for encryption processing according to the encryption levels.
Further, the different encryption methods include a symmetric encryption algorithm and an asymmetric encryption algorithm.
Further, the whole process of data transmission comprises one or more of data input, data acquisition, data packaging, data uploading and data interaction.
Further, the data includes: one or more of customer information, equipment information, electricity usage information, energy usage information, building information, and economic weather information.
Further, the symmetric encryption algorithm comprises an AES algorithm, a DES algorithm and a 3DES algorithm, wherein the DES algorithm is a data encryption standard and is suitable for encrypting a large amount of data.
Further, the 3DES algorithm is based on the DES algorithm, and three times of encryption processing are performed on the same data by using three different keys.
Further, the AES algorithm is a block encryption algorithm using 128 blocks of packets, which operate on 4 x 4 byte counts together with 128, 192 or 256 bit keys as inputs.
Further, the asymmetric encryption algorithm comprises an RSA algorithm, a DSA algorithm and an ECC algorithm, wherein the DSA algorithm is a digital signature algorithm and is a standard digital signature standard, and the ECC algorithm is elliptic curve cryptography.
Further, the RSA algorithm is a public key algorithm supporting variable-length keys, and the length of the encrypted file block is variable.
Further, the process of data encryption is subjected to review and audit processing, which includes:
checking the integrity of the transmitted data, and rechecking and checking whether the current encryption modes are matched;
making an auditing scheme for auditing the change of the data transmission security strategy, wherein the auditing scheme comprises changing the data grade, modifying the encryption mode and modifying the encryption algorithm;
and deploying protection measures for channel security configuration, cryptographic algorithm configuration and key management.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a method for encrypting client side comprehensive energy public information transmission data, which encrypts service data in the whole application process, thereby ensuring the reliability of data sources, the accuracy of data transmission, the safety of data information, the privacy of users and obtaining good effect in practical application.
Drawings
FIG. 1 is a diagram of data encryption information provided by an embodiment of the present invention;
fig. 2 is a flow chart of data transmission encryption according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Example 1
The embodiment introduces a method for encrypting client-side energy-integrated public information transmission data, which comprises the following steps:
carrying out data encryption processing in the whole data transmission process;
after the data are encrypted, the receiver decrypts the data according to the secret key;
wherein, the data encryption processing comprises:
judging the encryption level according to the data source and the data type;
and selecting different encryption methods for encryption processing according to the encryption levels.
The method for encrypting the client side comprehensive energy public information transmission data provided by the embodiment specifically relates to the following steps:
data encryption organization construction
A: the data volume is huge and the service is clear based on the client side comprehensive energy information platform. Thereby distinguishing different data encryption service scenes and designing a data encryption group. The method comprises data entry, data acquisition, data packaging, data uploading and data interaction.
B: and the data encryption group personnel manages the data encryption key and is responsible for the whole encryption principle and the encoding work.
Establishment of data encryption system
Public information data encryption of the comprehensive energy information platform at the client side adopts a mode of mixed encryption of symmetric encryption and asymmetric encryption. Symmetric encryption and asymmetric encryption are used according to the encryption level of the data information, respectively.
A: symmetric encryption. The symmetric encryption algorithm used by the client-side comprehensive energy information platform comprises the following steps: AES, DES, 3 DES.
(1) Des (data Encryption standard): the data encryption is standard, the speed is high, and the method is suitable for occasions of encrypting a large amount of data.
(2)3DES (triple DES): based on DES, a block of data is encrypted for three times by three different keys, and the intensity is higher.
(3) Aes (advanced Encryption standard): the advanced encryption standard is the next generation encryption algorithm standard, and has high speed and high security level; AES is a block encryption algorithm using 128 blocks of packets, which operate on 4 x 4 byte tuples, together with 128, 192 or 256 bit keys as inputs.
B: asymmetric encryption. The asymmetric encryption algorithm used by the client-side comprehensive energy information platform comprises the following steps: RSA, DSA, ECC.
(1) RSA: the RSA company invents a public key algorithm supporting variable-length keys, and the length of a file block needing to be encrypted is variable.
(2) Dsa (digital Signature algorithm): the digital signature algorithm is a standard DSS (digital signature standard).
(3) Ecc (ecc) current customers cryptograph): elliptic curve cryptography. Compared with the RSA, the ECC has many absolute advantages, mainly including: the attack resistance is strong. The same key length is many times more robust against attacks. The calculated amount is small, and the processing speed is high. ECC is generally much faster than RSA, DSA. The storage space occupies little space. The key size and system parameters of ECC are much smaller compared to RSA, DSA, meaning that it takes up much less storage space.
Third, data encryption and review
A: and carrying out spot check on the integrity of the transmitted data and carrying out recheck to check whether the current encryption modes are matched.
B: and the auditing scheme for clearly auditing the change of the data transmission security policy comprises changing the data grade, modifying the encryption mode and modifying the encryption algorithm.
C: and deploying protection measures such as channel security configuration, cryptographic algorithm configuration, key management and the like.
The embodiment provides a method for encrypting client side comprehensive energy public information transmission data, which is used for encrypting the whole process of business data application. Therefore, the reliability of data sources, the accuracy of data transmission, the safety of data information and the privacy of users are guaranteed. The client-side integrated energy information platform data interaction content comprises the following steps: the client information, the equipment information, the electricity consumption information, the energy consumption information, the building information, the economic weather and other information are added with data encryption during data transmission interaction, and good effect is achieved in practical application.
The invention is further described below with reference to the accompanying drawings. Data encryption exists throughout the data transmission.
As shown in fig. 2, the present invention comprises the steps of: firstly, data transmission is started from data acquisition, a platform acquires data from different ways, then the data are stored, the data are classified, filed and stored according to a certain classification mode, then the data are uploaded to a platform administrator, and finally data interaction is carried out, wherein the data interaction is embodied as data viewing by a client or the administrator according to the authority of the client or the administrator; and secondly, in the whole business process, a salesman judges the encryption level according to the data source and the data type. And then, selecting symmetric encryption and asymmetric encryption according to the encryption grade. The receiver decrypts the data according to the key.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A method for encrypting client-side integrated energy public information transmission data is characterized by comprising the following steps:
carrying out data encryption processing in the whole data transmission process;
after the data are encrypted, the receiver decrypts the data according to the secret key;
wherein, the data encryption processing comprises:
judging the encryption level according to the data source and the data type;
and selecting different encryption methods for encryption processing according to the encryption levels.
2. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the different encryption methods include a symmetric encryption algorithm and an asymmetric encryption algorithm.
3. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the whole process of the data transmission comprises one or more of data input, data acquisition, data packaging, data uploading and data interaction.
4. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the data includes: one or more of customer information, equipment information, electricity usage information, energy usage information, building information, and economic weather information.
5. The method for encrypting client-side integrated energy common information transmission data according to claim 2, wherein: the symmetric encryption algorithm comprises an AES algorithm, a DES algorithm and a 3DES algorithm, wherein the DES algorithm is a data encryption standard and is suitable for encrypting a large amount of data.
6. The method for encrypting client-side integrated energy common information transmission data according to claim 5, wherein: the 3DES algorithm is based on the DES algorithm, and three times of encryption processing is carried out on the same data by using three different keys.
7. The method for encrypting the client-side integrated energy common information transmission data according to claim 5, wherein: the AES algorithm is a block encryption algorithm using 128 blocks of packets, which operate on 4 x 4 byte groups together with 128, 192 or 256 bit keys as inputs.
8. The method for encrypting client-side integrated energy common information transmission data according to claim 2, wherein: the asymmetric encryption algorithm comprises an RSA algorithm, a DSA algorithm and an ECC algorithm, wherein the DSA algorithm is a digital signature algorithm and is a standard digital signature standard, and the ECC algorithm is elliptic curve cryptography.
9. The method for encrypting client-side integrated energy common information transmission data according to claim 8, wherein: the RSA algorithm is a public key algorithm supporting variable-length keys, and the length of the encrypted file blocks is variable.
10. The method for encrypting client-side integrated energy common information transmission data according to claim 1, wherein: the process of data encryption is checked and audited, which comprises the following steps:
checking the integrity of the transmitted data, and rechecking and checking whether the current encryption modes are matched;
making an auditing scheme for auditing the change of the data transmission security strategy, wherein the auditing scheme comprises changing the data grade, modifying the encryption mode and modifying the encryption algorithm;
and deploying protection measures for channel security configuration, cryptographic algorithm configuration and key management.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210654464.9A CN115065524A (en) | 2022-06-10 | 2022-06-10 | Method for encrypting client side comprehensive energy public information transmission data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210654464.9A CN115065524A (en) | 2022-06-10 | 2022-06-10 | Method for encrypting client side comprehensive energy public information transmission data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115065524A true CN115065524A (en) | 2022-09-16 |
Family
ID=83200810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210654464.9A Pending CN115065524A (en) | 2022-06-10 | 2022-06-10 | Method for encrypting client side comprehensive energy public information transmission data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115065524A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116502251A (en) * | 2023-06-21 | 2023-07-28 | 东方空间技术(山东)有限公司 | Data encryption storage method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028540A1 (en) * | 2014-07-25 | 2016-01-28 | Cheng-Han KO | Multiple encrypting method and system for encrypting a file and/or a protocol |
CN112583833A (en) * | 2020-12-14 | 2021-03-30 | 珠海格力电器股份有限公司 | Data encryption processing method and device, electronic equipment and storage medium |
WO2021120615A1 (en) * | 2019-12-19 | 2021-06-24 | 肖光昱 | Encryption apparatus, encryption system and data encryption method |
CN113190859A (en) * | 2021-04-29 | 2021-07-30 | 湖北央中巨石信息技术有限公司 | Data hierarchical encryption method based on block chain |
CN113271319A (en) * | 2021-07-19 | 2021-08-17 | 广州市威士丹利智能科技有限公司 | Communication data encryption method and system based on block chain |
CN113836558A (en) * | 2021-09-27 | 2021-12-24 | 西安万像电子科技有限公司 | File encryption method, device and file decryption method |
-
2022
- 2022-06-10 CN CN202210654464.9A patent/CN115065524A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160028540A1 (en) * | 2014-07-25 | 2016-01-28 | Cheng-Han KO | Multiple encrypting method and system for encrypting a file and/or a protocol |
WO2021120615A1 (en) * | 2019-12-19 | 2021-06-24 | 肖光昱 | Encryption apparatus, encryption system and data encryption method |
CN112583833A (en) * | 2020-12-14 | 2021-03-30 | 珠海格力电器股份有限公司 | Data encryption processing method and device, electronic equipment and storage medium |
CN113190859A (en) * | 2021-04-29 | 2021-07-30 | 湖北央中巨石信息技术有限公司 | Data hierarchical encryption method based on block chain |
CN113271319A (en) * | 2021-07-19 | 2021-08-17 | 广州市威士丹利智能科技有限公司 | Communication data encryption method and system based on block chain |
CN113836558A (en) * | 2021-09-27 | 2021-12-24 | 西安万像电子科技有限公司 | File encryption method, device and file decryption method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116502251A (en) * | 2023-06-21 | 2023-07-28 | 东方空间技术(山东)有限公司 | Data encryption storage method, device, equipment and storage medium |
CN116502251B (en) * | 2023-06-21 | 2024-04-16 | 东方空间技术(山东)有限公司 | Data encryption storage method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103795523B (en) | Electric bidding document multilamellar encrypting and deciphering system and method for e-bidding | |
US20120134491A1 (en) | Cloud Storage Data Encryption Method, Apparatus and System | |
CN112367342B (en) | Encryption transmission method and system for distributed photovoltaic operation and maintenance data | |
CN101286837B (en) | Message encryption device and method oriented to storage area network | |
CN103414682A (en) | Method for cloud storage of data and system | |
CN103684794A (en) | Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN112511304A (en) | Power data privacy communication method based on hybrid encryption algorithm | |
CN112055022A (en) | High-efficiency and high-security network file transmission double encryption method | |
CN106453391A (en) | Long repeating data encryption and transmission method and system | |
CN111510464A (en) | Epidemic situation information sharing method and system for protecting user privacy | |
CN103731423A (en) | Safe method for repeated data deleting | |
CN103942500A (en) | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption | |
CN102684875B (en) | Security of multicast Agent components and multicast encryption management method | |
CN115065524A (en) | Method for encrypting client side comprehensive energy public information transmission data | |
CN104980269A (en) | Secret key sharing method, device and system | |
CN101908962A (en) | Key management method for integrated avionic system | |
Zhu | Research of hybrid cipher algorithm application to hydraulic information transmission | |
ManJiang et al. | Design of a cloud storage security encryption algorithm for power bidding system | |
CN110489978A (en) | A kind of file encryption-decryption method | |
CN105025032A (en) | Customer management server with encrypted authentication function | |
CN110417819A (en) | A kind of implementation method of efficient cryptographic instant messaging | |
Jin et al. | Design of electricity market big data analysis system based on hybrid encryption and secure transmission | |
Robles et al. | Comparison of encryption schemes as used in communication between SCADA components | |
CN101577022B (en) | Method for encrypting and decrypting CPU card data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |