CN115567311A - Encryption system and encryption method based on data information encryption - Google Patents
Encryption system and encryption method based on data information encryption Download PDFInfo
- Publication number
- CN115567311A CN115567311A CN202211251038.7A CN202211251038A CN115567311A CN 115567311 A CN115567311 A CN 115567311A CN 202211251038 A CN202211251038 A CN 202211251038A CN 115567311 A CN115567311 A CN 115567311A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- unit
- key
- encrypted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides an encryption system based on data information encryption, which comprises: the system comprises a power grid subsystem, an encryption module, a decryption module and a power grid main system; the power grid subsystem comprises a data acquisition unit and a data management unit, wherein the data acquisition unit is used for acquiring power grid data, and the data management unit comprises data compression and data distribution; the encryption module comprises a primary encryption unit, a secondary encryption unit and a sending unit. According to the scheme, the collected power grid data are subjected to shunt transmission, after the shunt transmission, the safe encrypted data are obtained after primary encryption, unique key giving and secondary encryption are sequentially carried out, the safe encrypted data on each layer are interconnected, the safe encrypted data on the next layer can be decrypted by providing the unique key for the safe encrypted data on the previous layer after being decrypted by the decryption module, the key encrypted data cannot be opened when only one layer of data is obtained, and the phenomenon that a large amount of data information is lost when being intercepted is avoided.
Description
Technical Field
The invention relates to the technical field of power grid data information security, in particular to an encryption system and an encryption method based on data information encryption.
Background
In the process of power distribution network management, data information transmission is used as a part of power distribution network automation, and means that modern electronic technology, communication technology, computer and network technology are used for integrating real-time information, off-line information, user information, power grid structure parameters and geographic information of a power distribution network to form a complete automatic management system, so that monitoring, protection, control and power distribution management of a power distribution system under normal operation and accident conditions are realized.
The distribution network automation system comprises a distribution network subsystem and a distribution network main system, wherein the distribution network subsystem acquires data information of each station of a power grid through acquisition equipment and then transmits the data information to the distribution network main system, the distribution network main system processes and processes the received data to provide operation monitoring and control of the power distribution network for dispatching personnel, and the data information is generally required to be encrypted in order to ensure the safety of data transmission.
In order to improve the security of data information sent by a power distribution network and prevent illegal personnel from stealing confidential information of power grid data, various data encryption modes are disclosed in the prior art, but a centralized encryption mode is adopted for encryption processing after data is packaged, and after the data information after encryption processing is intercepted and acquired, although the data information cannot be decrypted quickly, a large amount of data is lost, and hidden dangers are brought to the security management of the data information of the power distribution network.
Therefore, it is necessary to provide an encryption system and an encryption method based on data information encryption to solve the above technical problems.
Disclosure of Invention
The invention provides an encryption system based on data information encryption, which solves the problem of how to reduce the loss of a large amount of power grid data information when the power grid data information is intercepted in the related technology.
In order to solve the above technical problem, the encryption system based on data information encryption provided by the present invention comprises:
the system comprises a power grid subsystem, an encryption module, a decryption module and a power grid main system;
the power grid subsystem comprises a data acquisition unit and a data management unit, wherein the data acquisition unit is used for acquiring power grid data, and the data management unit comprises data compression and data distribution and is used for layering power grid data information to obtain distribution data after layering;
the encryption module comprises a primary encryption unit, a secondary encryption unit and a sending unit, wherein the primary encryption unit comprises encryption of split data and endowment of a key mark, the primary encryption unit is used for the split data and endowment of a unique key to obtain key encrypted data, the secondary encryption unit is used for carrying out secondary encryption on the key encrypted data to obtain safe encrypted data, and the sending unit is used for launching the safe encrypted data;
the decryption module comprises a receiving unit, a secondary decryption unit, a key comparison unit and a primary decryption unit, wherein the receiving unit is used for receiving the safe encrypted data, the secondary decryption unit is used for decrypting the safe encrypted data to obtain primary encrypted data and a unique key, the key comparison unit is used for comparing the decrypted unique key with layered primary encrypted data, and the primary decryption unit is used for decrypting the primary encrypted data through the unique key to obtain shunting data;
and the power grid main system displays and analyzes the shunt data.
Preferably, the power grid subsystem further comprises a data backup unit, which is used for storing and backing up the data acquired by the data acquisition unit.
Preferably, the data compression is used for compressing the collected data to facilitate storage and transportation, and the data shunt is used for layered transmission of the compressed data.
Preferably, the data management unit further includes a data control, where the data control is configured to control the number of layers of the data offloading layered transmission.
Preferably, the encryption of the split stream data performs layered encryption on the split stream data, the split stream data of the previous layer is subjected to primary encryption to obtain primary encrypted data, a unique key is generated, and the unique key is given to the primary encrypted data obtained after the split stream data of the next layer is encrypted by the key mark to form a cyclic key mark.
Preferably, the encryption system based on data information encryption further includes a feedback module, the feedback module is configured to feed back feedback information sent by the grid main system, the feedback information is transmitted to the grid subsystem, and the data control is performed by turning on or off corresponding layered data.
Preferably, the encryption system based on data information encryption further comprises an updating module, wherein the updating module comprises a periodic timing unit and a key updating unit, and is used for periodically updating the unique key.
Preferably, the updating module further comprises a key database for providing a storage and comparison function for the unique key.
Preferably, the updating module further comprises a signal identification unit for identifying a signal of the feedback information, and the key updating unit automatically updates the unique key once when the signal of the feedback information passes through the signal identification unit.
The invention also provides an encryption method based on data information encryption, which comprises the encryption system based on data information encryption, and the encryption method based on data information encryption specifically comprises the following steps:
a shunting encryption process:
a100, data flow is divided in multiple layers, and divided data are obtained;
and A200, carrying out primary encryption on the split-flow data to obtain primary encrypted data, marking the unique key of the next layer of primary encrypted data on the previous layer of primary encrypted data after encryption to form a circulating mark, and obtaining key encrypted data.
A300, packaging the encrypted data of the key and then carrying out secondary encryption to obtain safe encrypted data;
a400, the safety encrypted data are transmitted through communication transmission, and the decryption module receives the safety encrypted data;
a500, the safe encrypted data is firstly subjected to secondary decryption through a decryption module to obtain primary encrypted data and a unique key, the unique key is subjected to primary decryption after comparison, and safe decryption is carried out to obtain shunting data;
a600, displaying and analyzing the decrypted shunting data through a main system;
and (3) key updating flow:
b100, when one layer of safe encrypted data is intercepted, a decryption module can receive the safe encrypted data in the area, the layer of safe encrypted data cannot be received and cannot be displayed, and the upper layer of shunt data can be received and cannot be decrypted and displayed;
b200, the main system transmits the feedback information to the power grid subsystem through a feedback module, and the power grid subsystem is maintained in time;
and B300, while the feedback module transmits the feedback information, the updating module identifies and automatically updates the unique key during the primary encryption of the streaming data.
Compared with the related art, the encryption system based on data information encryption provided by the invention has the following advantages
Has the advantages that:
the collected power grid data are subjected to shunt transmission, after the shunt transmission, the safety encryption data are obtained after primary encryption, unique key giving and secondary encryption in sequence, the safety encryption data of each layer are interconnected, the safety encryption data of the next layer can provide the unique key for the safety encryption data of the previous layer for decryption after being decrypted by the decryption module, when only one layer of data is obtained, the key encryption data cannot be opened, and the phenomenon of loss of a large amount of data information when the data information is intercepted is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
FIG. 1 is a system diagram of a first embodiment of an encryption system based on encryption of data information provided by the present invention;
FIG. 2 is a block diagram of a portion of the grid subsystem shown in FIG. 1;
FIG. 3 is a block diagram of a portion of the data management unit shown in FIG. 2;
FIG. 4 is a block diagram of a portion of the encryption module shown in FIG. 1;
FIG. 5 is a block diagram of a portion of the one-level encryption unit shown in FIG. 4;
FIG. 6 is a block diagram of a portion of the decryption module shown in FIG. 1;
FIG. 7 is a system block diagram of a second embodiment of an encryption system based on encryption of data information provided by the present invention;
FIG. 8 is a block diagram of a portion of the update module shown in FIG. 7;
FIG. 9 is a flowchart of an encryption method for encrypting data information according to the present invention;
fig. 10 is a flowchart of key updating of the encryption method based on data information encryption according to the present invention.
The reference numbers illustrate:
1. the system comprises a power grid subsystem 11, a data acquisition unit 12, a data management unit 121, data compression 122, data distribution 123, data control 13 and a data backup unit;
2. the system comprises an encryption module 21, a primary encryption unit 211, encryption of split data 212, giving of a key mark 22, a secondary encryption unit 23 and a sending unit;
3. the device comprises a decryption module 31, a receiving unit 32, a secondary decryption unit 33, a key comparison unit 34 and a primary decryption unit;
4. a power grid main system;
5. a feedback module;
6. the device comprises an updating module 61, a period timing unit 62, a key updating unit 63, a key database 64 and a signal identification unit.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides an encryption system based on data information encryption.
The first embodiment:
referring to fig. 1 to fig. 6, in a first embodiment of the present invention, an encryption system based on data information encryption includes:
the system comprises a power grid subsystem 1, an encryption module 2, a decryption module 3 and a power grid main system 4;
the power grid subsystem 1 comprises a data acquisition unit 11 and a data management unit 12, wherein the data acquisition unit 11 is used for acquiring power grid data, and the data management unit 12 comprises a data compression unit 121 and a data distribution unit 122, and is used for layering power grid data information and obtaining distribution data after layering;
the encryption module 2 comprises a first-level encryption unit 21, a second-level encryption unit 22 and a sending unit 23, wherein the first-level encryption unit 21 comprises encryption 211 of split data and endowment 212 of a key mark, the first-level encryption and endowment 212 of a unique key are used for splitting data to obtain key encryption data, the second-level encryption unit 22 carries out second-level encryption on the key encryption data to obtain safe encryption data, and the sending unit 23 is used for starting the safe encryption data;
the decryption module 3 comprises a receiving unit 31, a secondary decryption unit 32, a key comparison unit 33 and a primary decryption unit 34, wherein the receiving unit 31 is used for receiving the security encrypted data, the secondary decryption unit 32 is used for decrypting the security encrypted data to obtain primary encrypted data and a unique key, the key comparison unit 33 is used for comparing the decrypted unique key with layered primary encrypted data, and the primary decryption unit 34 is used for decrypting the primary encrypted data through the unique key to obtain split-flow data;
the power grid main system 4 displays and analyzes the shunt data.
Through carrying out the reposition of redundant personnel transmission to the electric wire netting data after gathering, after first grade encryption, only key give and second grade encryption in proper order after the reposition of redundant personnel transmission, obtain safe enciphered data, interconnect between each layer of safe enciphered data, the safe enciphered data of next floor can provide only key for the safe enciphered data of last floor to decrypt after the deciphering of deciphering module 3, when only obtaining one deck data, can't open the key enciphered data, the phenomenon of losing in a large number when having avoided data information to be intercepted.
In this embodiment, the primary encryption unit 21 is configured to initially encrypt the shunt data, generate a unique key after encryption, extract the unique key and use the unique key only once, and automatically delete the key after use regardless of whether the key is unlocked, thereby avoiding unlocking the shunt data after the key is repeatedly tested.
In this embodiment, the decryption module 3 further includes a splitting integration unit, which is configured to integrate the decrypted split data to form complete power distribution network data information, and meanwhile, has a detection function on whether the split data is completely transmitted after being encrypted, so as to facilitate quick identification of the power grid main system 4.
Referring to fig. 2 again, the power grid subsystem 1 further includes a data backup unit 13, configured to store and backup data acquired by the data acquisition unit 11.
Before the data backup unit 13 backs up the data, it needs to perform compression processing of the data compression 121 to reduce the occupied space of the backup data, and after the data information transmission failure is repaired, the integrity of the data information transmission can be maintained through the data information transmitted before the backup data is continued.
Referring to fig. 3, the data compression 121 is used for compressing the collected data to facilitate storage and transportation, and the data splitting 122 is used for layered transmission of the compressed data.
In this embodiment, the data compression 121 not only facilitates storage and backup of data, but also facilitates transmission of data, thereby improving fluency.
In this embodiment, the data distribution 122 performs layered transmission on the collected and compressed data to form layered data, so as to provide support for layered encryption.
Referring to fig. 3 again, the data management unit 12 further includes a data control 123, and the data control 123 is configured to control the number of layers of the layered transmission of the data splitting 122.
In this embodiment, the number of layers of layered transmission is equal to or greater than three, so that the next layer of layered data can assign a unique key to the previous layer of layered data.
Referring to fig. 6 again, the encryption 211 of the split stream data performs layered encryption on the split stream data, the first-level encrypted data is obtained after the first-level encryption of the split stream data in the previous layer, and a unique key is generated, and the giving 212 of the key mark gives the unique key to the first-level encrypted data obtained after the encryption of the split stream data in the next layer, so as to form a circular key mark.
Regarding the encryption of data information:
the data are supposed to form four layers of layered data after being separated, namely data a, data b, data c and data d;
when data a, data b, data c, and data d are subject to encryption 211 of the split data;
performing primary encryption on the data a to obtain primary encrypted data a and a unique key a;
performing primary encryption on the data b to obtain primary encrypted data b and a unique key b;
performing primary encryption on the data c to obtain primary encrypted data c and a unique key c;
performing primary encryption on the data d to obtain primary encrypted data d and a unique key d;
the key mark endowing 212 endows the unique key a of the data a to the primary encrypted data d to obtain key encrypted data a;
the key mark endowing 212 endows the unique key b of the data b to the primary encrypted data a to obtain key encrypted data b;
the key mark endowing 212 endows the unique key c of the data c to the primary encrypted data b to obtain key encrypted data c;
the key mark endowing 212 endows the unique key d of the data d to the primary encrypted data c to obtain key encrypted data d;
obtaining key encryption data a, key encryption data b, key encryption data c and key encryption data d, and sequentially performing secondary encryption to obtain four layers of safe encryption data;
and finally, the safe encryption and transmission of the data collected by the power grid subsystem are realized.
Decryption of data information:
the receiving unit 31 receives the four layers of security encrypted data, and the two-stage decryption unit 32 sequentially performs two-stage decryption on the four layers of security encrypted data to obtain key encrypted data a, key encrypted data b, key encrypted data c and key encrypted data d;
the key comparison unit 33 extracts primary encrypted data a and a unique key b from the key encrypted data a;
the key comparison unit 33 extracts the first-level encrypted data b and the unique key c from the key encrypted data b;
the key comparison unit 33 extracts the first-level encrypted data c and the unique key d from the key encrypted data c;
the key comparison unit 33 extracts the first-level encrypted data d and the unique key a from the key encrypted data d;
the primary decryption unit 34 unlocks the primary encrypted data b through the unique key b;
the primary decryption unit 34 unlocks the primary encrypted data c through the unique key c;
the primary decryption unit 34 unlocks the primary encrypted data d through the unique key d;
the primary decryption unit 34 unlocks the primary encrypted data a through the unique key a;
and finally, acquiring the shunt data, wherein the power grid main system 4 can display the shunt data after receiving the shunt data, and performs centralized analysis and management according to the displayed content.
The second embodiment:
referring to fig. 7 to 8, based on the encryption system based on data information encryption provided by the first embodiment of the present invention, the second embodiment of the present invention provides another encryption system based on data information encryption. The second embodiment is only the preferred mode of the first embodiment, and the implementation of the second embodiment does not affect the implementation of the first embodiment alone.
Specifically, the encryption system based on data information encryption provided in the second embodiment of the present invention is different in that the encryption system based on data information encryption further includes a feedback module 5, where the feedback module 5 is configured to feed back feedback information sent by the grid main system 4, the feedback information is transmitted to the grid subsystem 1, and the data control 123 opens or closes the hierarchical data corresponding to the hierarchy.
When the power grid main system 4 feeds back information, the power grid subsystem 1 closes the corresponding hierarchical data according to the requirement, and prevents the corresponding hierarchical data from being intercepted or stolen.
Referring to fig. 7 and 8 in combination, the encryption system based on data information encryption further includes an updating module 6, and the updating module 6 includes a period timing unit 61 and a key updating unit 62 for periodically updating the unique key.
The method and the device have the advantages that the unique key generated in the first-level encryption process can be conveniently updated, so that the unique key can be updated regularly according to requirements, and a non-fixed key is formed.
Referring again to fig. 8, the update module 6 further includes a key database 63 for providing storage and comparison functions for the unique keys.
In this embodiment, the unique key updated each time is stored in the key database 63, and the uniqueness of the key is determined by key comparison, so as to avoid duplicate keys.
Referring to fig. 8 again, the updating module 6 further includes a signal identification unit 64 for identifying a signal of the feedback information, and the key updating unit 62 automatically updates the unique key once when the signal of the feedback information passes through the signal identification unit 64.
And the unique key is automatically updated once while the transmission of the feedback information is realized.
In the present embodiment, the key update by the feedback information does not conflict with the timing update of the period timing unit 61.
And no matter how the key is updated, as long as the layered data is transmitted, the decryption module can be used for quickly and accurately decrypting, and the smoothness of data transmission is guaranteed.
Regarding the interception of the streaming data:
the four layers of safety encrypted data are transmitted in a layered mode, and when one layer of safety encrypted data is intercepted and stolen, the main power grid system 4 can quickly identify the safety encrypted data;
when the condition that no data input exists in the safety encrypted data channel is identified, the power grid main system 4 transmits information without data input to the power grid subsystem 1 through the feedback module 5;
checking whether the data are normally sent or not through the power grid subsystem 1, if the data are normally sent, closing the transmission of the layer of the safety encrypted data which cannot be received through the data control 123, then restarting the data, and checking whether the data belong to equipment abnormity or not;
when the layer of safe encrypted data is still in a state of being incapable of being received after being restarted, the layer of data transmission is closed, the number of layers of data shunt is reduced, and normal transmission of the data is maintained;
finally, the single-layer safety encrypted data can be quickly fed back and the layered data transmission can be closed after being intercepted, and the data information is prevented from being continuously stolen.
The invention also provides an encryption method based on data information encryption, which comprises the encryption system based on data information encryption, and the encryption method based on data information encryption specifically comprises the following steps:
a shunting encryption process:
a100, data flow is divided in multiple layers, and divided data are obtained;
and A200, carrying out primary encryption on the split-flow data to obtain primary encrypted data, marking the unique key of the next layer of primary encrypted data on the previous layer of primary encrypted data after encryption to form a circulating mark, and obtaining key encrypted data.
A300, packaging the encrypted data of the key and then carrying out secondary encryption to obtain safe encrypted data;
a400, the safety encrypted data are transmitted through communication transmission, and the decryption module receives the safety encrypted data;
a500, the safety encrypted data is preferentially subjected to secondary decryption through a decryption module to obtain primary encrypted data and a unique key, the unique key is compared and then subjected to primary decryption, safety decryption is carried out, and shunt data are obtained;
a600, displaying and analyzing the decrypted shunting data through a main system;
and (3) key updating flow:
b100, when one layer of safe encrypted data is intercepted, the decryption module can receive the safe encrypted data in the area, the layer of safe encrypted data cannot be received and cannot be displayed, and the upper layer of shunt data can be received and cannot be decrypted and displayed;
b200, the main system transmits the feedback information to the power grid subsystem through a feedback module, and the power grid subsystem is maintained in time;
and B300, while the feedback module transmits the feedback information, the updating module identifies and automatically updates the unique key during the primary encryption of the streaming data.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. An encryption system based on data information encryption, comprising:
the system comprises a power grid subsystem, an encryption module, a decryption module and a power grid main system;
the power grid subsystem comprises a data acquisition unit and a data management unit, wherein the data acquisition unit is used for acquiring power grid data, and the data management unit comprises data compression and data distribution and is used for layering power grid data information to obtain distributed data after layering;
the encryption module comprises a primary encryption unit, a secondary encryption unit and a sending unit, wherein the primary encryption unit comprises encryption of split data and endowment of a key mark, the primary encryption unit is used for the split data and endowment of a unique key to obtain key encrypted data, the secondary encryption unit is used for carrying out secondary encryption on the key encrypted data to obtain safe encrypted data, and the sending unit is used for launching the safe encrypted data;
the decryption module comprises a receiving unit, a secondary decryption unit, a key comparison unit and a primary decryption unit, wherein the receiving unit is used for receiving the safe encrypted data, the secondary decryption unit is used for decrypting the safe encrypted data to obtain primary encrypted data and a unique key, the key comparison unit is used for comparing the decrypted unique key with layered primary encrypted data, and the primary decryption unit is used for decrypting the primary encrypted data through the unique key to obtain shunting data;
and the power grid main system displays and analyzes the shunt data.
2. The encryption system based on data information encryption of claim 1, wherein the power grid subsystem further comprises a data backup unit for storing and backing up the data acquired by the data acquisition unit.
3. The encryption system based on data information encryption according to claim 1, wherein the data compression is used for compression of collected data to facilitate storage and transportation, and the data shunt is used for layered transmission of compressed data.
4. The encryption system according to claim 1, wherein the data management unit further comprises a data control for controlling the number of layers of the data split layer transmission.
5. The encryption system based on data information encryption according to claim 1, wherein the encryption of the split stream data performs layered encryption on the split stream data, the first-level encrypted data is obtained after the first-level encryption of the upper-level split stream data, a unique key is generated, and the assignment of the key mark assigns the unique key to the first-level encrypted data obtained after the encryption of the lower-level split stream data, so as to form a circular key mark.
6. The encryption system based on data information encryption according to claim 5, further comprising a feedback module, wherein the feedback module is configured to feed back feedback information sent by the grid main system, the feedback information is transmitted to the grid subsystem, and the data control is performed by turning on or off the hierarchical data corresponding to the hierarchy.
7. The encryption system based on data information encryption according to claim 6, characterized in that the encryption system based on data information encryption further comprises an updating module, and the updating module comprises a periodic timing unit and a key updating unit for periodically updating the unique key.
8. The encryption system according to claim 7, wherein the update module further comprises a key database for providing storage and comparison functions for the unique keys.
9. The encryption system according to claim 8, wherein the update module further comprises a signal identification unit for identifying a signal of the feedback information, and the key update unit automatically updates the unique key once when the signal of the feedback information passes through the signal identification unit.
10. An encryption method based on data information encryption, comprising the encryption system based on data information encryption as claimed in claim 9, characterized in that the encryption method based on data information encryption specifically comprises the following steps:
a shunting encryption process:
a100, data flow is divided in multiple layers, and divided data are obtained;
and A200, carrying out primary encryption on the split-flow data to obtain primary encrypted data, marking the unique key of the next layer of primary encrypted data on the previous layer of primary encrypted data after encryption to form a circulating mark, and obtaining key encrypted data.
A300, packaging the encrypted data of the key and then carrying out secondary encryption to obtain safe encrypted data;
a400, the safety encrypted data are transmitted through communication transmission, and the decryption module receives the safety encrypted data;
a500, the safe encrypted data is firstly subjected to secondary decryption through a decryption module to obtain primary encrypted data and a unique key, the unique key is subjected to primary decryption after comparison, and safe decryption is carried out to obtain shunting data;
a600, displaying and analyzing the decrypted shunting data through a main system;
and (3) key updating flow:
b100, when one layer of safe encrypted data is intercepted, the decryption module can receive the safe encrypted data in the area, the layer of safe encrypted data cannot be received and cannot be displayed, and the upper layer of shunt data can be received and cannot be decrypted and displayed;
b200, the main system transmits the feedback information to the power grid subsystem through a feedback module, and the power grid subsystem is maintained in time;
and B300, while the feedback module transmits the feedback information, the updating module identifies and automatically updates the unique key during the primary encryption of the streaming data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211251038.7A CN115567311B (en) | 2022-10-12 | 2022-10-12 | Encryption system and encryption method based on data information encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211251038.7A CN115567311B (en) | 2022-10-12 | 2022-10-12 | Encryption system and encryption method based on data information encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115567311A true CN115567311A (en) | 2023-01-03 |
CN115567311B CN115567311B (en) | 2023-05-05 |
Family
ID=84744158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211251038.7A Active CN115567311B (en) | 2022-10-12 | 2022-10-12 | Encryption system and encryption method based on data information encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115567311B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072489A1 (en) * | 2009-09-23 | 2011-03-24 | Gilad Parann-Nissany | Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management |
CN103840936A (en) * | 2014-02-28 | 2014-06-04 | 山东量子科学技术研究院有限公司 | Reliable encryption transmission system and method of quantum cryptography network |
CN107483444A (en) * | 2017-08-22 | 2017-12-15 | 北京邮电大学 | A kind of intelligent grid information transmission security protector and safety protecting method |
CN109361668A (en) * | 2018-10-18 | 2019-02-19 | 国网浙江省电力有限公司 | A kind of data trusted transmission method |
CN112989389A (en) * | 2021-04-09 | 2021-06-18 | 国网陕西省电力公司电力科学研究院 | Data security protection method and system |
CN113037478A (en) * | 2021-03-22 | 2021-06-25 | 阿米华晟数据科技(江苏)有限公司 | Quantum key distribution system and method |
CN113434851A (en) * | 2021-06-28 | 2021-09-24 | 国网山东省电力公司电力科学研究院 | Key management method and system based on data acquisition |
CN114422230A (en) * | 2022-01-17 | 2022-04-29 | 广西泛华于成信息科技有限公司 | Information transmission system based on data encryption |
WO2022143798A1 (en) * | 2020-12-30 | 2022-07-07 | 杭州趣链科技有限公司 | Method for verifying cross-chain transaction, and terminal device and readable storage medium |
CN115065533A (en) * | 2022-06-14 | 2022-09-16 | 东北大学 | Information encryption method and system based on key layering |
CN115065555A (en) * | 2022-07-28 | 2022-09-16 | 贵州电网有限责任公司 | Information security processing method and system |
CN115174261A (en) * | 2022-08-02 | 2022-10-11 | 黄博暄 | Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution |
-
2022
- 2022-10-12 CN CN202211251038.7A patent/CN115567311B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072489A1 (en) * | 2009-09-23 | 2011-03-24 | Gilad Parann-Nissany | Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management |
CN103840936A (en) * | 2014-02-28 | 2014-06-04 | 山东量子科学技术研究院有限公司 | Reliable encryption transmission system and method of quantum cryptography network |
CN107483444A (en) * | 2017-08-22 | 2017-12-15 | 北京邮电大学 | A kind of intelligent grid information transmission security protector and safety protecting method |
CN109361668A (en) * | 2018-10-18 | 2019-02-19 | 国网浙江省电力有限公司 | A kind of data trusted transmission method |
WO2022143798A1 (en) * | 2020-12-30 | 2022-07-07 | 杭州趣链科技有限公司 | Method for verifying cross-chain transaction, and terminal device and readable storage medium |
CN113037478A (en) * | 2021-03-22 | 2021-06-25 | 阿米华晟数据科技(江苏)有限公司 | Quantum key distribution system and method |
CN112989389A (en) * | 2021-04-09 | 2021-06-18 | 国网陕西省电力公司电力科学研究院 | Data security protection method and system |
CN113434851A (en) * | 2021-06-28 | 2021-09-24 | 国网山东省电力公司电力科学研究院 | Key management method and system based on data acquisition |
CN114422230A (en) * | 2022-01-17 | 2022-04-29 | 广西泛华于成信息科技有限公司 | Information transmission system based on data encryption |
CN115065533A (en) * | 2022-06-14 | 2022-09-16 | 东北大学 | Information encryption method and system based on key layering |
CN115065555A (en) * | 2022-07-28 | 2022-09-16 | 贵州电网有限责任公司 | Information security processing method and system |
CN115174261A (en) * | 2022-08-02 | 2022-10-11 | 黄博暄 | Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution |
Non-Patent Citations (2)
Title |
---|
Z. WEI-JING: ""A Homomorphic Encryption-Based Privacy Preserving Data Aggregation Scheme for Smart Grid"" * |
尚鹏: "\"智能电网信息安全与隐私保护问题研究\"" * |
Also Published As
Publication number | Publication date |
---|---|
CN115567311B (en) | 2023-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109766673B (en) | Alliance type audio and video copyright block chain system and audio and video copyright chaining method | |
US4206315A (en) | Digital signature system and apparatus | |
CN112800450B (en) | Data storage method, system, device, equipment and storage medium | |
CN105471903A (en) | Method for generating electronic lock activation information and related system, device and unlocking method | |
CN106611452A (en) | Maintenance isolation latching system and method | |
CN114550353B (en) | Intelligent lockset control system of transformer substation | |
CN112699987B (en) | Method and system for monitoring work task by using lock | |
CN110543761A (en) | big data analysis method applied to information security field | |
CN114925141B (en) | Cloud primary automation deployment management system and method based on block chain | |
CN106356066A (en) | Speech recognition system based on cloud computing | |
CN108944784A (en) | The authentication method and system of engine anti-theft unit | |
CN114640517A (en) | Key authorization use method and system | |
CN107968707A (en) | Method and system for classified storage of secret keys | |
CN115567311A (en) | Encryption system and encryption method based on data information encryption | |
CN101118639A (en) | Safety electric national census system | |
CN114299645A (en) | Encryption communication method for padlock of Internet of things | |
CN117390689A (en) | Novel electric power system-based equipment fault inspection log security authentication method | |
CN113382013A (en) | Data mining system based on energy big data | |
CN104821879A (en) | Encryption method in data transfer of electric power system | |
CN108595974B (en) | Quick verification system for electronic product code | |
CN111452834A (en) | GMS system-based vehicle-mounted equipment detection system and method | |
CN110517374A (en) | A kind of goods and materials turnover management system and method | |
CN105491118B (en) | A kind of avionics Ethernet data loading system | |
CN101159733A (en) | Electronic burst event management system | |
CN114741735A (en) | Block chain-based mass offline data trusted storage method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |