Intelligent distribution terminal security protection method based on asymmetric digital signature authentication

An intelligent power distribution terminal and digital signature technology, applied in electrical components, circuit devices, user identity/authority verification, etc., can solve problems affecting users' safe and reliable power supply, intelligent power distribution terminal attacks, security threats, etc., to reduce attacks risks, good application prospects, and the effect of ensuring operational safety

Inactive Publication Date: 2013-10-23
NANJING NARI GROUP CORP +1
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the acceleration of the country's construction of a strong and smart grid, the construction of medium and low voltage distribution automation systems has developed rapidly. However, due to the characteristics of many points and a wide range of distribution automation systems, not all points in the distribution automation system Using optical fiber for communication, some low- and medium-voltage power distribution automation systems that do not have the conditions for optical fiber communication use public network communication to transmit control commands, and all messages are transmitted in plain text, causing intelligent power distribution terminals to face the risk of attacks from public networks , affecting the safe and reliable power supply to users, and at the same time, there is a risk of intrusion into the main station through the sub-station terminal, resulting in a wider range of security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent distribution terminal security protection method based on asymmetric digital signature authentication
  • Intelligent distribution terminal security protection method based on asymmetric digital signature authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings.

[0022] The security protection method for intelligent power distribution terminals based on asymmetric digital signature authentication of the present invention, according to the actual characteristics of intelligent power distribution terminals, realizes the authentication of asymmetric digital signatures on power distribution terminals. Minor changes to the communication protocol can realize the authentication of the digital signature technology without redefining a new communication protocol, reducing the risk of attacks from the public network, and ensuring the operation safety of the distribution automation system. The intelligent power distribution system of the present invention The terminal security protection method, wherein the CPU hardware of the intelligent power distribution terminal is implemented by a DSP processor based on embedded operating systems such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent distribution terminal security protection method based on asymmetric digital signature authentication. According to the actual characteristics of an intelligent distribution terminal, asymmetric digital signature authentication is realized on the distribution terminal; and the authentication of a digital signature technology can be realized by making small changes on the conventional communication protocols of the conventional distribution automation system without redefining a new communication protocol, namely the authentication of the digital signature technology can be realized by adding a digital signature section and a timestamp security information section of a sending party on the basis of the original standard protocol communication message section. The compatibility with the protocol before renovation is guaranteed, the renovation cost is low, and the method is easy to implement in engineering project construction, so that the risk of the distribution automation system from public network attack is reduced, and the operation security of the distribution automation system is guaranteed; and therefore the method has a good application prospect.

Description

technical field [0001] The invention relates to an intelligent power distribution terminal safety protection method based on asymmetric digital signature authentication, and belongs to the technical field of power systems and automation thereof. Background technique [0002] With the acceleration of the country's construction of a strong and smart grid, the construction of medium and low voltage distribution automation systems has developed rapidly. However, due to the characteristics of many points and a wide range of distribution automation systems, not all points in the distribution automation system Using optical fiber for communication, some low- and medium-voltage power distribution automation systems that do not have the conditions for optical fiber communication use public network communication to transmit control commands, and all messages are transmitted in plain text, causing intelligent power distribution terminals to face the risk of attacks from public networks ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H02J13/00
CPCY04S40/24Y04S40/20
Inventor 张志华周捷曾俊刘明祥刘润苗
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products