Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for updating and using secret key in power grid SSL VPN

A medium-key, power grid technology, applied in the field of quantum cryptography and communication, can solve problems such as stealing, and achieve the effect of enhancing security and saving costs

Active Publication Date: 2014-01-01
UNIV OF SCI & TECH OF CHINA +2
View PDF2 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, according to the specific needs of the power grid, there is currently no good way to provide it with a secure key. The information between the two parties, especially the control information and some confidential information, is still in danger of being stolen by eavesdroppers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for updating and using secret key in power grid SSL VPN
  • Method for updating and using secret key in power grid SSL VPN
  • Method for updating and using secret key in power grid SSL VPN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0036] In the present invention, the existing SSL VPN protocol is directly used to first establish a secure transmission channel, and then negotiate relevant parameters about the use of the quantum key. Refer to attached figure 2 , the SSL VPN client and server first establish an SSL connection, and then the two parties perform a handshake negotiation. This negotiation includes encryption algorithm selection, quantum key usage form, quantum key survival time and so on. The specific protocol steps of the method of use are as follows:

[0037] (1) The communication parties use the traditional SSL VPN protocol to establish a virtual tunnel. In this step, the original SSL protocol does not need to be modified, and the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for updating and using a secret key in a power grid SSL VPN. The method conducts double network combination on a quantum secret key distribution network and a power system dispatching data network, and aims to apply an unconditionally secure quantum secret key to a power grid in a double network combination mode, and the safety of power data transmission is guaranteed. The specific method that the two networks are combined is provided, three modes that the quantum secret key is applied to the power grid SSL VPN are achieved, and specific communication processes in the network after combination are achieved. The method for updating and using the secret key in the power grid SSL VPN has the advantages of being convenient and practical, saving in cost, and meanwhile capable of enhancing the safety of transmitting data.

Description

technical field [0001] The present invention relates to the fields of communication and quantum cryptography, in particular to a method for updating and using keys in SSL VPN of a power grid. A class of usage methods. Background technique [0002] With the development of business, the scale of power system dispatching data network is getting larger and larger, and there are various types of data that need to be processed. Almost all provinces, cities and towns have established corresponding subnets. An effective communication mechanism is needed between subnets and between subnets and the main station to ensure data security. It not only ensures the confidentiality of information between base stations, but also ensures the isolation between different services and identity authentication between different users. According to this demand, the technology commonly used at present is virtual private network technology (VPN), which establishes virtual tunnels between base stati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 王双周静刘东陈巍银振强黄靖正周政陈希雷煜卿韩正甫郭光灿
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products