Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authorization method for offline power trading information system based on rsa public key cryptography

A technology of power information and public key cryptography, which is applied in the transmission system, public key of secure communication, electrical components, etc. It can solve the problems of large security risks, vulnerability to attacks, and low password complexity, and achieves easy implementation and easy The effect of the operation

Inactive Publication Date: 2017-01-11
STATE GRID CORP OF CHINA +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Traditional authorization methods such as password authorization, hardware authorization, and biometric (fingerprint) authorization cannot solve the problem of remote authorization.
For example, password authorization, although remote authorization can be performed, passwords often have low password complexity and are vulnerable to attacks, so the security risks are relatively large, and core decision-making is not authorized; hardware authorization and biometric collection are not limited due to their own limitations. Ability to provision and authorize remotely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authorization method for offline power trading information system based on rsa public key cryptography
  • An authorization method for offline power trading information system based on rsa public key cryptography
  • An authorization method for offline power trading information system based on rsa public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Take the confirmation transaction in electricity transaction as an example:

[0044]After the power transaction declaration of a power generation company is approved, the person in charge of the power generation company A must confirm it. At this time, the person in charge A cannot confirm it in person due to special circumstances, and the trader B of the power generation company has no authority to confirm the transaction. Time is running out. If the transaction cannot be confirmed in time, the power generation company may not be able to complete the transaction and must wait until the next transaction, which will bring greater losses to the power generation company. At this time, only person in charge A can remotely authorize trader B to complete the transaction.

[0045] The person applying for authorization is trader B. After logging into the power trading management system, B submits an application for confirmation of the transaction. The system requires A to autho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of electric power information security, and relates to an RSA public key cryptography based off-line electric power transaction information system authorization method which is applied to remote off-line authorization. According to the method, a client applies for a remote authorization code from a server firstly, the server automatically generates authorization codes with high complexity and provides the authorization code for the client, the client selects one of the authorization codes and stores the authorization code, the authorization code is encrypted by using a private key of the client, all of the authorization codes are encrypted by using a public key of the server and provided for the server; and the server verifies authorization codes submitted by the client, stores all of the authorization codes after the verification is successful, and prompts that the application for the authorization code of the client is successful. The client can carry out remote authorization after receiving the authorization code, and the process of authorization is very simple. According to the method provided by the invention, encrypted transmission for the authorization codes is carried out by adopting an RSA public key method, so that the security of the method is based on an RSA public key system, and security requirements of an electric power information system can be achieved.

Description

technical field [0001] The invention belongs to the field of electric power information security, and relates to an off-line power information system authorization method based on RSA public key cryptography for remote off-line authorization. Background technique [0002] At present, the power trading organization has established its own data information management system, which involves some sensitive data and data, or the authorization of certain orders, which requires the authorization of the supervisor to continue. These authorizations are based on computer software systems. Some systems are more flexible in design and can be authorized at any terminal, while others are more strict and must be authorized at a designated terminal. [0003] If the supervisor is out of office and cannot be authorized at the terminal, then in an emergency, it will be delayed and cause unnecessary losses. Thus, a solution is needed to solve remote offline authorization. [0004] Most termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30
Inventor 王文马超郭琳张洪涛谭翔薛佳兴代勇丁鹏刘大为袁晓鹏
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products