Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum key classification providing method for improving electric power data transmission security

A technology of quantum key and power data, applied in the field of high-level provision, can solve the problem of mismatch between the speed of quantum key distribution and business demand, achieve fast encryption and decryption, improve practicability, and achieve simple effects

Active Publication Date: 2015-04-01
STATE GRID CORP OF CHINA +3
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of the above-mentioned prior art, the present invention provides a hierarchical quantum key provision method that improves the security of power data transmission. The power system data transmission at the security level provides encryption services that meet its security requirements, greatly improving the practicability of quantum encryption technology in power systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key classification providing method for improving electric power data transmission security
  • Quantum key classification providing method for improving electric power data transmission security
  • Quantum key classification providing method for improving electric power data transmission security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] The power dispatching control center (master station) needs to remotely control the substations, and the storage capacity of the key in the key memory module is insufficient.

[0089] Step 1: The power dispatching control center (master station) sends the destination substation ID, security level requirements, and expected traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed that substation 1 is secure. The level is 0, and the expected traffic is 1500 bytes.

[0090] Step 2: After the central key controller receives the request information, it knows that this business is a remote communication, which requires the highest security and can accept a delay of less than 10 seconds, and then calculates the required traffic based on the expected traffic usage of this communication. A key of 3000 bytes (including additional overhead and key redundancy) is required to complete this communication, and the remain...

Embodiment 2

[0098] The power dispatching control center (master station) needs to remotely control the substations, and the storage capacity of the key in the key memory module is insufficient.

[0099] Step 1: The power dispatching control center (master station) sends the destination substation ID, security level requirements, and expected traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed that substation 1 is secure. The level is 5, and the expected traffic is 3000 bytes.

[0100] Step 2: After the central key controller receives the request information, it knows that this business is telemetry communication, which requires high security and can accept a delay of less than 4 seconds, and then calculates it based on the expected traffic usage of this communication To complete this communication, a key of 1000 bytes (including additional overhead and key redundancy) is required, and the remaining key of substation 1 i...

Embodiment 3

[0106] The sub-station responds to the telemetry instruction of the electric power dispatching control center (main station), and the storage capacity of the key in the key memory is sufficient.

[0107] Step 1: Substation 1 responds to the instruction request of the power dispatching control center (master station) to send the current line parameter data. The security level of this communication is -1, and the expected traffic is 5000 bytes. The request is sent to the terminal key generator.

[0108] Step 2: The terminal key generator receives the request and checks that the current quantum key used for symmetric encryption has been used for 1 hour and the replacement time (2 hours) has not yet been reached.

[0109] Step 3: The terminal key generator sends an encrypted communication request to the central key controller.

[0110] Step 4: After receiving the information that the central key controller agrees to this encrypted communication, the terminal key generator returns...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum key classification providing method for improving electric power data transmission security. The method comprises the following steps that a communication initiating party judges whether a local key length meets the present communication requirement or not; a communication receiving party judges whether the own residual local key length meets the present communication requirements or not after receiving the present communication request; the communication receiving party starts the quantum key encryption communication; the communication initiating party starts the quantum key encryption communication. According to the quantum key classification providing method for improving the electric power data transmission security provided by the invention, while the problem that the quantum key distribution speed is unmatched with the service requirement speed is relieved, an encryption service, which meets the respective security requirements, is provided for data transmission of an electric power system with different security levels, and the practicability of the quantum encryption technology in the electric power system is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of electric power system automation, and in particular relates to a hierarchical provision method of a quantum key for improving the security of power data transmission. Background technique [0002] Distribution management automation is an information collection and processing system that uses modern computers, communication technology and equipment to manage the operation of distribution networks. The data processed by the distribution automation system belongs to the core data of the power industry, so the distribution automation system has high requirements for security. At present, the distribution automation system uses encryption algorithms such as RSA, ElGamal, Rabin, and ECC for communication encryption. In recent years, the rapid development of computer technology has made these encryption methods that rely on computational complexity to ensure security less and less reliable. The development of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L9/0852H04L63/062
Inventor 周静孙咏梅卢利锋焦健
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products