Quantum key classification providing method for improving electric power data transmission security
A technology of quantum key and power data, applied in the field of high-level provision, can solve the problem of mismatch between the speed of quantum key distribution and business demand, achieve fast encryption and decryption, improve practicability, and achieve simple effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0087] Example 1:
[0088] The power dispatch control center (master station) needs to remotely control the substations, and the key storage capacity in the key memory module is insufficient.
[0089] Step 1: The power dispatching control center (master station) sends the destination station ID, security level requirements, and estimated traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed to be station 1, which is safe The level is 0, and the expected traffic is 1500 bytes.
[0090] Step 2: After receiving the request information, the central key controller knows that this service is remote control communication, which requires the highest security and can accept a delay of less than 10 seconds, and then calculates the requirement based on the estimated traffic usage of this communication. Completing this communication requires a 3000-byte key (including extra overhead and key redundancy) and inquires the remainin...
Example Embodiment
[0097] Example 2:
[0098] The power dispatch control center (master station) needs to remotely control the substations, and the key storage capacity in the key memory module is insufficient.
[0099] Step 1: The power dispatching control center (master station) sends the destination station ID, security level requirements, and estimated traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed to be station 1, which is safe The level is 5, and the estimated traffic is 3000 bytes.
[0100] Step 2: After receiving the request information, the central key controller knows that this service is telemetry communication, which requires high security and can accept a delay of less than 4 seconds, and then calculates it based on the estimated traffic usage of this communication To complete this communication, a 1000-byte key (including extra overhead and key redundancy) is required, and the remaining amount of the key in the su...
Example Embodiment
[0105] Example 3:
[0106] The sub-station responds to the telemetry command from the power dispatching control center (master station), and the key storage capacity in the key memory is sufficient.
[0107] Step 1: The slave station 1 responds to the command request of the power dispatching control center (master station) to send the current line parameter data. The security level of this communication is -1, and the estimated traffic is 5000 bytes. This communication is carried out through a USB cable The request is sent to the terminal key generator.
[0108] Step 2: The terminal key generator receives the request and checks that the quantum key currently used for symmetric encryption has been used for 1 hour and the replacement time (2 hours) has not yet been reached.
[0109] Step 3: The terminal key generator sends an encrypted communication request to the central key controller.
[0110] Step 4: After receiving the information that the central key controller agrees to this encry...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap