Quantum key classification providing method for improving electric power data transmission security
A technology of quantum key and power data, applied in the field of high-level provision, can solve the problem of mismatch between the speed of quantum key distribution and business demand, achieve fast encryption and decryption, improve practicability, and achieve simple effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0088] The power dispatching control center (master station) needs to remotely control the substations, and the storage capacity of the key in the key memory module is insufficient.
[0089] Step 1: The power dispatching control center (master station) sends the destination substation ID, security level requirements, and expected traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed that substation 1 is secure. The level is 0, and the expected traffic is 1500 bytes.
[0090] Step 2: After the central key controller receives the request information, it knows that this business is a remote communication, which requires the highest security and can accept a delay of less than 10 seconds, and then calculates the required traffic based on the expected traffic usage of this communication. A key of 3000 bytes (including additional overhead and key redundancy) is required to complete this communication, and the remain...
Embodiment 2
[0098] The power dispatching control center (master station) needs to remotely control the substations, and the storage capacity of the key in the key memory module is insufficient.
[0099] Step 1: The power dispatching control center (master station) sends the destination substation ID, security level requirements, and expected traffic of this encrypted communication to the central key controller through a USB cable. In this example, it is assumed that substation 1 is secure. The level is 5, and the expected traffic is 3000 bytes.
[0100] Step 2: After the central key controller receives the request information, it knows that this business is telemetry communication, which requires high security and can accept a delay of less than 4 seconds, and then calculates it based on the expected traffic usage of this communication To complete this communication, a key of 1000 bytes (including additional overhead and key redundancy) is required, and the remaining key of substation 1 i...
Embodiment 3
[0106] The sub-station responds to the telemetry instruction of the electric power dispatching control center (main station), and the storage capacity of the key in the key memory is sufficient.
[0107] Step 1: Substation 1 responds to the instruction request of the power dispatching control center (master station) to send the current line parameter data. The security level of this communication is -1, and the expected traffic is 5000 bytes. The request is sent to the terminal key generator.
[0108] Step 2: The terminal key generator receives the request and checks that the current quantum key used for symmetric encryption has been used for 1 hour and the replacement time (2 hours) has not yet been reached.
[0109] Step 3: The terminal key generator sends an encrypted communication request to the central key controller.
[0110] Step 4: After receiving the information that the central key controller agrees to this encrypted communication, the terminal key generator returns...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com