Encryption method in data transfer of electric power system

A technology for power systems and encryption methods, applied in information technology support systems, electrical components, circuit devices, etc., can solve problems such as security defects and irreparable losses, achieve high security, improve encryption strength and crack difficulty, security high effect

Active Publication Date: 2015-08-05
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Encryption technology is very important in the transmission of information. Similarly, the security of data transmission between the electromechanical transient simulation system and the electromagnetic transient simulation system is also a major issue. Traditional encryption methods do not receive or send data in real time. The information of data personnel is integrated in the data, which has certain security flaws
Moreover, once the encrypted information is leaked out, no matter how hard it is to remedy it, it is impossible to recover the losses caused by the data leak.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method in data transfer of electric power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0032] Such as figure 1 As shown, an encryption method in power system data mobilization includes the following steps:

[0033] When the electromechanical transient simulation system or the electromagnetic transient simulation system serves as the sending end to send data to the other party, the data is divided to generate multiple data blocks.

[0034] Both the electromechanical transient simulation system and the electromagnetic transient simulation system are connected with biometric identification equipment, which is used to collect the voiceprint characteristics and other biological characteristics of the sender. feature, the other biometric features are any one or two of fingerprint features, palmprint features, face features, iris features, keystroke features, and sig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method in data transfer of an electric power system, which comprises the following steps: when a transmitting end transmits data to an opposite side, dividing the data for generating a plurality of data blocks; acquiring the voiceprint characteristic and other biological characteristic of a transmitter and quantifying to first biological characteristic data, dividing the first biological characteristic data for generating a plurality of first biological characteristic data blocks; integrating the first biological characteristic data with the data blocks and encrypting for obtaining a first cryptograph, wherein a plurality of intermediate detectors are arranged between the transmitting end and the receiving end, the intermediate detectors are used for performing different number of times of encryption according to different transmission speeds of the first cryptograph, thereby finally obtaining a plurality of different final cryptographs for received by the receiving end, wherein related data are recorded in encryption for providing reference data for decryption; performing decryption by the receiving end for obtaining second biological characteristic data and a decrypted plaintext; and comparing the second biological characteristic data with preset biological characteristic data for determining whether the plaintext is reliable.

Description

technical field [0001] The invention relates to an encryption method in power system data mobilization. Background technique [0002] Electromagnetic-electromechanical transient hybrid real-time simulation represents the development direction of power system simulation. The AC / DC power grid simulation technology research and development test system based on electromagnetic-electromechanical transient hybrid real-time simulation will provide powerful system support for large power grid security defense. The China Southern Power Grid Technology Center and Tsinghua University jointly undertook the major project of the "Eleventh Five-Year" National Science and Technology Support Plan, and developed the electromagnetic-electromechanical transient hybrid real-time simulation based on the RTDS-digital computing server interface. [0003] In October 2007, the China Southern Power Grid Simulation Laboratory began to design and develop a real-time simulation platform for AC and DC pow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H02J13/00
CPCY04S40/20
Inventor 欧开健梁旭胡云周仲晖李伟毛岚曾勇刚郭琦
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products