An Encryption Method in Power System Data Transfer

A technology for power systems and encryption methods, applied in information technology support systems, electrical components, circuit devices, etc., can solve problems such as security defects and irreparable losses, achieve high security, improve encryption strength and cracking difficulty, security high effect

Active Publication Date: 2018-04-10
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Encryption technology is very important in the transmission of information. Similarly, the security of data transmission between the electromechanical transient simulation system and the electromagnetic transient simulation system is also a major issue. Traditional encryption methods do not receive or send data in real time. The information of data personnel is integrated in the data, which has certain security flaws
Moreover, once the encrypted information is leaked out, no matter how hard it is to remedy it, it is impossible to recover the losses caused by the data leak.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Encryption Method in Power System Data Transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0032] like figure 1 As shown, an encryption method in power system data mobilization includes the following steps:

[0033] When the electromechanical transient simulation system or the electromagnetic transient simulation system serves as the sending end to send data to the other party, the data is divided to generate multiple data blocks.

[0034] Both the electromechanical transient simulation system and the electromagnetic transient simulation system are connected with biometric identification equipment, which is used to collect the voiceprint characteristics and other biological characteristics of the sender. feature, the other biometric features are any one or two of fingerprint features, palmprint features, face features, iris features, keystroke features, and signat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method in power system data mobilization, which comprises the following steps: when sending data to the other party, the sending end divides the data to generate multiple data blocks, collects the voiceprint characteristics and other biological characteristics of the sending person and Quantized into first biometric data, and divided to generate a plurality of first biometric data blocks, the first biometric data is integrated and encrypted with the data blocks, so as to obtain the first ciphertext, the sending end and the receiving end There are also multiple intermediate detectors between the ends, which are used to perform different times of encryption according to the difference in the transmission speed of the first ciphertext, and finally obtain multiple different final ciphertexts that are received by the receiving end. When encrypting, record the relevant Data to provide decryption reference data, the receiving end decrypts to obtain the second biometric data and the decrypted plaintext, and compares the second biometric data with the preset biometric data to determine whether the decrypted plaintext is authentic.

Description

technical field [0001] The invention relates to an encryption method in power system data mobilization. Background technique [0002] Electromagnetic-electromechanical transient hybrid real-time simulation represents the development direction of power system simulation. The AC / DC power grid simulation technology research and development test system based on electromagnetic-electromechanical transient hybrid real-time simulation will provide powerful system support for large power grid security defense. The China Southern Power Grid Technology Center and Tsinghua University jointly undertook the major project of the "Eleventh Five-Year" National Science and Technology Support Plan, and developed the electromagnetic-electromechanical transient hybrid real-time simulation based on the RTDS-digital computing server interface. [0003] In October 2007, the China Southern Power Grid Simulation Laboratory began to design and develop a real-time simulation platform for AC and DC pow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H02J13/00
CPCY04S40/20
Inventor 欧开健梁旭胡云周仲晖李伟毛岚曾勇刚郭琦
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products