Unlock instant, AI-driven research and patent intelligence for your innovation.

Private line encryption authentication system

An encryption authentication and private line technology, applied in the field of communication, can solve problems such as network particularity and interface particularity, achieve safe and smooth data transmission and communication, and solve security and reliability problems

Inactive Publication Date: 2016-12-21
北京国泰网信科技有限公司 +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The data transmission between the master station and the substation will use a dedicated channel and protocol to solve the problem of communication security, but in the process of data transmission, problems such as network particularity, protocol particularity, and interface particularity will arise. In order to solve the above problems, this The invention provides a private line encryption authentication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private line encryption authentication system
  • Private line encryption authentication system
  • Private line encryption authentication system

Examples

Experimental program
Comparison scheme
Effect test

application example 1

[0043] A private line encryption authentication system, comprising: a master station control device 101, a serial port protocol converter, a master station type private line encryption authentication device 102, a substation type private line encryption authentication device 104, a serial port protocol converter, and a substation end control device 105.

[0044] The master station side control device 101 sends scheduling data, and divides the transmission channel for the data; the scheduling data is transmitted to the master station type dedicated line encryption authentication device 102 after data conversion by the serial port protocol converter; the master station type dedicated line encryption authentication device 102 pairs The converted scheduling data is encrypted, and then the encrypted scheduling data is transmitted to the substation-type dedicated line encryption authentication device 104 via the SDH transmission equipment 103; the substation-type dedicated line encryp...

application example 2

[0046] A private line encryption authentication system, comprising: a master station control device 101, a serial port protocol converter, a master station type private line encryption authentication device 102, a substation type private line encryption authentication device 104, a serial port protocol converter, and a substation end control device 105.

[0047] The substation-side control device 105 sends out substation data; the substation data is converted by the serial port protocol converter and then transmitted to the substation-type dedicated line encryption and authentication device 104; the substation-type dedicated line encryption and authentication device 104 encrypts the converted substation data, and then, The encrypted substation data is transmitted to the main station-type dedicated line encryption authentication device 102 via the SDH transmission device 103; the master station-type dedicated line encryption and authentication device 102 decrypts the encrypted su...

application example 3

[0049] A dedicated line encryption authentication system, comprising: master station-side control equipment 101, Modem modem, PCM integrated service access equipment, master station type dedicated line encryption authentication device 102, substation type dedicated line encryption authentication device 104, PCM integrated service access equipment, Modem modem, substation end control equipment 105.

[0050] The control device 101 at the master station side sends out scheduling data, and divides the transmission channel for the data; the scheduling data is demodulated into analog signal data by the Modem modem, and is transmitted to the master station type dedicated line for encryption after data conversion by the PCM integrated service access device The authentication device 102; the master station type private line encryption authentication device 102 encrypts the converted scheduling data, and then transmits the encrypted scheduling data to the substation type dedicated line e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private line encryption authentication system which can comprise a main station end control device, a main station type private line encryption authentication device, a transformer substation type private line encryption authentication device and a transformer substation end control device, wherein the main station type private line encryption authentication device is connected to the main station end control device and is used for encrypting dispatching data, the encrypted dispatching data is transmitted to the transformer substation type private line encryption authentication device via an SDH transmission device, the transformer substation type private line encryption authentication device is connected with the main station type private line encryption authentication device via the SDH transmission device and is used for decrypting the encrypted dispatching data, the dispatching data is transmitted to the transformer substation end control device, and the transformer substation end control device is connected with the transformer substation type private line encryption authentication device and is used for receiving the dispatching data and / or sending out transformer substation data. Via the private line encryption authentication system, safe and smooth data transmission and communication are realized between a main station and a transformer substation, and a problem of safety and reliability in electric power system data transmission is solved.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, relates to a dedicated line encryption authentication system. Background technique [0002] With the development of communication technology and network technology, the development direction of the power industry in the management and control links of dispatching centers, power plants, substations, etc. is gradually developing in the direction of remote control and unattended, which is also an important development direction of industrial control automation, but its The development of informatization relying on traditional network forms also poses new severe challenges to the security, reliability, and real-time performance of power control systems and data networks. Based on the principle of "safe partition, network dedicated line, horizontal isolation, and vertical authentication", the traditional vertical power dispatching network uses power vertical encryption and auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08
Inventor 李欣欧睿白锦龙王潇边晓彬徐剑南
Owner 北京国泰网信科技有限公司