Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-side authentication method for power system

An authentication method and power system technology, which is applied in the field of security authentication, can solve problems such as large amount of calculation and hidden safety problems, and achieve the effect of reducing the amount of calculation and improving security

Active Publication Date: 2017-04-19
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +5
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] It can be seen that in this scheme, the generation of public and private keys of nodes is completely determined by the authentication center (AS), which brings hidden dangers to security issues; In the key generation, both parties use bilinear pairing to calculate the session key, which leads to a large amount of overall calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-side authentication method for power system
  • Two-side authentication method for power system
  • Two-side authentication method for power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0036] Such as figure 1 As shown, the embodiment of the present invention provides a power system-oriented two-party authentication method for a wireless communication network, the wireless communication network includes a first communication node and a second communication node, the method includes:

[0037] S1. The first communication node generates the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-side authentication method for a power system, and the method is used for a wireless communication network. The method comprises the steps that a first communication node generates a first public and private key pair as a secret key pair, and generates a part of second secret keys; a second communication node generates a second public key, and generates the second secret key according to the part of second secret keys, wherein the second secret key pair serves as the secret key of the second communication node. Therefore, the method improves the safety of the system.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to a two-party authentication method oriented to an electric power system. Background technique [0002] The application of wireless communication technology and encryption technology in the power grid provides technical support for system state analysis and auxiliary decision-making, making it possible for the power grid to heal itself. The security of the smart grid requires that both the physical and network levels of the system have strong security features and robustness, that is, it can resist attacks to the greatest extent or recover quickly after an attack. The security strategy of the smart grid will include deterrence, prevention, detection, and response to minimize and mitigate the impact on the grid and economic development. [0003] The wireless communication network (wireless communication network, WSN) is an important part of the bottom layer of the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04W12/02H04W12/06H04W12/069
CPCH04L9/0861H04L9/3226H04W12/02H04W12/06Y02D30/70
Inventor 姚继明郭经红王磊周亮张秀杰李炳林张浩缪巍巍韦磊田文锋卜宪德王文革邵奇李垠韬
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More