Supercharge Your Innovation With Domain-Expert AI Agents!

A security processing method for substation secondary sharing information

A technology for sharing information and safe processing, applied in the safe processing of secondary shared information in substations, and in the field of safe transmission of data in substations, it can solve information security problems, hidden dangers of tampering, and redundant information in transmission channels. , to achieve the effect of ensuring safety

Active Publication Date: 2020-09-01
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The SCADA system in the smart substation gathers a large amount of data information. In the information transmission, if transparent transmission is adopted, there will be information security issues and hidden dangers of tampering
If all the transmitted information is encrypted, the complexity of calculation will be increased, the overall performance of the system will be reduced, and a lot of redundant information will be added to the transmission channel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security processing method for substation secondary sharing information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solution of the present invention will be described in further detail below in combination with specific examples according to the drawings in the description.

[0031] Such as figure 1 Shown is a schematic diagram of a security processing method for substation secondary sharing information of the present invention, and the security processing method for substation secondary sharing information based on a fast encryption and decryption algorithm specifically includes the following steps:

[0032] (1) Classify the secondary shared information in the substation SCADA system according to the application subsystem to generate subsystem data;

[0033] (2) Extract information from the application subsystem data to generate a key;

[0034] (3) Generate ciphertext according to the key and subsystem data;

[0035] (4) Send data into the transmission system;

[0036] (5) The receiving end receives data from the transmission system and identifies various applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe processing method for secondary sharing information of a transformer station on the basis of a rapid encryption and decryption algorithm. Secondary sharing information in an SCADA system is classified, different sub application systems are mapped, characteristic information is extracted from the sub application systems and serves as a secret key, part of data is encrypted and decrypted rapidly in the data transmission process, and the safety of data transmission and access are ensured. The method can be used to improve the safe processing speed of the secondary sharing information of the transformer station, the data processing performance of the SCADA system is improved, and the method has significant practical meaning.

Description

technical field [0001] The invention belongs to the technical field of power systems, and relates to a method for safely processing substation secondary shared information based on a fast encryption and decryption algorithm, which is suitable for the safe transmission process of data in the substation. Background technique [0002] The SCADA system in the smart substation gathers a large amount of data information. In the information transmission, if transparent transmission is adopted, there will be information security issues and hidden dangers of tampering. If all the transmitted information is encrypted, the complexity of calculation will be increased, the overall performance of the system will be reduced, and a lot of redundant information will be added to the transmission channel. [0003] The security processing method of substation secondary sharing information based on fast encryption and decryption algorithm is to classify the data information to be transmitted acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428
Inventor 黄佳胤魏雷远周红阳张恒祥丁晓兵武芳瑛余江许家焰张弛王丽姣刘千宽罗琨张志强于永旭
Owner CHINA SOUTHERN POWER GRID COMPANY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More