Quantum encryption-based electricity use information acquisition security protection method and system

A technology of electricity information and quantum encryption, which is applied in the field of communication, can solve problems such as low efficiency, poor real-time key update, and affect the efficiency of data security transmission, so as to achieve high security, ensure unconditional security, and improve security and confidentiality sexual effect

Inactive Publication Date: 2017-11-17
STATE GRID CORP OF CHINA +3
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the distribution method adopted by the existing power consumption information collection system is: use the offline physical transmission medium to distribute the decryption key to the power consumption information collection terminal, which is inefficient, leads to poor real-time key update, and affects the security of data transmission. efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum encryption-based electricity use information acquisition security protection method and system
  • Quantum encryption-based electricity use information acquisition security protection method and system
  • Quantum encryption-based electricity use information acquisition security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0040] The embodiment of the present application discloses a security protection method for electricity consumption information collection based on quantum keys. The key ciphertext issued by the key online distribution device is received by the electricity consumption information collection terminal. The ciphertext obtained by encrypting the decryption key with the key; the electricity consumption information collection terminal uses the quantum key to decrypt the ciphertext of the k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a quantum encryption-based electricity use information acquisition security protection method and system. The method includes the following steps that: an electricity use information acquisition end receives a key ciphertext distributed by a key online distribution device, wherein the key ciphertext is a ciphertext which is obtained by encrypting a decryption key through using a quantum key; and the electricity use information acquisition end decrypts the key ciphertext through using the quantum key so as to obtain the decryption key. With the method of the present invention adopted, the real-time performance of key transmission is improved, and the security of the update of the decryption key is guaranteed.

Description

technical field [0001] The present application relates to the field of communications, and in particular to a quantum encryption-based security protection method and system for electricity consumption information collection. Background technique [0002] In the information age, the security and confidentiality of electricity consumption information has gradually been paid attention to. In order to ensure the safe transmission of electricity consumption information, in the existing electricity consumption information collection system, an encryption key and a decryption key are respectively distributed to the electricity consumption information sending end and the electricity consumption information collection end, and the electricity consumption information sending end uses the encryption key The electricity consumption information is encrypted, the encrypted electricity consumption information is transmitted on the network, and the electricity consumption information collec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/0852
Inventor 陈智雨高德荃王栋李国春吴冰赵子岩曾楠王晋雄葛冰玉谢磊王晨辉史睿张冰曹耀夫黄星杰王磊谭静林超李俊琴
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products