Unlock instant, AI-driven research and patent intelligence for your innovation.

GOOSE message signature and authentication method

A message and frame message technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as strict real-time requirements and time cannot meet the requirements, so as to meet real-time requirements and improve efficiency Effect

Inactive Publication Date: 2018-08-03
NARI TECH CO LTD +4
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, unlike other messages, GOOSE messages have strict real-time requirements. Encrypting GOOSE messages cannot meet the requirements in terms of time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GOOSE message signature and authentication method
  • GOOSE message signature and authentication method
  • GOOSE message signature and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0025] Such as figure 1 As shown, a GOOSE message signature and authentication method is as follows:

[0026] 1) The sender packages the GOOSE message.

[0027] In order for the sender to realize fast packet grouping, the GOOSE message sent is encoded in a fixed-length manner, specifically encoded in the TLV (type-length-value) format, and T (type), L (length) and V (value) occupy The space is fixed. For example, the data length L of StNum and SqNum both occupy 4 bytes, and the data field V of StNum and SqNum is fixed at 4 bytes.

[0028] During initialization, organize the fixed data fields in the GOOSE message, such as figure 2 APPID, Length, Reserved Field 1, Reserved Field 2, gocbRef, d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GOOSE message signature and authentication method. The method comprises the following steps that a sender carries out packaging on a GOOSE message; the sender carries out hierarchical signature on a content of the GOOSE message; and a subscriber of the GOOSE message carries out verification. According to the method, through quick packaging of the GOOSE message and hierarchical signature of the message content, the efficiency of information security certification of the GOOSE message in an intelligent substation is improved, and the real-time requirement of process layer equipment is met.

Description

technical field [0001] The invention relates to a GOOSE message signature and authentication method, which belongs to the field of electric power system automation. Background technique [0002] For the security design of the power system, the protection measures currently designed are basically boundary security measures, and do not involve too much in the specific implementation of the security protection of the internal network communication of the substation. If the system is attacked in the substation, the system will become very vulnerable. The exposure of information security incidents in recent years has not only shocked the world, but also made us realize that the information security of important industries in the country is facing a severe test, and the comprehensive information security in the power system is imminent. Moreover, the standardization of power system communication protocols makes information communication more vulnerable to "hacker" attacks. The lat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L12/26H04L1/00
CPCH04L1/0061H04L9/3247H04L43/10H04L63/08
Inventor 郑洁梅德冬姚燕春罗华煜李耕李嘉张连生周化
Owner NARI TECH CO LTD