Double encryption-based service data processing method for power distribution terminal

A technology of business data and power distribution terminals, which is applied to electrical components, transmission systems, etc., can solve problems such as easy to be cracked maliciously, security threats, damages, etc., and achieve the effect of improving security protection performance, avoiding malicious attacks, and avoiding malicious intrusions

Active Publication Date: 2018-11-27
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious attackers can attack the public communication network, steal power-sensitive data to analyze the weak links of the grid, and even invade the main station through the terminal of the sub-station, control the front-end computer to forge remote control instructions, and eventually cause a large-scale power outage, causing serious destructive events
Generally, the encryption method provided by the prior art for public network data is based on specific encryption hardware to encrypt the data, but the encryption method provided by the prior art only encrypts the data at one level, the encryption effect is not good, and it is easy to be hacked. Malicious cracking
[0004] At the same time, even if the main distribution station and distribution terminal in the power distribution system are connected through a dedicated optical fiber network, if the data is not encrypted during transmission or the encryption processing effect is not good, the transmitted data is easily be obtained, thereby carrying out large-scale intrusions on the power distribution system, causing a wide range of security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double encryption-based service data processing method for power distribution terminal
  • Double encryption-based service data processing method for power distribution terminal
  • Double encryption-based service data processing method for power distribution terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The core of this application is to provide a business data processing method for power distribution terminals based on double encryption, a data encryption method for power distribution terminals, a business data processing system, a data encryption system, a power distribution terminal, and a computer-readable storage medium. The network layer and the application layer carry out double encryption and decryption authentication, which realizes the double encryption of the terminal, improves the security protection level of the terminal, and avoids the problem of malicious intrusion.

[0060] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a double encryption-based service data processing method for a power distribution terminal. According to the method, received massages are processed by means of IPSec protocol authentication and decryption, and an identity authentication operation and a data decryption operation are performed at an application layer, so that data is prevented from being leaked, a power distribution system network is not maliciously invaded, the messages received by the power distribution terminal are sent by safe equipment, and the situations such as malicious attacks caused by data communication between masquerading equipment and the power distribution terminal can be avoided. The dual protection of a network layer and the application layer is realized in a process of service data processing of the power distribution terminal, so that the security protection performance of the power distribution terminal is improved, and the situations of the malicious attacks are avoided. The application also discloses a data encryption method of the power distribution terminal, a service data processing system, a data encryption system, the power distribution terminal and a computer readable storage medium, which have the beneficial effects.

Description

technical field [0001] This application relates to the technical field of power distribution automation, in particular to a double encryption-based business data processing method for power distribution terminals, a data encryption method for power distribution terminals, a business data processing system, a data encryption system, power distribution terminals, and computer-readable storage medium. Background technique [0002] With the continuous development of electric power technology, the automation system of distribution network has appeared, which improves the power distribution efficiency when the power grid is in use. The distribution automation system is based on the distribution master station and the distribution terminal, and the distribution network is connected between the distribution master station and the distribution terminal through a dedicated communication optical fiber to ensure the communication between the distribution master station and the distribut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/0485H04L63/08H04L63/166H04L63/168
Inventor 蔡田田习伟姚浩索思亮匡晓云
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products