Unlock instant, AI-driven research and patent intelligence for your innovation.

A business data processing method for power distribution terminals based on double encryption

A technology for business data and power distribution terminals, applied in electrical components, transmission systems, etc., can solve the problems of power distribution system intrusion, security threats, easy to be maliciously cracked, etc. The effect of malicious intrusion

Active Publication Date: 2021-09-03
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious attackers can attack the public communication network, steal power-sensitive data to analyze the weak links of the grid, and even invade the main station through the terminal of the sub-station, control the front-end computer to forge remote control instructions, and eventually cause a large-scale power outage, causing serious destructive events
Generally, the encryption method provided by the prior art for public network data is based on specific encryption hardware to encrypt the data, but the encryption method provided by the prior art only encrypts the data at one level, the encryption effect is not good, and it is easy to be hacked. Malicious cracking
[0004] At the same time, even if the main distribution station and distribution terminal in the power distribution system are connected through a dedicated optical fiber network, if the data is not encrypted during transmission or the encryption processing effect is not good, the transmitted data is easily be obtained, thereby carrying out large-scale intrusions on the power distribution system, causing a wide range of security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A business data processing method for power distribution terminals based on double encryption
  • A business data processing method for power distribution terminals based on double encryption
  • A business data processing method for power distribution terminals based on double encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The core of this application is to provide a business data processing method for power distribution terminals based on double encryption, a data encryption method for power distribution terminals, a business data processing system, a data encryption system, a power distribution terminal, and a computer-readable storage medium. The network layer and the application layer carry out double encryption and decryption authentication, which realizes the double encryption of the terminal, improves the security protection level of the terminal, and avoids the problem of malicious intrusion.

[0060] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a business data processing method based on double encryption for power distribution terminals. By performing IPSec protocol authentication and decryption processing on received messages, and then performing identity authentication operations and data decryption operations at the application layer, the data is kept Not to be leaked, to prevent the power distribution system network from being maliciously invaded, so that the messages received by the power distribution terminal are messages sent by safe devices, and to avoid malicious attacks such as masquerading equipment and power distribution terminals for data communication . In the process of processing the business data of the power distribution terminal, the double protection at the network layer and the application layer is realized, which improves the security protection performance of the power distribution terminal and avoids malicious attacks. The present application also discloses a data encryption method for a power distribution terminal, a business data processing system, a data encryption system, a power distribution terminal, and a computer-readable storage medium, which have the above beneficial effects.

Description

technical field [0001] This application relates to the technical field of power distribution automation, in particular to a double encryption-based business data processing method for power distribution terminals, a data encryption method for power distribution terminals, a business data processing system, a data encryption system, power distribution terminals, and computer-readable storage medium. Background technique [0002] With the continuous development of electric power technology, the automation system of distribution network has appeared, which improves the power distribution efficiency when the power grid is in use. The distribution automation system is based on the distribution master station and the distribution terminal, and the distribution network is connected between the distribution master station and the distribution terminal through a dedicated communication optical fiber to ensure the communication between the distribution master station and the distribut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/0485H04L63/08H04L63/166H04L63/168
Inventor 蔡田田习伟姚浩索思亮匡晓云
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD