Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method based on RSA algorithm in power marketing system interface invocation

A technology of RSA algorithm and interface call, which is applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of unable to solve the interaction between the two parties, the lack of interface call identity verification, and the interface request verification method is not safe enough, etc., to achieve Improve data security protection capabilities, authenticity assurance, and prevent impersonation and tampering effects

Inactive Publication Date: 2019-01-04
JIANGSU FRONTIER ELECTRIC TECH +2
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current power marketing system interface call identity verification is missing, and the interface request verification method is not safe enough to avoid forgery by the receiver or other third parties, thereby affecting the authenticity of the verification. In addition, if the sender denies it due to its own disadvantage, it cannot Resolve disputes between the two parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on RSA algorithm in power marketing system interface invocation
  • Authentication method based on RSA algorithm in power marketing system interface invocation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims.

[0017] Such as figure 1 and 2 As shown, in some illustrative embodiments, an authentication method in calling an interface of an electric power marketing system based on an RSA algorithm is provided.

[0018] The RSA public key cryptosystem uses the RSA algorithm for digital signatures. In view of the proven security o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method based on an RSA algorithm in power marketing system interface invocation. An interface call client generates a digital signature based on the RSA algorithm. An RSA digital signature provides a secure method to confirm the identity of sender, that is, the authenticity of digital signature is guaranteed, which prevents impersonating and tampering by athird party, and affirms the authenticity of digital signature. A safety lock is added to the power system interface to ensure the safety of the power system interface, thereby rejecting the occurrence of data leakage phenomenon caused by illegal interface calls, and ensuring the safety of data exchange in power system.

Description

technical field [0001] The invention belongs to the technical field of digital signature authentication, and in particular relates to an authentication method in calling an interface of an electric power marketing system based on an RSA algorithm. Background technique [0002] Data interaction between power systems is realized through interface interaction to ensure the efficient and reliable operation of each system. However, there are generally security problems in interface requests between power systems. The system interfaces are not fortified, and there is no verification of the legality of calls. Nowadays, the power system has been popularized in all links of production, operation and management of power enterprises. Therefore, the security of power system data is the guarantee for the safe operation of the power system and the reliable power supply to the society. [0003] There are several existing solutions for interface request verification: 1. The server generates...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/32
CPCH04L9/0643H04L9/3249
Inventor 葛崇慧许道强吴波管诗骈谢林枫王黎明
Owner JIANGSU FRONTIER ELECTRIC TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More