Unlock instant, AI-driven research and patent intelligence for your innovation.

Power wireless public network data secure transmission method

A wireless public network and data security technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as data leakage, illegal interception and utilization, and lack of communication terminal access security authentication mechanism for re-access, etc., to achieve The effect of increasing difficulty and improving safety

Inactive Publication Date: 2019-07-02
POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The public network communication resource card ledger, workflow, process monitoring and other systems of the three major telecom operators have begun to take shape, and wireless network communication terminal configuration, alarm, and performance information have basically realized data monitoring. Insufficient integrity, accuracy, timeliness and security of acquisition and transmission
Especially in terms of data security transmission, there is no effective security authentication mechanism for communication terminal access from the wireless collection platform to the communication terminal, to the wireless communication integrated network management system, and there are hidden dangers of illegal intrusion such as illegally obtaining relevant power wireless public network business data
[0003] The existing collected data transmission has the following security problems: (1) The network provided by the operator is used for data transmission at this stage. Although there are authentication mechanisms such as digital certification for terminal device information transmission, it is necessary to use the pre-set non-repeatable key security TF card Installed in each device, the terminal is stolen and lost, which will easily cause data leakage, and the lack of communication terminal access security authentication mechanism for re-connection has caused potential safety hazards to the safe production of power companies; (2) Under the existing data transmission mode, the lack of Secure encryption verification for encrypted transmission of real-time wireless collection message data, which is easy to be illegally intercepted and used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power wireless public network data secure transmission method
  • Power wireless public network data secure transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A method for secure transmission of electric power wireless public network data, such as figure 1 shown, including the following steps:

[0047] S1. The collection platform collects characteristic information of communication terminals;

[0048] S2. The acquisition platform generates a key;

[0049] S3. The communication terminal performs session verification. If the verification is successful, a trusted communication link is established and enters step S4; if the verification fails, the session is interrupted;

[0050] S4. The acquisition platform sends the key to the communication terminal;

[0051] S5. The communication terminal receives the key, and sends the message data feature information to the collection platform;

[0052] S6. The acquisition platform verifies the message data characteristic information, if the verification is successful, the acquisition platform sends the message data and communication terminal characteristic information to the communicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power wireless public network data security transmission method, which comprises the following steps that in the step S1, step S2 and step S3, a session between an acquisition platform and a communication terminal is started, verified through communication terminal feature information, and a key containing the communication terminal feature information is generated at thesame time; in the step S4 and the step S5, the communication terminal receives the key, binds and encrypts the key and the message data feature information through a security encryption method, and sends the secret key and the message data feature information to an acquisition platform; in the step S6, the collection platform decrypts and verifies the message data feature information through thesecret key; in the step S7, the communication network management monitoring platform receives, verifies and stores the encrypted message data. The method has the advantages that the algorithm conforming to the advanced encryption standard AES is adopted, and compared with a conventional power transmission method, the security is improved; the secret key is formed by encryption of an encryption standard AES algorithm, the data and the secret key are encrypted through the encryption standard AES algorithm, equivalently, a composite encryption mode is carried out, and the cracking difficulty is improved.

Description

technical field [0001] The present invention relates to the field of electric power data transmission, and more specifically, to a method for secure transmission of electric power wireless public network data. Background technique [0002] The public network communication resource card ledger, workflow, process monitoring and other systems of the three major telecom operators have begun to take shape, and wireless network communication terminal configuration, alarm, and performance information have basically realized data monitoring. There are deficiencies in the integrity, accuracy, real-time and security of acquisition and transmission. Especially in terms of data security transmission, there is no effective communication terminal access security authentication mechanism from the wireless collection platform to the communication terminal, to the wireless communication integrated network management system, and there are hidden dangers of illegal intrusion such as illegal ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0631H04L63/0428
Inventor 黄宇
Owner POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More