Method for tampering secret stealing information on power line and preventing interference

A power line and stealing technology, applied in the direction of reducing electrical interference, distribution line transmission system, electrical components, etc., can solve the problems of easy data theft and inability to tamper with signals

Inactive Publication Date: 2020-02-18
中科可来博(固安)航天电器制造有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a method for tampering with stealing information on the power line and preventing interference, which solves the probl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for tampering secret stealing information on power line and preventing interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] Such as figure 1 As shown, the embodiment of the present invention provides a method for tampering with stolen information on a power line and preventing interference, including the following steps:

[0022] 1) Install current and voltage sensors on both the live wire and the neutral wire, and then connect the current and voltage sensors to the ADC of the single-chip MCU;

[0023] 2) Use the single-chip microcomputer to perform high-speed sampling of the power information. The single-chip microcomputer performs AD conversion on the information on the current and voltage sensors. After calculation, it is judged whether there is any stolen information transmitted on the power line. If there is any stolen information transmitted, the wave of the stolen information is calculated. Baud rate, amplitude and waveform start time;

[0024] 3) The single-chip computer calculates the load value required to generate the information with the same amplitude according to the amplitude...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for tampering secret stealing information on a power line and preventing interference, and relates to the technical field of data theft prevention. The method for tampering secret stealing information on the power line and preventing interference comprises the following steps: 1) installing current and voltage sensors on a live wire and a zero wire, and then connecting the current and voltage sensors with an ADC of a single-chip microcomputer MCU; and 2) performing high-speed sampling on the power information by using a single-chip microcomputer, performing AD conversion on the information on the current sensor and the voltage sensor by the single-chip microcomputer, judging whether secret stealing information is transmitted on the power line or not throughcalculation, and if the secret stealing information is transmitted, calculating the Baud rate, the amplitude and the waveform starting time of the secret stealing information. After the amplitude of secret stealing information is analyzed through the single-chip microcomputer, proper loads are selected from the load array through calculation to form an interference load, the single-chip microcomputer drives the loads to be synchronously and randomly switched on and off at the frequency the same as that of the secret stealing information, and the purposes of interfering and tampering the secretstealing information are achieved under the condition that the network is not connected.

Description

technical field [0001] The invention relates to the technical field of data theft prevention, in particular to a method for tampering with stolen information on a power line and preventing interference. Background technique [0002] In recent years, there has been a stealing technology that steals data from computers and servers through power lines without connecting to the Internet. Virus programs are implanted in target computers and servers through storage media (storage media such as U disks, CDs, and memory cards). The information collected in the computer is converted into changes in the current and power consumed by the computer and server, and the information data is transmitted through the power line to steal secrets. [0003] At present, the existing plug-in strips and PDUs do not interfere with the signals loaded on the power lines, and cannot tamper with the signals, making data easy to be stolen. Contents of the invention [0004] (1) Solved technical problem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B3/54H04L29/06H04B15/02
CPCH04B3/542H04B15/02H04L63/1441
Inventor 张新燕
Owner 中科可来博(固安)航天电器制造有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products