Electric power material coding optimization method based on hash algorithm

An electric power material and hash algorithm technology, which is applied in the field of power material coding optimization based on hash algorithm, can solve the problems of limited information connection, inconsistent coding form, and no effective combination of materials, etc., and achieves high security strength and good The effect of anti-attack ability

Pending Publication Date: 2020-03-17
STATE GRID ZHEJIANG ELECTRIC POWER
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The problems existing in the current power material coding are: (1) The material category needs to be expanded
The diversity of power materials, different classification methods, and other equipment and facilities all pose applicability challenges to the current material coding method
(2) The encoding form is not uniform
In current business activities, project codes, supplier codes, storage code codes, material codes, etc. come from different business systems, and the code forms are not uniform. Only part of the codes can be related in partial systems, and the degree of information connection in the whole process very limited
(3) Code lacks node information
The current material coding rules adopt a 24-digit decimal system. The meaning of each code name only considers the uniqueness of the material’s own attributes and its circulation within the State Grid system, and does not effectively combine the materials from production, supply, storage, and distribution. , operation and maintenance, and scrapped key node information throughout the life cycle, providing basic support for material management information sharing and value mining

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power material coding optimization method based on hash algorithm
  • Electric power material coding optimization method based on hash algorithm
  • Electric power material coding optimization method based on hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] A power material coding optimization method based on hash algorithm, HMAC based on Hash algorithm, its security strength is much higher than that of Hash algorithm, using the HMAC-MD5 algorithm constructed on the basis of MD5 message digest algorithm, the key and message Data mixing, using a hash function to hash the result of the mixing, mixing the resulting hash value with the key, and then applying the hash function again. HMAC-MD5 accepts keys of any size and generates hash sequences of length 128 bits.

[0057] The description of the HMAC-MD5 algorithm is as follows:

[0058] HMAC(K,M)=H(K⊕opad‖H(K⊕ipad‖M))

[0059] K: key; M: message content; H: hash function, the hash function selects MD5; opad and ipad: strings composed of several 0x5c and 0x36 respectively; ⊕: XOR operation; ‖: connection operation .

[0060] The process steps are as follows:

[0061] Step 1: Add 0 after the key K to create a string of length B;

[0062] Step 2: XOR the string generated in...

Embodiment 2

[0076] A fusion method based on the encoding method of the HMAC-MD5 algorithm and the IPv6 address, and the IPv6 address includes a global network identifier, a local subnet identifier, and a host identifier, and the host identifier includes an HMAC-MD5 algorithm-based The encoding generated by the encoding method.

[0077] IPv6 is the abbreviation of "Internet Protocol Version 6" (Internet Protocol Version 6) in English. It is designed by the Internet Engineering Task Force (IETF) to replace IPv4 and become the basic communication protocol of the next generation Internet [13].

[0078]The text representation of IPv6 is also determined in RFC5952[14]. IPv6 addresses are usually expressed in hexadecimal form with colons, that is, x:x:x:x:x:x:x:x, each x is in hexadecimal Represents a 16-bit long integer, and the letters inside are expressed in lowercase. It includes a 48-bit global network identifier, a 16-bit local subnet identifier, and a 64-bit host identifier. The last 48-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an electric power material coding optimization method based on a hash algorithm. The method comprises steps of mixing the secret key with the message data by using an HMAC-MD5algorithm constructed on the basis of an MD5 message digest algorithm, performing hash calculation on a mixed result by using a hash function, mixing an obtained hash value with the secret key, and then applying the hash function again; and enabling the HMAC-MD5 to receive a secret key with any size and generate a hash sequence with the length of 128 bits. According to the invention, the hash algorithm is combined on the basis of the existing electric power material coding mode, and the electric power material coding security strength based on the HMAC-MD5 algorithm is high; codes based on anHMAC-MD5 algorithm and IPv6 are fused, codes generated based on a coding mode of the HMAC-MD5 algorithm are added with a secret key, an IPv6 address generated by a hash value with the secret key is fused, and the better anti-attack capacity is achieved.

Description

technical field [0001] The invention belongs to the field of power material coding, and in particular relates to a hash algorithm-based power material coding optimization method. Background technique [0002] There are many types and huge quantities of power supplies, and unique identity codes need to be assigned to the supplies. A scientific, reasonable, and unified coding method for supplies is an important support for the safe operation of the system, the collaborative sharing of data, and the efficient processing of information. At present, the vertical management mode of power materials is relatively mature, but the management process is lengthy and involves multiple departments, resulting in barriers to horizontal professional collaboration and information sharing among departments, hindering the in-depth exploration of data value. At the same time, project codes, supplier codes, storage point codes, and material codes come from different business systems, and only par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/0631G06Q50/06
Inventor 范江东李明袁康培高瞻沈海波尹玉凤郑逸林张明明王勇
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products