Unlock instant, AI-driven research and patent intelligence for your innovation.

Key management method, device, medium and terminal equipment based on power gateway

A key management and power network technology, which is applied in the direction of secure communication devices, electrical components, network connections, etc., can solve problems such as decryption failure, encryption failure, loss, etc., and achieve the effect of improving stability and avoiding errors

Active Publication Date: 2022-03-11
WEIDE GUANGDONG INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional security gateways use common encryption application mode. Before data transmission, the security gateway often needs to be initialized, but the device key is not managed before initialization. When there is an error in the configuration parameters of the security gateway device , the data after the security gateway is initialized will have calculation errors, resulting in encryption failure or decryption failure, resulting in irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method, device, medium and terminal equipment based on power gateway
  • Key management method, device, medium and terminal equipment based on power gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Please refer to figure 1 , is a schematic flowchart of an embodiment of a power gateway-based key management method provided by the present invention, the method includes steps 101 to 105, and each step is specifically as follows:

[0033] In step 101, the management terminal sends a signature key pair generation instruction to the security gateway, so that the security gateway generates a signature key pair in response to the signature key pair generation instruction.

[0034] Step 102: Encrypt the certificate request file through an encryption algorithm according to the signature key to obtain an encrypted certificate request file, and send the encrypted certificate request file to the CA system, so that the CA system responds to the encryption The certificate request file obtains the corresponding signature certificate from the certificate management server, and sends the signature certificate to the security gateway; in this embodiment, the encryption algorithm incl...

Embodiment 2

[0046] Please refer to figure 2 , is a schematic structural diagram of an embodiment of a power gateway-based key management device provided by the present invention, the device includes: a first generation module, a first processing module, a second generation module, a second processing module and a gateway Initialize the module; each module is as follows:

[0047] The first generation module is configured to send a signature key pair generation instruction to the security gateway through the management terminal, so that the security gateway generates a signature key pair in response to the signature key pair generation instruction.

[0048] The first processing module is used to encrypt the certificate request file through an encryption algorithm according to the signature key to obtain an encrypted certificate request file, and send the encrypted certificate request file to the CA system, so that the CA system responds Based on the encrypted certificate request file, obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key management method based on a power gateway. The technical solution of the invention verifies whether the signature key pair and the encryption key pair are normal in the security gateway by generating the signature key pair and the encryption key pair. Normal, that is, when they are consistent, complete the initialization of the signature key pair and encryption key pair, thereby completing the initialization of the security gateway, and realize the management and verification of the device key before the initialization of the security gateway, avoiding the configuration of the security gateway device If there is an error in the parameters, the stability of the security gateway's encryption and decryption processing will be improved.

Description

technical field [0001] The present invention relates to the field of power security gateways, in particular to a key management method, device, medium and terminal equipment based on power gateways. Background technique [0002] The security gateway is widely used in the power distribution industry. By deploying the security gateway at the network boundary, it can ensure the security, confidentiality and integrity of cross-network information transmission, and realize effective authentication, authorization and data transmission security between the client and the server; Therefore, the access method of the security gateway is an important link in the gateway technology. [0003] Traditional security gateways use common encryption application mode. Before data transmission, the security gateway often needs to be initialized, but the device key is not managed before initialization. When there is an error in the configuration parameters of the security gateway device , the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L12/66
CPCH04L63/06H04L63/0442H04L63/0478H04L63/0823H04L12/66
Inventor 尹健张春郑东曦
Owner WEIDE GUANGDONG INFORMATION TECH CO LTD