Unlock instant, AI-driven research and patent intelligence for your innovation.

Power system data operation program encryption method and device and decryption method and device

A technology of operating programs and power systems, applied in the direction of electrical digital data processing, program code conversion, digital data protection, etc., can solve problems such as intrusion, illegal tampering of application programs, social and economic losses, etc., achieve improvement and stability, and prevent illegal Intrusion, the effect of improving security

Active Publication Date: 2020-08-21
XUJI GRP +2
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, changing "select" to "delete" through SQL keyword modification will cause database data damage and system exceptions; modifying database table names and database field names can bypass authority management, resulting in theft and leakage of sensitive data
[0004] Power system monitoring equipment is the key equipment for the safe operation of the power system. Under the background of the rapid construction of the ubiquitous power Internet of Things, the application program based on the database operation has security loopholes of illegal tampering and intrusion. The above-mentioned illegal intrusion will cause great harm. socioeconomic loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system data operation program encryption method and device and decryption method and device
  • Power system data operation program encryption method and device and decryption method and device
  • Power system data operation program encryption method and device and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0054] figure 1 It is a flow chart of the power system database operation program encryption method provided by the embodiment of the present invention.

[0055] Please refer to figure 1 , the first aspect of the embodiment of the present invention provides a power system database operating program encryption method, including the following steps:

[0056] S110. Acquire raw data of the operating program source code.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system database operation program encryption method and device. The method comprises the following steps of obtaining original data of an operation program source code;encrypting the original data, and returning the encrypted data to the source code; and compiling the source code containing the encrypted data. The invention further discloses a power system databaseoperation program decryption method and device. Plaintext editing is used in the encoding stage to improve readability, original data in a source code is encrypted before compiling to improve safety,illegal invasion of a database and malicious tampering of key data are prevented, safety of a power system database is improved, and operation and stability of a power system are improved.

Description

technical field [0001] The invention relates to the technical field of power system security control, in particular to a power system data operation program encryption method and device, and a decryption method and device. Background technique [0002] Power system operation monitoring applications are usually designed and coded by C++ language, mainly including equipment modeling, graphic configuration, real-time monitoring, historical query and other functions. The equipment static data, graphic configuration data, and historical storage data involved in these functions are usually stored in commercial relational databases. There are a large number of database operation SQL statement texts in the application programs of each functional module of the system. These SQL statements realize the increase of monitoring data. The operation of deleting, modifying and checking is an important support for the realization of system functions. [0003] The SQL statement text in the ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F8/41
CPCG06F21/602G06F21/6227G06F21/629G06F21/64G06F8/41
Inventor 黄利军张航黄浩然丁博王少鹏杨迎春张延辉康振全丁亮刘洋吕梦婷贾亚楠吴可可
Owner XUJI GRP