Energy control terminal strategy file security reinforcement method and system

A policy file and energy control technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems that affect the experience of authorized users, authorized programs cannot run normally, and cannot return correct results, etc., to reduce downtime The effect of service probability, reduction of hardware cost investment, and reduction of leakage risk

Pending Publication Date: 2021-06-25
CHINA ELECTRIC POWER RES INST
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the program file fails to communicate with the software dongle successfully during the execution phase of the terminal, the DogConvert function cannot return the correct result, so that the authorized program cannot run normally in the terminal.
[0008] Its main disadvantages are: through the hardware dongle technical solution, it can be seen that in the design and development stage, the program file...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy control terminal strategy file security reinforcement method and system
  • Energy control terminal strategy file security reinforcement method and system
  • Energy control terminal strategy file security reinforcement method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A security reinforcement method for an energy control terminal policy file proposed by the present invention is a security reinforcement method for a policy file independently running on a new type of energy control terminal with edge computing capabilities, such as figure 1 shown, including:

[0046] S1. Read the CPU identification code of the energy control terminal where the policy file is installed and the pre-generated policy file registration code;

[0047] S2. Using the CPU identification code to decrypt the policy file registration code to obtain a policy authentication ID;

[0048] S3. Determine whether the energy control terminal is authorized to run the policy file by verifying the policy authentication ID and the policy file authentication ID generated in advance and stored on the terminal;

[0049] Wherein, the policy file registration code is generated based on the identity authentication ID corresponding to the policy file and the CPU identification code...

Embodiment 2

[0062] The following uses a specific example to introduce the security reinforcement method of an energy control terminal policy file proposed by the present invention from the registration code generation to the final authentication stage. It specifically includes four steps: preparation, encryption, policy delivery, and decryption. Figure 4 shown.

[0063] In the first preparation stage, the policy generator (strategy development unit) needs to send the policy information (unit number, classification number, policy number) to the security administrator (policy management unit), and the security administrator will enter the policy information into the policy file for authentication. The ID generator is used to generate the policy identity authentication ID, and the security administrator returns the generated authentication ID together with the decrypted dynamic library program and the calling example to the policy generator. The policy generator realizes the self-authenticat...

Embodiment 3

[0068] In order to realize the above method, the present invention also proposes an energy control terminal policy file security reinforcement system, which includes a registration code generation module, a decryption dynamic library, a registration code storage file and a policy file authentication ID library. Wherein, the registration code generating module is used to generate a policy file registration code based on the identity authentication ID corresponding to the policy file and the CPU identification code of the policy terminal, which specifically includes a policy file authentication ID generator, a registration code generator and Encrypted dynamic library; specific as Figure 5 shown.

[0069] The detailed functions of each component include:

[0070] (1) Policy file authentication ID generator

[0071] The strategy file authentication ID generator is to generate a unique identity authentication information ID for a certain or a certain batch of strategy files that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an energy control terminal strategy file security reinforcement method and system. The method comprises the following steps: reading a CPU identification code of an energy control terminal for installing a strategy file and a pre-generated strategy file registration code; decrypting the strategy file registration code by using the CPU identification code to obtain a strategy authentication ID; and determining whether the energy control terminal is authorized to operate the strategy file or not by verifying the strategy authentication ID and a strategy file authentication ID which is pre-generated and stored on the terminal, wherein the strategy file registration code is generated based on the identity authentication ID corresponding to the strategy file and the CPU identification code of the strategy terminal. The copy operation problem of the strategy file in the energy control terminal equipment under the condition that the strategy file is not authorized is solved, the demand for strategy safety management and strategy development maximization decoupling is met, the risk of security authentication information leakage is reduced, and the probability that an authorization program stops service due to incapability of real-time online or authentication communication failure is reduced.

Description

technical field [0001] The invention relates to the technical field of security management of application program files on a terminal device side, in particular to a method and system for strengthening security of energy control terminal policy files. Background technique [0002] With the improvement of edge computing capabilities of energy control terminals, in order to solve the problem of regulation timeliness, more manufacturers choose to package the energy optimization control strategy as an independent execution file to run in the terminal, resulting in the problem of core technology security management. Transmission encryption and online security authentication of terminal equipment solve security problems. On the one hand, this solution prevents the terminal from operating normally in an offline state, and on the other hand, it cannot avoid the risk of copying policy files to the same type of terminal for use. Terminal policy file security hardening related technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/51G06F21/60
CPCG06F21/121G06F21/51G06F21/602
Inventor 李文林晶怡张思瑞李斌刘畅张静李昊
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products