Unlock instant, AI-driven research and patent intelligence for your innovation.

GW376.1 protocol message encryption method and device

An encryption method and message technology, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve problems such as rising project costs, and achieve the effects of ensuring authenticity and confidentiality, improving security, and reducing project costs.

Active Publication Date: 2021-07-09
国网四川省电力公司营销服务中心
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is that the current GW376.1 protocol mainly uses hardware encryption to solve communication security problems, but this encryption method needs to add additional hardware equipment, resulting in increased project costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GW376.1 protocol message encryption method and device
  • GW376.1 protocol message encryption method and device
  • GW376.1 protocol message encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] like figure 1As shown, the present invention provides a GW376.1 protocol message encryption method, specifically comprising the following steps:

[0057] S10: Acquiring a communication instruction, the communication instruction carries message reassembly information and basic information of the acquisition terminal, and the basic information includes a terminal identifier, an encryption key, and an authentication key.

[0058] Wherein, the authentication key refers to a key used to authenticate the acquisition terminal. The terminal identifier refers to an identifier used to uniquely identify a collection terminal. In this embodiment, the ex-factory code of the acquisition terminal is used as the terminal identifier, and the ex-factory code is 84-byte unsigned integer data.

[0059] S20: Acquire corresponding recombined data based on the message reorganization information carried in the communication command, and generate message text.

[0060] S30: Randomly generate...

Embodiment 2

[0096] like image 3 As shown, the difference between this embodiment and Embodiment 1 is that a GW376.1 protocol message encryption device includes:

[0097] The communication instruction acquiring module 10 is used to acquire the communication instruction, the communication instruction carries the message reassembly information and the basic information of the collection terminal, the basic information includes the terminal identification, the encryption key and the authentication key.

[0098] The message text generation module 20 is configured to obtain corresponding recombined data based on message reassembly information carried in the communication command, and generate message text.

[0099] The call counter generation module 30 is configured to randomly generate a call counter based on the communication instruction.

[0100] The initialization vector generation module 40 is configured to generate an initialization vector based on the call counter and the terminal iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GW376.1 protocol message encryption method and device, and the method comprises the steps: obtaining a communication instruction, obtaining corresponding recombination data according to message recombination information carried by the communication instruction, and generating a message plaintext; randomly generating a call counter based on the communication instruction, and generating an initialization vector based on the call counter and the terminal identifier; calling an AES-GCM-128 algorithm to encrypt the initialization vector, the message plaintext, the encryption key and the authentication key to obtain a message ciphertext and an authentication feature code, and generating the authentication feature code to determine that the sent message ciphertext is not intercepted by other terminals so as to improve the security of the message ciphertext; finally, taking the initialization vector, the message ciphertext and the authentication feature code as new link user data, filling the new link user data into a corresponding position according to a message recombination rule, and generating an encrypted message conforming to a GW376.1 protocol format, so as to ensure the authenticity and confidentiality of the data without adding additional hardware equipment, and reduce the project cost.

Description

technical field [0001] The invention belongs to the technical field of GW376.1 statute message encryption, and in particular relates to a GW376.1 statute message encryption method and device. Background technique [0002] The GW376.1-2009 protocol is a communication protocol for the power user information collection system promulgated by the State Grid Corporation of China. It has been widely used in the field of power automation. Since the communication between the master station of electricity consumption information collection and the collection terminal mostly adopts the GPRS public network method, this method has potential safety hazards and does not meet the secondary protection requirements of the power company. At present, the GW376.1 protocol mainly uses hardware encryption to solve the communication security problem (i.e., deploying an encryption machine on the side of the power consumption information collection master station, and adding an ESAM module to the col...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/951H04L47/43
CPCH04L63/0435H04L49/9057Y04S40/20
Inventor 方建全李春敏吴蒙徐严军张然王家驹孙晓璐薛莉思刘晨李洵钟黎
Owner 国网四川省电力公司营销服务中心
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More