Unlock instant, AI-driven research and patent intelligence for your innovation.

Electric power 5G public network secure transmission method based on asymmetric encryption

A technology of asymmetric encryption and secure transmission, applied in the field of secure transmission of electric power 5G public network based on asymmetric encryption, it can solve the problems of complex verification procedures, low security, and fragile security, so as to improve the access rate and ensure security. and reliability, and the effect of improving protection performance

Pending Publication Date: 2022-03-15
STATE GRID JIANGSU ELECTRIC POWER CO LTD TAIZHOU POWER SUPPLY BRANCH +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To sum up, since the design goal of DTU is protocol conversion and data communication, it does not adopt identity authentication and transmission encryption technology on the network layer in principle, so its security is very low, especially when the transmission delay of GPRS network is long. Large (usually about 1500ms), when using TCP communication, there will often be retransmitted data packets, and many DTUs reduce communication costs in order to reduce data traffic
[0003] In order to solve the common problems in the field of being attacked by hackers on the network, the security is more fragile and the verification procedure is complicated, etc., the present invention is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power 5G public network secure transmission method based on asymmetric encryption
  • Electric power 5G public network secure transmission method based on asymmetric encryption
  • Electric power 5G public network secure transmission method based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment one: according to Figure 1-Figure 5 , this embodiment provides an asymmetric encryption-based power 5G public network security transmission method, the transmission method includes obtaining the number of mobile terminals accessing the edge gateway, and checking the status of the mobile terminals accessing the edge gateway Monitor; where the monitored parameters include connection success / failure, access duration, and executed operation events; obtain the authorization code of each edge gateway to verify the access authorization of each edge gateway, if the verification fails, you need to re- Verify; if the verification is passed, the authentication operation ends; wherein, the authorization code is granted through the processing module, and the communication between each routing device and a plurality of communication stations is managed;

[0044] By verifying the access request of the mobile terminal, and after passing the verification, establishing multip...

Embodiment 2

[0065] Embodiment 2: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improved on the basis of it, according to Figure 1-Figure 5 , is also to provide an asymmetric encryption-based power 5G public network secure transmission system, the transmission system includes a processor, a server, a processing module, a plurality of routing devices and a communication station, wherein the processor is connected to the The server, the processing module, multiple routing devices and communication stations control the connection, and regulate the communication transmission between each communication station based on the control operation of the processor, so as to realize more efficient information transmission between each communication station and convenience;

[0066] The server is used to meet the access requirements of multiple mobile terminals or transmit the information of the electric power public net...

Embodiment 3

[0103] Embodiment 3: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improved on the basis of it, according to Figure 1-Figure 5 In addition, in the process of connecting the mobile terminal to the edge gateway, the mobile terminal needs to be managed, wherein, when each mobile terminal is connected to each communication station of the electric power public network, the management module manages the Manage the connection of each mobile terminal;

[0104] The management module is used to manage each of the mobile terminals, and at the same time, in the process of management, each of the mobile terminals needs to be authenticated to determine whether it meets the conditions for connecting to the electric power public network; in addition, each When the certified mobile terminal is performing an operation event; the operation event must be authenticated by the electric power public network; in parti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a power 5G public network secure transmission method based on asymmetric encryption, and the transmission method comprises the steps: obtaining the number of mobile terminals accessing an edge gateway, and monitoring the states of the mobile terminals accessing the edge gateway; wherein the monitored parameters comprise connection success / failure, access duration and executed operation events; acquiring an authorization code of each edge gateway to verify the access authorization of each edge gateway, and if the verification is not passed, performing re-verification; and if the verification is passed, the authentication operation is ended. According to the method, the mobile terminals are authorized, so that the non-allowed mobile terminals are filtered out, and the access rate to the authorized mobile terminals is improved; meanwhile, the management module is used for managing each mobile terminal, and in the management process, each mobile terminal needs to be authenticated to determine whether the mobile terminal meets the condition of connecting the power public network or not, so that the protection performance of the whole system is effectively improved.

Description

technical field [0001] The present invention relates to the technical field of power transmission, in particular to a method for secure power transmission in 5G public network based on asymmetric encryption. Background technique [0002] In the process of power grid construction, the construction of a power grid limits the improvement of the power communication optical cable network architecture. There are some star and chain structures in the optical cable network, that is, there are sites where a single uplink optical cable is connected to the optical cable network. These sites are often interrupted due to the interruption of the uplink optical cable, which leads to the interruption of the optical path carried on the optical cable network, which will cause the site and All services at the lower-end access site are completely interrupted, which can easily cause a level-five incident and bring great potential safety hazards to the safe operation of electric power. As CN1016...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/03H04W12/041H04W12/0433H04W12/06H04W12/069H04W12/08
CPCH04W12/03H04W12/041H04W12/0433H04W12/06H04W12/069H04W12/08Y02D30/70
Inventor 戴永东姜海波毛锋肖为健刘玺李彩云王茂飞鞠玲张淏凌
Owner STATE GRID JIANGSU ELECTRIC POWER CO LTD TAIZHOU POWER SUPPLY BRANCH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More