Encryption transmission method, device and system
A technology of encrypted transmission and secondary encryption, applied in the field of devices and systems, and encrypted transmission methods, can solve the problems of low security of sensitive information and large data, and achieve the effects of improving security, reducing pressure and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0098] The present invention provides an encrypted transmission method, such as the attached figure 1 shown, including:
[0099] Step S1: collecting distributed new energy power station data to obtain first power station data;
[0100] Step S2: performing replacement processing on the first power station data based on a pre-established metadata dictionary to obtain second power station data;
[0101] Step S3: processing the second power station data according to the encryption requirements to obtain third power station data;
[0102] Step S4: Assemble the third power station data into a specific format and transmit it.
[0103] Preferably: the specific format is a Json file format; the specific format is a format commonly used in data exchange between the middle and the platform;
[0104] As a method, the establishment of the metadata dictionary includes: based on the business requirements of distributed new energy information exchange, setting the string whose frequency ex...
Embodiment 2
[0169]Based on the same inventive concept, the present invention provides an encrypted transmission device, such as Figure 4 As shown, the device includes:
[0170] The acquisition module is used to collect the data of the distributed new energy power station to obtain the data of the first power station;
[0171] a primary encryption module, configured to perform replacement processing on the first power station data based on a pre-established metadata dictionary to obtain second power station data;
[0172] a secondary encryption module, configured to process the second power station data according to encryption requirements to obtain third power station data;
[0173] The transmission module is used to assemble the data of the third power station into a specific format and transmit it.
[0174] Among them, the establishment of metadata dictionary, including:
[0175] Based on the business requirements of distributed new energy information exchange, set the strings whose...
Embodiment 3
[0204] Based on the same inventive concept, as a way, such as Figure 5 As shown, the encrypted transmission method in the embodiment of the present invention mainly includes the following steps:
[0205] Step S10: the distributed new energy data middle station collects the data of the distributed new energy power station by using the data authentication method, and obtains the first power station data;
[0206] Step S11: The distributed new energy data middle station performs replacement processing on the first power station data based on the pre-established metadata dictionary to obtain the second power station data; processes the second power station data according to the encryption requirements to obtain the third power station data. Power station data; the third power station data is assembled into a specific format and transmitted.
[0207] In step S10, the distributed new energy data center collects the distributed new energy power station data by means of data authent...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


