CN104135358B - A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature - Google Patents
A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature Download PDFInfo
- Publication number
- CN104135358B CN104135358B CN201410258127.3A CN201410258127A CN104135358B CN 104135358 B CN104135358 B CN 104135358B CN 201410258127 A CN201410258127 A CN 201410258127A CN 104135358 B CN104135358 B CN 104135358B
- Authority
- CN
- China
- Prior art keywords
- clock
- digital signature
- distribution terminal
- message
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract description 12
- 239000002131 composite material Substances 0.000 claims description 22
- 238000004364 calculation method Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 150000001875 compounds Chemical class 0.000 claims description 5
- 238000000205 computational method Methods 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims 1
- 230000008569 process Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000001629 sign test Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011946 reduction process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The invention discloses a method for executing SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature, which belongs to the field of power system automation. The method includes the following steps: on the basis of a power distribution terminal complying with a requirement of a power distribution network, adding an SNTP protocol to execute clock calibration, and protecting a security of calibration of a system clock with an SM2 asymmetric digital signature algorithm. Therefore, the power distribution terminal is assured to realize clock calibration with high accuracy and high security, which has a very important practical engineering significance.
Description
Technical field
The present invention relates to it is a kind of based on asymmetrical digital sign distribution terminal SNTP setting means, belong to power system and
Its automatic field.
Background technology
With the propulsion of Distribution Automation Construction, restore electricity to carry out fast failure isolation and non-faulting region, contract
It is short to hinder the power off time for causing for some reason, the stability and reliability of power supply are ensured, power supply quality is improved, more and more such as intelligence
The more intelligentized functions such as the distributed FA of energy just carry out promotion and application in electrical power distribution automatization system, and this requires that distribution is automatic
Need to be cooperated and linked between each equipment of change system so that being in communication with each other between power distribution automation equipment and exchange
It is more and more closer.And the intelligent functions that cooperating between each equipment of system completes correlation must be set up in each participation device
On the basis of being respectively provided with unified, accurate timing system, all devices response and action scheme must be with accurate reliable markers
Based on, therefore, the electrical power distribution automatization system such as tradition IEC60870-5-104, IEC60870-5-101 commonly uses stipulations institute
It is intelligent that the clock check method of definition cannot meet electrical power distribution automatization system on time service precision and the security of time service
Requirement.Therefore, the safe time dissemination system security protection side of time service can be ensured using the time service agreement and research of time service precision
Method is just particularly important in the process of construction of power distribution automation from now on.
The content of the invention
It is an object of the invention to solve the problems, such as time service precision and its security protection of distribution power automation terminal.
To achieve these goals, the technical solution adopted in the present invention is:
Based on the distribution terminal SNTP setting means that asymmetrical digital is signed, comprise the following steps:
1) exploitation of SNTP agreements is carried out in distribution terminal, makes distribution terminal possess SNTP client functionalitys, the SNTP
The exploitation of agreement to be referred to and configure control module when clock server request pair and to clock server message in distribution terminal
The parsing module for being parsed, and digital signature authentication module is configured, the digital signature authentication module configuration is adjusted for client
Digital signature authentication interface;
2) Digital Signature module is configured on clock server, the Digital Signature module configuration is called for clock server
Digital signature interface;
3) private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock of distribution terminal
Client;
4) the local clock client of distribution terminal arranges first heading, then obtains local moment Orig_T, assembling
Into message, then by control module to request message during clock server transmission pair;
5) clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock
The clock Recv_T of server local;Then according to local state arranges heading, the message to be signed that Tran_T is 0 is formed,
Again by message to be signed, the private key and clock server of clock server describe ID, as the input of digital signature interface, by when
Clock server calls digital signature interface, digitally signed module produces digital signature according to SM2 Digital Signature Algorithms;
6) Tran_T in message to be signed, then the digital signature data that will be formed are filled with clock server current time index
After being attached to message to be signed, composite message is formed, and sent to local clock client;
7) local clock client is received after the composite message of clock server, and the local clock of distribution terminal is obtained first
Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound
Tran_T sets to 0 in message, obtains new message;
8) local clock client is using the step 7) the nonnumeric signed data of new message that obtains is used as to be verified
Signature, adds public key and clock server on distribution terminal server and describes ID together as the defeated of digital signature authentication interface
Enter, by local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, makes numeral
Signature verification interface will return the Boolean of a success or not:1 or 0, so as to verify the step 7) receive it is compound
The security of message, the authentication failed if returning 0, client refuses this clock and checks instruction;The certification success if returning 1,
Client calculates the deviation of local clock and clock server clock, and local clock system is modified.
Aforementioned step 1) digital signature authentication module be used to carry out Boolean calculation, whether checking composite message is by true
Real reliable clock server sends.
Aforementioned step 2) Digital Signature module using SM2 Digital Signature Algorithms calculate digital signature.
Aforementioned step 8) computational methods of clock jitter t are:
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2.
Aforesaid Intelligent power distribution terminal CPU hardware is realized using the DSP based on linux, vxworks operating system.
The length of aforesaid digital signature data is 64 bytes.
When the present invention realizes that distribution terminal has the high accuracy pair of asymmetrical digital signature security protection, process is simple, right
When high precision, the verification process amount of calculation of digital signature is little, and fast operation, security is good;And the present invention is to CPU hardware
Disposal ability requirement is low, and the CPU hardware platform that can adopt low cost, reduction process ability is realized, based in operating system platform
Applied;Simultaneously the present invention using SM2 asymmetrical digitals signature technology the additional character label behind message at traditional SNTP pair
Name has ensured electrical power distribution automatization system time service safety for verifying to the reliability of time service server.
Description of the drawings
Process schematic when Fig. 1 is distribution terminal SNTP pair of the present invention;
Agreement unilateral authentication schematic diagram when Fig. 2 is SNTP pair of the present invention;
Fig. 3 is the SNTP composite message structures with digital signature of the invention;
Fig. 4 is that distribution terminal clock of the present invention checks flow chart.
Specific embodiment
The present invention is described in further detail in conjunction with the drawings and specific embodiments.
The present invention by using agreement during SNTP simple networks pair as distribution power automation terminal high accuracy pair when agreement,
The amendment to distribution terminal local clock is realized according to the algorithm of this agreement regulation so as to keep one with clock server clock
Cause, while the security in order to ensure time service, prevents distribution terminal clock to be maliciously tampered, affect the peace of electrical power distribution automatization system
Row for the national games, using based on the SM2 algorithms of asymmetrical digital signature technology security protection is carried out to time service message, and distribution terminal is being received
Extract digital signature first to after system clock synch command and verify the identity reliability of instruction sender, authentication success
The amendment of local clock can be carried out.
As shown in figure 4, the distribution terminal SNTP setting means signed based on asymmetrical digital, are comprised the following steps:
Carry out the exploitation of SNTP agreements in distribution terminal first, make distribution terminal possess SNTP client functionalitys, that is, matching somebody with somebody
Electric terminals configure the parsing module parsed to the control module of clock server request clock and to clock server message,
And configure digital signature authentication module, digital signature authentication module is used to carrying out Boolean calculation, checking composite message be whether by
True and reliable clock server sends, and the configuration of digital signature authentication module connects for the digital signature authentication of client call
Mouthful.
Then Digital Signature module is configured on clock server, Digital Signature module adopts SM2 Digital Signature Algorithm meters
Calculate digital signature, and the digital signature interface that Digital Signature module configuration is called for clock server.
The private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock visitor of distribution terminal
Family end.
As shown in figure 1, the local clock client of distribution terminal arranges first heading, the local moment is then obtained
Orig_T, is assembled into message, then by control module to request message during clock server transmission pair;
Clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock clothes
The local clock Recv_T of business device;Then according to local state arranges heading, the message to be signed that Tran_T is 0 is formed, then
By message to be signed, the private key and clock server of clock server describe ID as the input of digital signature interface, by clock
Server calls digital signature interface, Digital Signature module produces digital signature according to SM2 Digital Signature Algorithms;
Tran_T in message to be signed is filled with clock server current time index, then the digital signature data for being formed is attached
After being added in message to be signed, composite message is formed, and sent to local clock client;
Local clock client receives the composite message of clock server, and the local clock Dest_ of client is obtained first
T, parses Orig_T, Recv_T and Tran_T in composite message and preserves and then by former composite message by parsing module
Tran_T sets to 0, and obtains new message;
The nonnumeric signed data of the new message that local clock client obtains upper step is to be tested as signature to be verified
Signed certificate name describes ID and connects together as digital signature authentication plus the public key and clock server on distribution terminal home server
The input of mouth, by local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation,
Digital signature authentication interface will return the Boolean of a success or not:1 or 0, so as to verify the composite message for receiving
Security, the possibly authentication failed if returning 0, someone emit charging system time service server and attempt illegally to distort clock
Or other are attacked, local client should refuse this clock and check instruction;The certification success if returning 1, illustrates that clock is checked
Instruction secure reliability, client is repaiied by calculating the deviation of local clock and server clock to local clock system
Just, the purpose synchronous to reach clock.
Local clock client is received after clock server composite message, can simply calculate transmission delay d and when
Clock deviation t, its computational methods is:
D=(Dest_T-Orig_T)-(Recv_T-Tran_T)
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2
Calculate more than and understand, the time deviation of local clock client and clock server is only and Recv_T, Orig_
T differences and Tran_T, Dest_T difference are relevant, and with clock server processing data the time required to or response time delay Recv_
The difference of the two times of T, Tran_T is unrelated, therefore local clock client custom end is only needed on the basis of local clock
The calibration for being capable of achieving local clock is modified to local clock according to deviation t.
For the compatibility and versatility of guarantee agreement version, the present invention is awarded using SM2 asymmetrical digitals signature to SNTP
Protocol massages form and transmission mode when original pair is still adopted when Shi Xieyi is protected, only by original according to symmetric cryptography
The safety certification data field that algorithm is produced is substituted for SM2 digital signature datas, and only considers by clock server to distribution terminal
Unidirectional authentication, security protection is not carried out to the clock request message of local clock client to clock server end.Such as
Shown in Fig. 2.
Fig. 3 is that the SNTP clocks for possessing asymmetrical digital signature check composite message schematic diagram, according to the SNTP of V3 versions
Pair when agreement, when its original pair protocol massages form as shown in table 1,
Protocol massages form during 1 original pair, table
Leap second, version number and server mode | liVnMode | 1 byte length |
The rank of server work | Stratum | 1 byte length |
The maximum time interval of packet | Poll | 1 byte length |
The accuracy of system clock | precision | 1 byte length |
The total round-trip delay of primary timing reference source | rootDelay | 4 byte lengths |
The error of primary timing reference source | rootDispersion | 4 byte lengths |
The mark of timing reference input | referenceID | 4 byte lengths |
System clock last time prover time | Refe_T | 8 byte lengths |
Objective user orientation server initiates request time | Orig_T | 8 byte lengths |
Server receives client's request time | Recv_T | 8 byte lengths |
Server to client sends out the timestamp time | Tran_T | 8 byte lengths |
Digital signature data | Authenticator | 64 byte lengths |
Wherein Authenticator is digital signature data, and the present invention is prevented using the digital signature of 256 bit lengths
Shield, i.e., the length of whole digital signature data is 64 bytes, eventually forms the compound reports of the SNTP with digital signature as shown in Figure 3
Text.
The process of the inventive method is illustrated below by specific embodiment.
Relevant parameter required for security protection is as follows:
Clock server describes ID:SNTP Server
Signature private key data (hexadecimal):717374510A39B816C89DA53C5B674A13F98AF03D35F6C2
3F F4DB3147EEFE9F03
Sign test public key data (hexadecimal):BCE1191B83A08F8A9F94C974D5E8ED080613CC54C85CC5
5A20030C86CC9803867B24525D67DC59F25B885282CBDDDD70DE82575A1F6136D44339E83F5DE
AD063
1) local clock client arranges first heading, that is, it is 0x1B to arrange LiVnMod positions, and wherein leap second mark Li sets
0 is set to, version number Vn arranges position 3, and mode of operation Mod is set to 3, remaining byte is 0, then obtains local moment Orig_T,
Message is assembled into, then by control module to request message (hexadecimal) during clock server transmission pair:
1B000000000000000000000000000000000000000000000000000000000000000000000000000
000D6F608BA00000000
2) clock server answering example
Clock server parses first Orig_T after above-mentioned client request message is received, and obtains clock service
The local clock Recv_T of device, then according to local state arranges heading, that is, it is 0x1C, wherein leap second to arrange LiVnMod positions
Mark Li is set to 0, and version number Vn arranges position 3, and mode of operation Mod is set to 4;The rank Stratum byte of server work
According to actual setting;The maximum time interval PollInterval of packet is set to 244;Then fill out client and send the time
Orig_T and server receive the time Recv_T of request, form the message to be signed (i.e. raw requests message) that Tran_T is 0
It is as follows:
1C0300F400000000000000004C434F4C D6F608BA088601C0D6F608BA00000000D6F6
08BA088601C00000000000000000 (hexadecimal)
Again by message to be signed, the private key and clock server of clock server describe ID, used as digital signature interface
Input, by clock server call number signature interface, digitally signed module produces numeral and signs according to SM2 Digital Signature Algorithms
Name is as follows:
7a45857015d66e71f454a310f324cd26fb8da7803c23dcb54e2c3a93a9850ca5b1299cbcc134f
8609b403aea17706d023d84e986d1d2ea54f33b089df6aec7ab (hexadecimal)
The last Tran_T filled with clock server current time index in raw requests message, then the digital signature that will be formed
Data are attached to after raw requests message that to form composite message as follows, and are sent to local clock client:
1c0300f400000000000000004c434f4c d6f608ba088601C0d6f608ba00000000d6f6
08ba088601c0d6f608ba088601c07a45857015d66e71f454a310f324cd26fb8da7803c23dcb54
e2c3a93a9850ca5b1299cbcc134f8609b403aea17706d023d84e986d1d2ea54f33b089df6aec7
Ab (hexadecimal)
3) client process example
Local clock client is received after the composite message of clock server answer, and the local clock of client is obtained first
Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound
Tran_T sets to 0 in message, obtains new message:
1c0300f400000000000000004c434f4c d6f608ba088601C0d6f608ba00000000d6f6
08ba088601c0d6f608ba088601c0000000000000000007a45857015d66e71f454a310f324cd26
fb8da7803c23dcb54e2c3a93a9850ca5b1299cbcc134f8609b403aea17706d023d84e986d1d2e
A54f33b089df6aec7ab (hexadecimal)
Then by nonnumeric signature section in message:1c0300f400000000000000004c434f4cd6f608ba08
8601C0d6f608ba00000000d6f608ba088601c0d6f608ba088601c000 000000000000000 is used as treating
Sign test name, adds public key data and clock server describes inputs of the ID together as digital signature authentication interface, by it is local when
Clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, connects digital signature authentication
Mouth will return the Boolean of a success or not:1 or 0, verify whether the composite message for receiving is by true and reliable.If
Certification success, then calculate clock jitter, and local clock system is modified.
Claims (6)
1. the distribution terminal SNTP setting means signed based on asymmetrical digital, it is characterised in that comprise the following steps:
1) exploitation of SNTP agreements is carried out in distribution terminal, makes distribution terminal possess SNTP client functionalitys, the SNTP agreements
Exploitation to refer to and configure control module when clock server request pair in distribution terminal and clock server message carried out
The parsing module of parsing, and digital signature authentication module is configured, the digital signature authentication module configuration is for client call
Digital signature authentication interface;
2) Digital Signature module, the number that the Digital Signature module configuration is called for clock server are configured on clock server
Word signature interface;
3) private key that asymmetrical digital is signed is installed on into clock server, public key is installed on the local clock client of distribution terminal
End;
4) the local clock client of distribution terminal arranges first heading, then obtains local moment Orig_T, is assembled into report
Text, then by control module to request message during clock server transmission pair;
5) clock server is received after local clock client request message, and Orig_T is parsed first, and obtains clock service
The local clock Recv_T of device;Then according to local state arranges heading, the message to be signed that Tran_T is 0, Tran_ are formed
T is that clock server sends out the timestamp time to local clock client, then by message to be signed, the private key of clock server is timely
Clock server describes ID, digitally signed by clock server call number signature interface as the input of digital signature interface
Module produces digital signature according to SM2 Digital Signature Algorithms;
6) Tran_T in message to be signed is filled with clock server current time index, then the digital signature data of formation is added
After message to be signed, composite message is formed, and sent to local clock client;
7) local clock client is received after the composite message of clock server, and the local clock of distribution terminal is obtained first
Dest_T, parses Orig_T, Recv_T and Tran_T in composite message and preserves by parsing module, then will be former compound
Tran_T sets to 0 in message, obtains new message;
8) local clock client is using the step 7) the nonnumeric signed data of new message that obtains as signature to be verified,
Inputs of the ID together as digital signature authentication interface is described plus the public key and clock server on distribution terminal server, by
Local clock client call digital signature authentication interface, digitally signed authentication module carries out Boolean calculation, makes digital signature
Checking interface will return the Boolean of a success or not:1 or 0, so as to verify the step 7) composite message that receives
Security, the authentication failed if returning 0, client refuses this clock and checks instruction;The certification success if returning 1, client
End calculates the deviation of local clock and clock server clock, and local clock system is modified.
2. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that
The step 1) digital signature authentication module be used to carry out Boolean calculation, checking composite message be whether by it is true and reliable when
Clock server sends.
3. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that
The step 2) Digital Signature module using SM2 Digital Signature Algorithms calculate digital signature.
4. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that
The step 8) computational methods of clock jitter t are:
T=((Recv_T-Orig_T)+(Tran_T-Dest_T))/2.
5. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that
The distribution terminal CPU hardware is realized using the DSP based on linux, vxworks operating system.
6. it is according to claim 1 based on asymmetrical digital sign distribution terminal SNTP setting means, it is characterised in that
The length of the digital signature data is 64 bytes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410258127.3A CN104135358B (en) | 2014-06-11 | 2014-06-11 | A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410258127.3A CN104135358B (en) | 2014-06-11 | 2014-06-11 | A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104135358A CN104135358A (en) | 2014-11-05 |
CN104135358B true CN104135358B (en) | 2017-04-12 |
Family
ID=51807893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410258127.3A Active CN104135358B (en) | 2014-06-11 | 2014-06-11 | A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104135358B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104618109B (en) * | 2014-12-31 | 2018-04-27 | 国家电网公司 | A kind of electric power terminal data safe transmission method based on digital signature |
CN105467827B (en) * | 2015-12-08 | 2018-01-19 | 广西电网有限责任公司电力科学研究院 | A kind of bearing calibration of asymmetric clock based on concentrator and system |
CN111107169B (en) * | 2020-02-10 | 2020-10-02 | 中国人民解放军32021部队 | Time management method based on WEB browser |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368742A (en) * | 2013-07-02 | 2013-10-23 | 国电南瑞科技股份有限公司 | Intelligent distribution terminal security protection method based on asymmetric digital signature authentication |
CN103684733A (en) * | 2013-09-28 | 2014-03-26 | 国家电网公司 | Automatic verification method and special-purpose equipment for clock synchronization |
-
2014
- 2014-06-11 CN CN201410258127.3A patent/CN104135358B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368742A (en) * | 2013-07-02 | 2013-10-23 | 国电南瑞科技股份有限公司 | Intelligent distribution terminal security protection method based on asymmetric digital signature authentication |
CN103684733A (en) * | 2013-09-28 | 2014-03-26 | 国家电网公司 | Automatic verification method and special-purpose equipment for clock synchronization |
Non-Patent Citations (1)
Title |
---|
《非对称数字签名技术在配电自动化***的应用》;张志华,周捷,丁可;《计算机技术及其应用》;20120331;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104135358A (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107395312B (en) | A kind of secure network method for synchronizing time and device | |
US10972284B2 (en) | Method of providing a hash value for a piece of data, electronic device and computer program | |
CN110267270B (en) | Identity authentication method for sensor terminal access edge gateway in transformer substation | |
EP2590356A1 (en) | Method, device and system for authenticating gateway, node and server | |
US11849052B2 (en) | Certificate in blockchain network, storage medium, and computer device | |
US20120260088A1 (en) | Method and device for securely transmitting data | |
CN103621126A (en) | Method and apparatus for providing machine-to-machine service | |
CN113079215B (en) | Block chain-based wireless security access method for power distribution Internet of things | |
CN103259768A (en) | Method, system and device of message authentication | |
CN106576043A (en) | Virally distributable trusted messaging | |
CN104135358B (en) | A method for executing an SNTP clock calibration on a power distribution terminal based on an asymmetric digital signature | |
CN102724211A (en) | Key agreement method | |
WO2023236551A1 (en) | Decentralized trusted access method for cellular base station | |
Sani et al. | A universally composable key exchange protocol for advanced metering infrastructure in the energy Internet | |
CN108270572B (en) | Key exchange protocol based on position and password | |
CN113254972A (en) | Information security management method based on block chain | |
CN102891850A (en) | Method for preventing parameter resetting in IPSec (IP Security) channel updating | |
CN104079408A (en) | Method for enhancing communication safety in industrial control system | |
CN103327020A (en) | Security access method and system based on region dividing | |
CN102970134B (en) | Method and system for encapsulating PKCS#7 (public-key cryptography standard #7) data by algorithm of hardware password equipment | |
CN108924161A (en) | A kind of encrypted transaction data communication means and system | |
CN112422223B (en) | TCP/IP-based time synchronization device, time synchronization method and time mark monitoring system | |
CN109039841A (en) | The method, apparatus and girff of cascade network is added | |
CN112564919A (en) | Identity authentication method, identity authentication equipment and computer readable storage medium | |
CN101814987A (en) | Method and system for establishing key between nodes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |