CN104301317A - Power telecommunication network field operation and maintenance data encryption transmission and verification method - Google Patents

Power telecommunication network field operation and maintenance data encryption transmission and verification method Download PDF

Info

Publication number
CN104301317A
CN104301317A CN201410538004.5A CN201410538004A CN104301317A CN 104301317 A CN104301317 A CN 104301317A CN 201410538004 A CN201410538004 A CN 201410538004A CN 104301317 A CN104301317 A CN 104301317A
Authority
CN
China
Prior art keywords
data
encryption
maintenance
transmission
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410538004.5A
Other languages
Chinese (zh)
Other versions
CN104301317B (en
Inventor
高雪生
邵波
张际
汤震
张懿
周筠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Information and Communication Technology Co
Nanjing NARI Group Corp
Zhenjiang Power Supply Co of Jiangsu Electric Power Co
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Information and Communication Technology Co
Nanjing NARI Group Corp
Zhenjiang Power Supply Co of Jiangsu Electric Power Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Nari Information and Communication Technology Co, Nanjing NARI Group Corp, Zhenjiang Power Supply Co of Jiangsu Electric Power Co filed Critical State Grid Corp of China SGCC
Priority to CN201410538004.5A priority Critical patent/CN104301317B/en
Priority to PCT/CN2014/093881 priority patent/WO2016058259A1/en
Publication of CN104301317A publication Critical patent/CN104301317A/en
Application granted granted Critical
Publication of CN104301317B publication Critical patent/CN104301317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a power telecommunication network field operation and maintenance data encryption transmission and verification method. A data transmission technology is utilized, a data encryption transmission and field data remote verification feedback technology is introduced into field operation and maintenance of a power telecommunication network, and safety transmission and remote verification on field operation and maintenance data are conducted by the adoption of an intelligent means. The data encryption transmission and verification method comprises the steps of binding, collecting, encryption, transmission, decryption, verification, encryption, passing back and decryption. It is ensured that a communication network of power enterprises operates safely and stably, field operation and maintenance are standard, the remote technology supporting function is achieved, and field data support is provided for work decisions.

Description

Power telecom network on-the-spot operation/maintenance data encrypted transmission verification method
Technical field
The present invention relates to a kind of power telecom network, particularly relate to a kind of method on-the-spot operation maintenance data of power telecom network being encrypted to transmission and checking, belong to communication technical field.
Background technology
The power telecom network building-up work of " 12 " period is near completion, the construction of electric power enterprise power telecom network also will welcome the new construction period, power telecom network existing operation maintenance equipment and operational mode, owing to there is the problems such as low, the on-the-spot operation maintenance achievement data of data transmission security is various, hierarchical structure is unintelligible, will face more and more heavier operating pressure.There is following technical problem in the checking of the collection of the on-the-spot operation maintenance data of existing power telecom network, transmission and field data: the network that (1) existing transfer of data adopts communication network operator to provide, the terminal equipment used for power industry O&M lacks effective safety guarantee, access and the use safety of terminal equipment cannot be ensured, easily cause the leakage of data, hidden danger is caused to electric power enterprise safety in production; (2) existing operational system lacks real-time on-the-spot operation/maintenance data authentication function, cannot realize the closed loop management of on-the-spot operation/maintenance data, cause cannot determine Field Force whether according to code requirement accurate and effective complete on-the-spot maintenance work.The problems referred to above cause in O&M process and cannot ensure that on-the-spot operation maintenance personnel carries out standardized operation, reduce the operating efficiency of O&M, cause a hidden trouble to the stable operation of power telecom network, constrain the safe operation of power telecom network.
Summary of the invention
The object of the present invention is to provide a kind of power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, utilize data transmission technology, Data Encryption Transmission and field data remote validation feedback technique are incorporated in the on-the-spot O&M of power telecom network, intelligent means are adopted to realize for the safe transmission of on-the-spot operation/maintenance data and remote validation, ensure electric power enterprise communication network safe and stable operation, on-the-spot O&M standardized operation, realize remote technology support function, for job acceptance decision provides field data to support.
Object of the present invention is achieved by the following technical programs:
A kind of power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, the method comprises the following steps:
1. to realize in wireless transmission public network remote system for the binding management of intelligent terminal with mobile device international identity code and international mobile subscriber identity;
2. carry out O&M on-site data gathering with the intelligent terminal being configured with infrared scan function;
3. data encryption process
30 authorization informations as mobile device international identity code and international mobile subscriber identity in 128 of IDEA secret keys are combined, in the process of encryption image data, continuous print 32 bit data in the secret key of Stochastic choice, 16 is 1 group totally 2 groups, 2 groups of data replace with mobile device international identity code and international mobile subscriber identity respectively, because mobile device international identity code and international mobile subscriber identity are 15, often organize 1 bit data stochastic generation in 16 bit data, thus realize the encryption for transmission data;
4. transfer of data
Wireless public network is utilized to realize transfer of data between the intelligent terminal of binding and remote system;
5. data deciphering
Deciphering remote system being received to data is realized with the secret key that data encryption processing method uses; The subkey block of deciphering is inverse by the addition of encryption subkey or multiplication is inverse is formed; After data decryption, verified the legitimacy of data decryption by mobile device international identity code and international mobile subscriber identity, the data result that valid data just can carry out next step is verified, directly will not abandoned by the data of checking, and reports to the police;
6. data result checking
Data result checking is the process utilizing remote system checking transmission data whether to meet O&M field requirement, no matter whether the result correctly all will feed back the result, comparing service is responsible for terminal collection and the data transferring to remote platform are verified, to determine whether scene completes maintenance work on request;
7. data encryption
To the result data encryption after remote validation;
8. data back
Realize the point-to-point transmission of remote system and intelligent terminal with wireless public network, realize the correct passback of the result data;
9. data deciphering
Intelligent terminal carries out the deciphering of the result data, thus determines whether on-the-spot O&M result meets the requirements.
Object of the present invention can also be realized further by following technical measures:
Aforementioned power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, wherein two groups of continuous 16 bit data separated also can be replaced with mobile device international identity code and international mobile subscriber identity by step 3 data encryption process, often organize 1 stochastic generation in 16 bit data.
Aforementioned power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, the intelligent terminal that wherein step 2 carries out O&M on-site data gathering also configures RFID recognition function.
Aforementioned power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, the intelligent terminal that wherein step 2 carries out O&M on-site data gathering also configures GIS function.
Aforementioned power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, the intelligent terminal that wherein step 2 carries out O&M on-site data gathering also configures barometric surveying function.
Compared with prior art, the invention has the beneficial effects as follows: in cryptographic algorithm, incorporate mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) data, in encrypting and decrypting proof procedure, increase the authentication function for intelligent terminal, thus promote the function of the fail safe of transfer of data, normalization and ALARA Principle identification.
Accompanying drawing explanation
Fig. 1 is power telecom network on-the-spot operation/maintenance data encryption transmission system structure chart;
Fig. 2 is the encryption of O&M field data, decrypted transport checking flow chart;
Fig. 3 is the encryption of O&M field data, deciphering flow chart.
Embodiment
Below in conjunction with the drawings and specific embodiments, the invention will be further described.
As shown in Figure 1, power telecom network of the present invention on-the-spot operation/maintenance data encrypted transmission verification system is made up of intelligent terminal, remote platform, and both are communicated by wireless public network.Data Encryption Transmission verification method of the present invention is as described below:
1. move O&M field data verification platform
As shown in Figure 2, the O&M field data encryption of native system, decrypted transport checking flow process is described.System, based on the unified software frame platform of cross operating system, have employed unified resource data model, by intelligent terminal binding, Data Encryption Transmission, data deciphering checking and passback, can ensure to realize O&M when safety, specification.Mainly comprise three large application modules:
(1) terminal binding management
Binding management mainly realizes binding operation maintenance personnel being used to terminal equipment, realize the certification to the terminal equipment be connected in wireless public network by mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI), ensure by wireless public network connecting system and carry out fail safe and the manageability of exchanges data.
(2) data encryption verification management
Encryption handling utilizes data encryption technology to realize the encryption of the field data to binding terminal collection, and concrete process comprises: field data encryption, teledata deciphering, remote validation data encryption and terminal receive data deciphering.Thus realize the verification management of ring-closed on-the-spot O&M image data complete under safe controllable environment.
(3) data transfer management
Transfer of data mainly utilizes wireless public network to realize the Point-to-Point Data real-time Transmission of terminal equipment and remote validation system, realizes safety, efficiently on-the-spot, teledata under public network environment and docks in real time, support data encrypted authentication link.
2. O&M field data encrypted transmission verification method
The method of O&M field data encrypted transmission checking uses the process of " binding-collection-encryption-transmission-deciphering-checking-encrypt-passback-deciphering ", and final realization shows on-the-spot O&M task instruction and result.
Terminal binding: utilize mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) to realize in wireless transmission public network system for the binding management of terminal equipment;
Terminal data gathers: utilize handheld terminal to provide enriched data acquisition mode, realize the collection for O&M result data;
Data encryption: realize the encryption for data acquisition of terminal based on IDEA (IDEA) algorithm;
Transfer of data: utilize wireless public network to realize transfer of data between binding terminal and remote system;
Data deciphering: the deciphering of secret key realization for data utilizing data encryption using method, the subkey block of deciphering is inverse by the addition of encryption subkey or multiplication is inverse is formed.First 52 sub-keys are gone out from 128 cipher key spreading of user's input, leave in ULONG16Key [52] array, then ex-situ operations is carried out to these 52 sub-keys, after the transposition of antithetical phrase key array, just need the replacement that multiplication is inverse or modulo addition is inverse some of them sub-key being carried out to mould 1, need sub-key 18+18=36 altogether of change, 52-36=16 other sub-key constantization.
Data verification: data verification is the process utilizing remote system checking transmission data whether to meet field requirement, no matter whether the result correctly all will feed back the result;
Data encryption: in this step, enciphered data is the verification msg after remote validation, and the encryption method of employing is consistent with aforementioned data encryption method;
Data back: the data after checking need again to utilize wireless public network to realize the point-to-point transmission of remote system and terminal, realize the correct passback of verification msg;
Data deciphering: last decrypting process carries out on intelligent terminal, mainly carries out the deciphering of verification msg, thus determines whether on-the-spot O&M result meets code requirement.
3. based on the method for the mobile O&M field data encrypted transmission checking of terminal binding
Power communication moves the important composition that O&M is electric communication operation and maintenance, based on power network communication operation management system software frame platform, use power network unified resource data model, combine the functions such as terminal equipment binding, data acquisition, data encryption, data deciphering, data double-way transmission.Concrete step is as follows:
The first step: terminal binding
Power communication moves the general name that O&M is a class communication network O&M, so the terminal equipment selected in this O&M method is the same with existing terminal equipment, because terminal equipment needs to have reliable wireless data transfer capability, so the many employings of the terminal equipment of present stage are based on mobile phone, and install the terminal of the software and hardware functions such as infrared scan, RFID, GIS, barometric surveying additional.Described infrared scan is mainly used for the bar code on scanning device, thus helps user's fetch equipment information, and whether confirmation equipment is found is correct.RFID and infrared scan similar, be also for fetch equipment information, just reading manner is different.GIS is used for positioning equipment information, thus helps user to determine whether residing equipment is need repair apparatus.Barometric surveying is used for ambient pressure residing for sensing equipment, helps long-distance user to understand running environment residing for equipment, patrols and examines for post facility, data supporting that maintenance plan is formulated.The variation collection that intelligent terminal utilizes these modes can easily realize for all types of data in scene, and can directly be stored on handheld terminal.Because every station terminal all has mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI), and all there is uniqueness, so the binding will this two group identification code being utilized to carry out terminal equipment and long-range background system when terminal binding, thus ensure the manageability being accessed long-range background devices by wireless public network.
Second step: data acquisition
The collection of O&M result data is mainly carried out in data acquisition, and encrypted transmission, the important prerequisite of the result.Concrete positioning function is as follows:
The GPS location adopting terminal to carry and RFID, Quick Response Code recognition technology, iODF intelligent optical fiber distribution frame, image identification function realize the variation collection for mobile O&M result data, gathered by device intelligence, guarantee power communication move O&M ageing while, improve electric power and lead to normalization and the accuracy of mobile O&M.
3rd step: data encryption, deciphering
Data encryption mainly in order on the basis ensureing remote platform and end point point to-point communication, is improved for the fail safe by wireless public network transmission data further.
The present invention in data encryption based on IDEA (IDEA), existing algorithm basis will incorporate mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) data, just can increase the authentication function for terminal in existing encrypting and decrypting proof procedure, thus promote fail safe and the manageability of transfer of data.As shown in Figure 3, concrete method is:
Carry out data encryption process, in the process of encryption image data, the parameter of IMEI and IMSI is substituted into, Stochastic choice continuous print 32 bit data is replaced, also two of separation groups of continuous 16 bit data can be adopted to carry out replacing (because IMEI and IMSI is respectively 15, other one is generated automatically by system).
Data deciphering utilizes algorithm to be decrypted operation, because add the parameter of IMEI and IMSI after data decryption, so system can the legitimacy of first certificate parameter, valid data just can carry out the result verification of remote system, directly will do not abandoned by verification msg, and report to the police.
The method of above-mentioned two steps is utilized to be encrypted transmission to result data after comparison and to be decrypted displaying on handheld terminal.
This part needs the module participated in have: data encryption module, data decryption module, Data Verification module.As Fig. 2
(1) data encryption module
Service name: pm_Encryptionmodel;
The cryptographic services of data encryption module before terminal and remote platform all realize transfer of data, cipher mode adopts the IDEA (IDEA) of present stage main flow.The secret key of IDEA (IDEA) has 128, we combine using wherein 30 authorization informations as mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) in the present invention, thus realize the encryption for transmission data.
IDEA algorithm is not only by confusion but also with spreading, its design principle is a kind of hybrid operation coming from different algebraic group, and the computing that this algebraic group is carried out: 64 bit data of algorithm input are divided into 4 16 seat groupings as the input of the first round, always have 8 and take turns iteration.In each is taken turns, carry out computing each other and also carry out computing (often taking turns all different) from the sub-key of 6 16 simultaneously, finally also carry out output transform with the sub-key of 4 16, produce and export, wherein the sub-key of totally 52 16 participates in computing.Whole algorithm comprises 3 parts:
(1) generation of sub-key: input: 128b key; Export: the sub-key of 52 16b.
(2) ciphering process: input: 52 sub-keys and 64b data; Export: 64b data.
(3) decrypting process: the ciphering process of IDEA algorithm is not identical with the sub-key of decrypting process, and the two is one to one.
IDEA needs 52 sub-keys altogether, and each has 16b, by 128b secret generating.From key, 128b is divided into 8 groups, often organizes 16b, obtain K1, K2, K3, K4, K5, K6, K7, K8; By doing 16b grouping after 128b ring shift left 25, obtain sub-key K9, K10, K11, K12, K13, K14, K15, K16; Sub-key K17, K18, K19, K20, K21, K22, K23, K24 is obtained again by doing same grouping after this 128b ring shift left 25; By that analogy, until generate all sub-keys.
In this algorithm, key is 128b, and clear packets length is 64b.64b is divided into the sub-block of 4 16b: X1, X2, X3, X4 are as the input of the first round, during each is taken turns, 4 input sub-blocks and 6 16b sub-keys are done respectively addition, the multiplication of mould 216+1, the xor operation of mould 216, obtain the inputs of 4 outputs as next round.So carry out 8 altogether to take turns, finally make output transform with 4 sub-keys.
(2) data decryption module
Service name: pm_Decryptionmodel;
Similar with encrypting module, deciphering module is the decryption services for data encryption after terminal and remote platform reception data, except simple decryption services, because in encryption, we add mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) information, so also by the reliability of verification msg while data deciphering.The subkey block of deciphering is inverse by the addition of encryption subkey or multiplication is inverse is formed.
(3) Data Verification module
Service name: pm_Datavalidationmodel
Comparing service is responsible for terminal collection and the data transferring to remote platform are verified, to determine whether scene completes maintenance work on request.
4th step: transfer of data
Transfer of data comprises image data and is back to remote platform and remote platform authorization information is back to terminal two parts.When terminal collection and after enciphered data, terminal can be set up transfer of data to remote platform application and connect, to 3G, 4G Radio Transmission Technology be utilized to carry out data back after remote platform verification terminal mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) data, return data be mainly back to remote platform; When data back to remote platform during terminal can be asked to terminal return data, terminal can send mobile device international identity code (IMEI) and international mobile subscriber identity (IMSI) data again to remote platform, and remote platform can carry out data back after confirming.
In addition to the implementation, the present invention can also have other execution modes, and all employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop in the protection range of application claims.

Claims (5)

1. a power telecom network on-the-spot operation/maintenance data encrypted transmission verification method, it is characterized in that, the method comprises the following step:
(1) remote system is realized in wireless transmission public network for the binding management of intelligent terminal with mobile device international identity code and international mobile subscriber identity;
(2) O&M on-site data gathering is carried out with the intelligent terminal being configured with infrared scan function;
(3) data encryption process
30 authorization informations as mobile device international identity code and international mobile subscriber identity in 128 of IDEA secret keys are combined, in the process of encryption image data, continuous print 32 bit data in the secret key of Stochastic choice, 16 is 1 group totally 2 groups, 2 groups of data replace with mobile device international identity code and international mobile subscriber identity respectively, because mobile device international identity code and international mobile subscriber identity are 15, often organize 1 bit data stochastic generation in 16 bit data, thus realize the encryption for transmission data;
(4) transfer of data
Wireless public network is utilized to realize transfer of data between the intelligent terminal of binding and remote system;
(5) data deciphering
Deciphering remote system being received to data is realized with the secret key that data encryption processing method uses; The subkey block of deciphering is inverse by the addition of encryption subkey or multiplication is inverse is formed; After data decryption, verified the legitimacy of data decryption by mobile device international identity code and international mobile subscriber identity, the data result that valid data just can carry out next step is verified, directly will not abandoned by the data of checking, and reports to the police;
(6) data result checking
Data result checking is the process utilizing remote system checking transmission data whether to meet O&M field requirement, no matter whether the result correctly all will feed back the result, comparing service is responsible for terminal collection and the data transferring to remote platform are verified, to determine whether scene completes maintenance work on request;
(7) data encryption
To the result data encryption after remote validation;
(8) data back
Realize the point-to-point transmission of remote system and intelligent terminal with wireless public network, realize the correct passback of the result data;
(9) data deciphering
Intelligent terminal carries out the deciphering of the result data, thus determines whether on-the-spot O&M result meets the requirements.
2. power telecom network as claimed in claim 1 on-the-spot operation/maintenance data encrypted transmission verification method, it is characterized in that, described step (3) data encryption process is that two groups of continuous 16 bit data separated are replaced with mobile device international identity code and international mobile subscriber identity, often organizes 1 stochastic generation in 16 bit data.
3. power telecom network as claimed in claim 1 on-the-spot operation/maintenance data encrypted transmission verification method, it is characterized in that, the intelligent terminal that described step (2) carries out O&M on-site data gathering also configures RFID recognition function.
4. power telecom network as claimed in claim 1 on-the-spot operation/maintenance data encrypted transmission verification method, it is characterized in that, the intelligent terminal that described step (2) carries out O&M on-site data gathering also configures GIS function.
5. power telecom network as claimed in claim 1 on-the-spot operation/maintenance data encrypted transmission verification method, it is characterized in that, the intelligent terminal that described step (2) carries out O&M on-site data gathering also configures barometric surveying function.
CN201410538004.5A 2014-10-13 2014-10-13 Power telecom network scene operation/maintenance data encrypted transmission verification method Active CN104301317B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410538004.5A CN104301317B (en) 2014-10-13 2014-10-13 Power telecom network scene operation/maintenance data encrypted transmission verification method
PCT/CN2014/093881 WO2016058259A1 (en) 2014-10-13 2014-12-15 Encryption transmission and verification method for power communication network field operation and maintenance data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410538004.5A CN104301317B (en) 2014-10-13 2014-10-13 Power telecom network scene operation/maintenance data encrypted transmission verification method

Publications (2)

Publication Number Publication Date
CN104301317A true CN104301317A (en) 2015-01-21
CN104301317B CN104301317B (en) 2019-03-08

Family

ID=52320885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410538004.5A Active CN104301317B (en) 2014-10-13 2014-10-13 Power telecom network scene operation/maintenance data encrypted transmission verification method

Country Status (2)

Country Link
CN (1) CN104301317B (en)
WO (1) WO2016058259A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471894A (en) * 2015-12-28 2016-04-06 国家电网公司 Electric power communication mobile operation and maintenance site data encryption, verification and transmission method
CN109194614A (en) * 2018-07-31 2019-01-11 温州市图盛科技有限公司 A kind of electric power data processing method based on block chain
CN109885523A (en) * 2019-02-22 2019-06-14 山东欧德利电气设备有限公司 A kind of remote analog amount transmission technology

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109000711A (en) * 2018-05-18 2018-12-14 深圳供电局有限公司 A kind of electric power line pole tower cruising inspection system and its method for inspecting
CN111541709A (en) * 2020-05-06 2020-08-14 广东纬德信息科技股份有限公司 Encrypted transmission system and encrypted transmission method based on power distribution
CN111935273A (en) * 2020-08-05 2020-11-13 江苏大烨智能电气股份有限公司 Operation maintenance system of power distribution equipment
CN112118244A (en) * 2020-09-10 2020-12-22 安恒环境科技(北京)股份有限公司 Water quality online monitoring data verification method and verification system
CN113392414B (en) * 2021-05-27 2023-04-11 国网福建省电力有限公司营销服务中心 Closed-loop checking method for household variable relationship of power station area based on station area identifier
CN114025001A (en) * 2021-10-25 2022-02-08 安庆师范大学 Agent card information transmission control system based on cloud service
CN114598492A (en) * 2021-12-22 2022-06-07 航天信息股份有限公司 System and method for co-acquiring and sharing data
CN114286204B (en) * 2021-12-27 2024-01-05 深圳供电局有限公司 Remote communication method and system of intelligent air switch
CN114399009A (en) * 2021-12-31 2022-04-26 贵州电网有限责任公司 Data acquisition method for power equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
CN103264717A (en) * 2013-05-21 2013-08-28 北京泰乐德信息技术有限公司 Rail transit comprehensive monitoring scheduling coordinating and operation and maintenance information-based system
CN103888292A (en) * 2014-02-25 2014-06-25 北京科东电力控制***有限责任公司 Tool and method for operation and maintenance of distribution terminal
EP1905191B1 (en) * 2005-07-20 2014-09-03 Verimatrix, Inc. Network user authentication system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655643A (en) * 2011-03-04 2012-09-05 希姆通信息技术(上海)有限公司 Wireless data encryption method and wireless data decryption method
CN102495983B (en) * 2011-12-08 2014-08-27 孙紫阳 Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN103209240A (en) * 2013-03-19 2013-07-17 东莞宇龙通信科技有限公司 Method and system for encrypting and deciphering data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1905191B1 (en) * 2005-07-20 2014-09-03 Verimatrix, Inc. Network user authentication system and method
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
CN103264717A (en) * 2013-05-21 2013-08-28 北京泰乐德信息技术有限公司 Rail transit comprehensive monitoring scheduling coordinating and operation and maintenance information-based system
CN103888292A (en) * 2014-02-25 2014-06-25 北京科东电力控制***有限责任公司 Tool and method for operation and maintenance of distribution terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471894A (en) * 2015-12-28 2016-04-06 国家电网公司 Electric power communication mobile operation and maintenance site data encryption, verification and transmission method
CN109194614A (en) * 2018-07-31 2019-01-11 温州市图盛科技有限公司 A kind of electric power data processing method based on block chain
CN109885523A (en) * 2019-02-22 2019-06-14 山东欧德利电气设备有限公司 A kind of remote analog amount transmission technology

Also Published As

Publication number Publication date
WO2016058259A1 (en) 2016-04-21
CN104301317B (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN104301317A (en) Power telecommunication network field operation and maintenance data encryption transmission and verification method
CN102036238B (en) Method for realizing user and network authentication and key distribution based on public key
CN105553951A (en) Data transmission method and data transmission device
CN106375390B (en) Data transmission method, system and its apparatus in a kind of Internet of Things
WO2010077910A3 (en) Enhanced security for direct link communications
CN106059757A (en) Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN102412967A (en) Data transmission system and method
CN102682506A (en) Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN101707767B (en) Data transmission method and devices
CN105553669B (en) A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication
CN110401530A (en) A kind of safety communicating method of gas meter, flow meter, system, equipment and storage medium
CN109905371A (en) Two-way encrypted authentication system and its application method
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN106161477A (en) A kind of communication system of end to end security
CN105208028A (en) Data transmission method and related device and equipment
CN112671710A (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN103441850A (en) Wireless security router, power distribution network data transmission system and operating method thereof
CN102938762B (en) A kind of file safety management system based on mobile terminal
CN114500064B (en) Communication security verification method and device, storage medium and electronic equipment
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
CN111224958A (en) Data transmission method and system
CN211063620U (en) Quantum key distribution site and system based on post-quantum cryptography
CN102158856A (en) Mobile terminal identification code authentication system and method, server and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant