期刊文献+

基于移动终端的变电站导航系统设计与实现

Design and implementation of substation navigation system based on mobile terminal
下载PDF
导出
摘要 为解决巡检人员到达偏远的变电站寻址困难而造成大量时间浪费的问题,文中设计并实现了一个基于移动终端的变电站导航系统,文中重点论述了系统用户身份认证方案,敏感地理位置数据的加密机制以及变电站离线导航的实现,该系统运行稳定,安全性高,在保障变电站位置不被泄露的前提下,为巡检人员减少了不必要的时间浪费。 It is difficult for inspectors to find remote substations which leads to waste a lot of time for addressing. In order to solve the problem,this paper presents designs and implementation of a substation navigation system based on mobile terminal. This paper focuses on the system user identity authentication scheme,the encryption mechanism of sensitive geographic location data and the off-line navigation of substations. The system runs stably and safely. Furthermore it not only ensures that the substation location is not leaked,but also saves unnecessary time for inspectors.
作者 徐修远 余容 徐志聘 郝越峰 XU Xiu-yuan;YU Rong;XU Zhi-pin;HAO Yue-feng(Guizhou Power Grid Corporation Guiyang Power Supply Bureau,Guiyang 550002,China;Power construction Corporation Of China Guizhou Electric Power Design&Research Institute Corporation Limited,Guiyang 550002,China)
出处 《信息技术》 2019年第1期71-74,78,共5页 Information Technology
关键词 身份认证技术 信息加密技术 离线导航 变电站巡检 authentication technology Information encryption technology Off-line navigation Substation inspection
  • 相关文献

参考文献7

二级参考文献22

  • 1罗斌,裘正定.网络身份认证新技术[J].计算机安全,2005(10):29-31. 被引量:14
  • 2Gaskell G,Looi M. Integrating smart cards into authentication systems [A]. Advances in Cryptology-EUROCRYPT' 1995 Proceedings [C].Berlin:Spring Verlag, 1995:271 - 281.
  • 3Schneier B. Applied cryptography: protoclos, algorithms, and souce code in C(Sencond edition) [M].John Wiley & Sons. Inc., 1996.
  • 4T S Biometrics Inc. Biomerics[EB/OL] .http://www.tsbio.co.kr.
  • 5OGORMAN L. Comparing passwords, tokens, and biometrics for user authentication[J]. Proceedings of the IEEE, 2003, 91(12): 2021-2040.
  • 6BONNEAU J, HERLEY C, VAN OORSCHOT P C, et al. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes [C]// 2012 IEEE Symposium on Security and Privacy. IEEE, 2012: 553-567.
  • 7LAMPORT L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24 ( 11 ) 770-772.
  • 8M'RAIHI D, BELLARE M, HOORNAERT F, et al. HOTP: An HMAC-based one-time password algorithm [DB/OL]. 2005-12[2014-7-13]. http://tools, ietf. org/html/rfc4226.
  • 9MRAIHI D, MACHANI S, PEI M, et al. TOTP: Time-based one-time password algorithm[DB/OL]. 2011-5 [2014-7-13], http://tools, ietf. org/html/rfc6238.
  • 10SOPHOS OmbH. Sophos Authenticator[CP/OL]. (2014-7-8)[2014-7-28]. https://itunes, apple, com/us/app/ sophos-aut henticator/id864224575.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部