CN104063756A - Electric power utilization information remote control system - Google Patents

Electric power utilization information remote control system Download PDF

Info

Publication number
CN104063756A
CN104063756A CN201410222825.8A CN201410222825A CN104063756A CN 104063756 A CN104063756 A CN 104063756A CN 201410222825 A CN201410222825 A CN 201410222825A CN 104063756 A CN104063756 A CN 104063756A
Authority
CN
China
Prior art keywords
data
application
marketing
control system
calculating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410222825.8A
Other languages
Chinese (zh)
Inventor
范继臣
宫庆申
孙天雨
田浩杰
崔新廷
王浩淼
王志斌
赵宇东
张冶
关艳
高曦莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Liaoning Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Liaoning Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Liaoning Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410222825.8A priority Critical patent/CN104063756A/en
Publication of CN104063756A publication Critical patent/CN104063756A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to an electric power utilization information remote control system. The electric power utilization information remote control system comprises a marketing business system, a marketing real-time charge remote control system, a load control system, an electric power utilization information collection system, a short message platform and a headquarter customer service system. The marketing real-time charge remote control system comprises a charge control and management program, an electric charge calculation program as well as a charge control strategy application and exception management program. The system can comprehensively, safely and efficiently achieve full support for all businesses of the marketing real-time charge remote control application as well as performs operations such as alarming, power cutting and power restoration according to calculation results, thereby playing a role of a smart meter, achieving interaction between purchase and sale, ensuring business smoothness and electric charge recovery, improving work efficiency, reducing labor costs, saving energy, being user-friendly and enhancing customer satisfaction.

Description

Remote power utilization information control system
Technical field
the present invention relates to a kind of remote power utilization information control system.
Background technology
user uses intelligent electric meter universalness progressively at present, but electric system is to user's the management of power use and subscriber payment etc. also there are some imperfections in some intellectuality manipulations that relate to the aspects such as power consumption, often have electricity consumption client payment not in time with have a power failure before the phenomenon of payment, and that the time span of artificial power failure operation is carried out in electric system is long, operation cost is higher, the situation of frequent appearance " payment before having a power failure ", also be unfavorable for accurately controlling and calculating in real time the service condition of electric weight expense, also can directly affect the part power supply enterprise electricity charge and reclaim difficult problem, in the case, for reducing electricity consumption operation cost, save the energy and facilitate electricity consumption client electricity consumption operation, accomplish in time, effectively user is stopped, telegram in reply operation, the application of the further degree of depth of intelligent electric meter is needed to exploitation, change the collection from simple electric weight, further gather to user's side integrated data, change user power utilization management, thereby can realize efficient, economical, intelligentized power grid application.
therefore, need to carry out at present the scheme of the long-range real-time expense control application of a set of marketing to realize installation, the electricity cost control of user's side of intelligent meter and to manipulate with user's real-time interactive, increase work efficiency, save power consumption cost.
present stage, each electric company expense service control is substantially taking the local charge control such as terminal, electric energy meter as main inside the province, it is simple that this kind takes prosecutor formula way to manage, but can not meet the new electricity price of country and adjust requirement, also there is the risk in user's credit worthiness and law or policy simultaneously, the part electric company having is at present along with the construction of acquisition system, carried out taking main website and Batch Processing system as the remote bill control relying on and attempted, but the expense control business need of company, construction mode, communication protocol etc. not yet there is unified standard.
ongoing remote bill control is attempted the main fixed cycle electricity charge account form taking day as least unit, and the unrealized expense control cycle defines flexibly, is difficult to meet quasi real time expense control business need; The unrealized control full process automatization target of taking, registration examination & verification, charging examination & verification, expense control order issue etc. also needs a large amount of artificial participation work; Imperfect for the collection bringing due to communication channel etc., issue not in time, the electricity charge reclaim control problem not in place, there is no effective on-site task assistant means; For taking, control terminal quantity is large, and the network coverage is wide etc., lacks specific aim safety prevention measure; Because expense control system is to be structured on sales service application system, power information acquisition system etc., take effective running of control business, closely integrated between the each system of needs, between the relevant each system of existing expense control, lack uniform data and share and interoperability standard.
Summary of the invention
it is high to solve electric cost that task of the present invention is to provide a kind of remote power utilization information control system, and intelligent degree is inadequate, reduces the problem of work efficiency.
a kind of remote power utilization information control system proposed by the invention comprises sales service system and the long-range real-time expense control system of marketing, negative control system, power information acquisition system, SMS platform and general headquarters' customer service system, the long-range real-time expense control system of described marketing comprises: control of expenses program, electricity charge measuring and calculating program, the application of expense control strategy and exception management program.
described expense control tactical management program refers to according to user's classification of electricity consumption client, power consumption situation, application of policies time, credit grade etc., formulates all standard strategy that takes control business.Comprise the management of expense control policy criteria, the management of instruction extension distributing policy, credits threshold standard management.
described electricity charge measuring and calculating program is to carry out the calculating of all types of electric weight of electricity consumption client, the electricity charge according to the electricity price standard of electricity consumption client's meter reading data, electricity consumption customer profile information and execution.Voltameter is shown in electric weight, transformer loss electric weight, line loss electric weight to copying, reduces electric weight (main submeter, turn confession, fixed than quantitatively) at last, move back benefit electric weight all kinds electric weight calculates, and draws measuring and calculating electric weight; By measuring and calculating electric weight and corresponding electricity price, calculate the various electricity charge again.The calculating that comprises catalogue power cost, basic charge as per installed capacity, power factor adjustment charge, levies on the behalf each electricity charge types such as the electricity charge is calculated in the measuring and calculating electricity charge.After calculating, the electric weight electricity charge information of automatically auditing measuring and calculating according to the auditing rule arranging, to carrying out benchmark comparison by the user of examination & verification.
described expense control application of policies program is according to the result of benchmark comparison, generates and takes the application of policies request of controlling user, comprising: prompting, early warning, cancellation early warning, power failure, telegram in reply.
described exception management program refers to and receives occur in electricity charge measuring and calculating abnormal, comprises that the electricity charge calculate unsuccessfully and examine dyskaryotic data etc., and abnormal information is sent to sales service applies processing.
a kind of remote power utilization information control system proposed by the invention is by long-range real-time control application and two the one-level function topic module compositions of sales service application of taking of marketing, realize comprehensive support that the long-range real-time expense control of marketing is applied to every business, realize and take the installation of controlling intelligent meter, exchange for, power purchase business, realize calculation expense service control in real time or quasi real time, and carry out and report to the police according to results of measuring, have a power failure, the operations such as telegram in reply, embodiment intelligent meter is worth, guarantee business is smooth, guarantee electricity charge recovery, increase work efficiency, reduce human cost, save the energy, facilitate user and increase customer satisfaction degree.
Brief description of the drawings
accompanying drawing 1 is an overall flow figure of a kind of remote power utilization information control system of proposing of the present invention.
accompanying drawing 2 is reading manner process flow diagrams of the marketing data of a kind of remote power utilization information control system of proposing of the present invention.
accompanying drawing 3 is the data circulation schematic diagram of marketing in remote power utilization information control system between long-range real-time expense control system and other service application or operation system.
accompanying drawing 4 be in remote power utilization information control system, market the application of long-range real-time expense control application and sales service, Electric Energy Acquisition System data circulation and share Data support schematic diagram be provided.
accompanying drawing 5 is that logic diagram is from top to bottom applied in the long-range real-time expense control of marketing.
accompanying drawing 6 is security protection reference mark block diagrams of marketing remote bill control application.
accompanying drawing 7 is access control authority process flow diagrams in the long-range real-time expense control security of system application of marketing.
embodiment
referring to Fig. 1 and Fig. 2, Fig. 3 and Fig. 4, remote power utilization information control system comprises sales service application system 1 and the long-range real-time expense control application system 2 of marketing, negative control system 3, power information acquisition system 4, SMS platform 5 and general headquarters' customer service system 6, in the initial stage of system Construction and operation, the long-range real-time expense control system 2 of marketing is calculated required customer information file data and need to from sales service application system 1, be copied, the long-range real-time expense control system 2 of marketing possesses architecture evolution ability, in the situation that marketing Base data platform is built each side conditions being possessed, the obtain manner of the long-range real-time expense control system of marketing 2 needed marketing datas is by copying marketing storage facility located at processing plant data evolution for reading from marketing Base data platform, the long-range real-time expense control business of marketing after evolution mainly comprises expense control tactical management, electricity charge measuring and calculating, take control application of policies and exception management program.
for overhead cost control files on each of customers, carry out and take the control task of controlling user, sales service application needs synchronous revision and data circulation, by the combing that the long-range real-time expense control of marketing is applied to every business diagnosis and application function, extract concrete function theme and applied function module, according to the method for designing of application architecture and standard, realize comprehensive support that the long-range real-time expense control of marketing is applied to every business.specifically be illustrated from different steps and stage below, first trip is classified to data technique:
Different classes of data exist different technology to realize demand in the time of storage, calculating, transmission, therefore need data to classify, and then realize Classification Management.
According to State Grid Corporation of China's data classification principle, the data of the long-range real-time expense control application of marketing are divided into
Two levels, ground floor is: quasi real time data of structural data, unstructured data, magnanimity; The structural data of the second layer is metadata and coding, business datum, and non-structured data is made up of document, and magnanimity quasi real time data is made up of business datum.Specifically be summarized as follows table:
According to technical characteristic, the data of expense control application can be divided into 7 large classes again, and it is as shown in the table:
After data are classified, for the circulation of data, marketing, long-range real-time expense control application is main and sales service is applied, Electric Energy Acquisition System exchanges data, copy marketing base profile data by the long-range real-time expense control application of marketing from sales service application, obtain from Electric Energy Acquisition System the registration data of checking meter.After electricity charge result of calculation generates, the long-range real-time expense control application system of marketing pushes expense control request msg to sales service application system.The long-range real-time expense control of marketing is applied the region that relates to data circulation and store and is divided into again expense control storage facility located at processing plant, buffer area, data exchange zone, data loading engine, data write-back engine, calculates engine in real time, asks to push engine etc.The long-range real-time expense control application of marketing provides data supporting by circulating and share with the data of sales service application, Electric Energy Acquisition System, specifically referring to Fig. 4: in sales service application 1, copy in real time the data such as customer profile in marketing storage facility located at processing plant, charging, standard code by data Replica software to expense control database.In the long-range real-time expense control system 2 of marketing, loading the real-time electricity charge of engine by data calculates necessary marketing data and is loaded in cache cluster, the follow-up real-time electricity charge are surveyed and when Pang engine obtains archives or code data, are no longer controlled database by expense but obtain by access cache cluster, this will greatly improve real-time measuring and calculating speed, refresh by the technology of trigger the buffer memory that basic data changes.
Push in engine 1, get a collection of expense control request by task management service, 2, expense control request is pushed to sales service application, 3, inform task management service fee control request propelling movement situation in request.
By database replication technology, the electricity consumption client of marketing storage facility located at processing plant, charging archives, billing parameter, account balance etc. are synchronized to expense control storage facility located at processing plant, in order to market, long-range real-time expense control application provides customer profile data.
Take the essential basic data of measuring and calculating such as electricity consumption client, charging archives, billing parameter, meter reading data, application of policies, account balance, expense control strategy of controlling storage facility located at processing plant, pre-loaded to buffer area.
Power information acquisition system provides to the long-range real-time expense control application of marketing the registration data of checking meter by the mode of middle database, and negative control system provides to the long-range real-time expense control application of marketing the registration data of checking meter by the mode of middle database.Measuring and calculating engine reads from middle database the registration of checking meter in real time, and the registration of checking meter is resolved and is organized as the meter reading data of standard format, is directly loaded into the calculating internal memory of measuring and calculating program.When meter reading data loads after calculating internal memory, start to carry out measuring and calculating program, measuring and calculating process removes to obtain in buffer memory customer information file data according to meter reading data, then carry out internal memory calculating, produce results of measuring, then to taking control storage facility located at processing plant write-back results of measuring, table specific as follows:
Swap data entity Origin system Goal systems
Electricity consumption client Marketing storage facility located at processing plant Take control storage facility located at processing plant
Charging archives Marketing storage facility located at processing plant Take control storage facility located at processing plant
Billing parameter Marketing storage facility located at processing plant Take control storage facility located at processing plant
Account balance Marketing storage facility located at processing plant Take control storage facility located at processing plant
Electricity consumption client Take control storage facility located at processing plant Buffer area
Charging archives Take control storage facility located at processing plant Buffer area
Billing parameter Take control storage facility located at processing plant Buffer area
Meter reading data Take control storage facility located at processing plant Buffer area
Application of policies Take control storage facility located at processing plant Buffer area
Account balance Take control storage facility located at processing plant Buffer area
Take control strategy Take control storage facility located at processing plant Buffer area
Extremely Take control storage facility located at processing plant Marketing storage facility located at processing plant
Take control strategy Take control storage facility located at processing plant Marketing storage facility located at processing plant
Take control application Take control storage facility located at processing plant Marketing storage facility located at processing plant
Through being turned over to Cheng Jinhang, market long-range real-time expense control application data classification and data stream analyze, according to long-range real-time control application data circulation and the processing mode of taking of marketing, be divided into: marketing data is synchronous, marketing data loads, gather registration receptions, results of measuring write-back, five data handling procedures of expense control request propelling movement.
If marketing Base data platform can externally provide service, follow-up base profile data no longer copy from marketing storage facility located at processing plant, read but change from marketing Base data platform, if expense control user is less than 4,000,000, can consider not use the scheme of buffer memory.
The long-range real-time expense control of marketing is applied on logic level and is divided into from top to bottom: data Layer, data access layer, application layer and represent layer.
logical level task description technology realizes logical level relies on interlayer communication
represent layer final user's use interface, is responsible for representing of data, accepts user input data simultaneously, and the data of input are carried out to verification, the data of package interface layer input, and page jump control, to extremely processing main HTML, CSS, FLEX, FLASH, JavaScript and the JSP traditional page technology for revealing of adopting, chart represents employing report tool application layer transmit by http agreement
application layer the interface of service logic is provided, realizes service logic, affairs are controlled, Web service is externally provided or calls the Web service that external system provides weblogic 11g, J2EE data access layer web services calls, API Calls
data access layer be provided for the structure of visit data layer data. jDBC, buffer memory product A PI. data Layer aPI Calls
data Layer formed by database and buffer memory adopt oracle database nothing nothing
Physical structure
Apply reliable even running for ensureing the long-range real-time expense control of marketing, meet traffic growth and change the requirement that the extensibility brought and company's software and hardware resources are integrated, physics in conjunction with existing hardware basis planning and design is disposed, the long-range real-time expense control application of marketing adopts the construction of secondary deployment mode, in the centralized and unified deployment of province (city) company, for guarantee fee control measuring and calculating in real time and sales service application operation independence and operational reliability, the long-range real-time expense control system of marketing adopts stand-alone mode to dispose: the hardware and software platform of system operation is relatively complete, the independent data storage area of building, take control measuring and calculating in real time district, buffer memory distributive province.
For protection corporate investment; effectively utilize the built resource of company; take the basic network environment etc. of control system operation by the unified construction of (city) the Xin Tong department of provinceing; data backup device is included company of province (city) uniform data standby system in, and load-balancing device reuses and uses the balancing equipment of having purchased in marketing programs.
Integrated architecture: between each system integration realization technology comprise that interface is integrated, data integration, three kinds of modes of application integration.Concentrate the function pages that represents related service system for need, and do not affect former operation system business operation, the frequent situation of switching the page while simultaneously avoiding user to login different system, adopts the integrated mode in interface to realize; Share the situation that relates to large-scale data transmission, shifts for inter-system data, can realize by the mode of data integration; Relate on a small quantity quasi real time data transmission, transmission of messages for system information interaction and data sharing, can realize by application integration mode.
Market long-range real-time expense control application and the total figure of other system integration relation referring to Fig. 3.
Interface is integrated
The integrated demand of expense control application interface comprises integrated, integrated with door " todo list " with enterprise portal.
Interface is integrated is to realize one of integrated means of software; refer to the unify menu of several related systems is integrated into an interface; make user reach unified entrance; unified interface; the frequent page that switches while avoiding logining different system; and protect the original investment of user, the advantage of several systems is integrated together.Interface integration mode is less on original operation system impact, and original operation system only need provide URL address or the interface of the correlation function page.
Conventionally the integrated implementation in interface has:
1. URL mode
Undertaken directly integrated by embed related system URL link in the iFrame of system interface framework.
2. Portlet mode
Call by Portlet the Interface realization interface that Batch Processing system provides integrated.The built operation system of company mostly is B/S structure, it is integrated that the mode of each operation system employing URL is carried out interface, realize single-sign-on function by unified identity catalog and rights management simultaneously, make user in the time being switched to different system working page, not need repeat logon.
Market the application of long-range real-time expense control application and sales service by synchronize of user authentication information, realize user's single-sign-on, sales service applies that to pass through the integrated marketing of interface integration mode long-range simultaneously
Take in real time the page of control application.
Application integration
Application integration is topmost a kind of form in integrated solution between business system, mainly refers to data and logic in application software and the system set up based on various different platforms, different schemes are carried out quasi real time integrated.
Data integration
Data integration is the most general a kind of form in integrated solution between existing enterprise's system, mainly refers to the data of separate sources, form, feature character logically or physically organically to concentrate, thereby provides comprehensive data sharing for enterprise.Data integration occurs in database and the data source rank in enterprise, by data migration being completed to data integration to another one data source from a data source.
The main implementation of data integration is data Replica.Data Replica is a kind of structural data reproduction technology based on daily record, and it obtains the additions and deletions changeization of data by resolving the online daily record of source database or archive log, then by these change application to target database, realize source database and synchronize with target database.Data Replication Technology in Mobile can realize copying in real time of mass data submicrosecond one-level between the IT of isomery foundation structure.
Security architecture
Infringement degree according to GB/T 22240-2008 " information system security class protection deciding grade and level guide ", " electric power industry information system safe class protection Grading Work instruction " from business information safety protection grade and two aspects of system service class of security protection are damaged to the long-range real-time expense control system of marketing is analyzed.Analyze and show that the class of security protection of the long-range real-time expense control system of State Grid Corporation of China's integrated information system marketing is the S3A3G3 in the third level according to business information class of security protection matrix table and system service class of security protection matrix.
Market long-range real-time expense control application safety protection according to " State Grid Corporation of China's intelligent grid protecting information safety overall plan " requirement, follow the security strategy of " point differentiation territory, safe access, dynamic sensing, lean management, protection comprehensively ", and according to the constantly perfect protection of strengthening system of operation system, safe, the reliable and stable operation of safeguards system to greatest extent.
The objective of defense:
1. ensure that the long-range real-time control system user identity of taking of marketing is genuine and believable, prevent malicious user, unauthorized user access;
2. ensure integrality, the confidentiality of user's transmission and interaction data: while taking precautions against user's access application server, data are ravesdropping, distort.Taking precautions against sensitive information is revealed as user password password, business datum;
3. ensure the long-range real-time security that takes control system of marketing, prevent the unauthorized access, sensitive data of application system resource to leak and to system rogue attacks etc.
Security boundary
The long-range real-time expense control system of marketing is that information Intranet is disposed, and security boundary relates to border between the horizontal territory of information Intranet, and provides safeguard procedures for security boundary.
Application safety
Should realize giving, changing and formulate strict examination & verification, approval, operating process for authority, authority variation can be carried out the mutual each link of the long-range real-time expense control application safety protection Design covering system of marketing after examination & verification approval, carry out the disposition design of application safety, comprise the protection Design to each defense controls point, effectively take precautions against the unauthorized access to application, ensure the safety of application.Fig. 6 is the security protection reference mark of marketing remote bill control application, is the reference mark that application safety need to protect in frame.
Application safety protection is carried out safety and Protection from aspects such as authentication, mandate, input and output checking, configuration management, session management, encryption technology, parameter operation, exception management, examination & verification and daily records.
Authentication
Identification authentication mode
The application of marketing remote bill control needs to set up the authentication management system that is applicable to own service feature;
Storage and the transmission security of password are set;
Protection authentication Cookie; The storage of password and transmission security Strategy Design
Use ciphertext transmission user log-on message and identity documents.
Ciphertext storage user cipher in database or file system.
Forbid preserving user cipher in COOKIE.
Password Policy
The long-range real-time expense control system of marketing provides following function, reduces the security risk facing in authentication process.
IP binding
Designated user logs at certain computer (IP), reduces illegitimate client and pretends to be this user to attack the risk of service end.
Password amendment cycle and password are reused number of times restriction
When logging in, user revised user cipher window interface by mandatory requirement.
User cipher intensity strategy
When user cipher is set, the length of mandatory requirement password string and inscape.
Password Policy is effective to all operations person, comprises the length of password, the multiplicity of the inscape of password and the new Old Password of amendment.
Locking user
For preventing that illegitimate client from passing through the method for exhaustion, send to service end the request of logging in continuously and attempt to guess user cipher, the long-range real-time expense control system of marketing provides and automatically locks client-requested function; When client is in certain hour section, while logging in unsuccessfully continuously, system is automatically this client ip locking, until lock the overtime or manual release of keeper.
Authorize
The long-range real-time expense control system of marketing adopts based on role-based access control model access control authority.In long-range real-time expense in control system of marketing, authority (being operation and the access permission of resource) is assigned to post (being role), and post is assigned to user's (or claiming operator).
Different users is under the jurisdiction of different posies, and different posies is assigned to different authorities, has different authorities thereby reach different users.
In the long-range real-time expense control system of marketing, concrete power limit is various in detail, is roughly divided into three types: functional module authority, function menu authority and data permission according to range of control.
Note: the dirigibility of assigning for strengthening authority, discrete function allows authority to be directly assigned to user, as form authority.
In the long-range real-time expense control system of marketing, some authority setting need to be by coming into force after examination & approval person's examination & approval.As post is assigned after " functional module authority " and " function menu authority ", need to be through system examination & approval person's examination & verification examination & approval.
The long-range real-time expense control system of marketing is supported delegation function, when a certain user is because going on business or other reasons temporarily cannot be fulfiled relevantly when functional, can give other people on behalf of processing my part permission grant, and can regain at any time the authority of having entrusted.
Delegation function self provides audit log function, is convenient to later security audit.
Input and output checking
Market that long-range real-time expense control system is filled at document, voucher is filled in, querying condition etc. input page unification inputs the verification operation of data and the format manipulation of output data, concrete steps are as follows:
The format of client to input data
All kinds of pages of being filled in by user of the long-range real-time expense control system of marketing, first format input data, and such as URL, date, numeral etc., guarantee correct format
Client is carried out format verification by regular expression
This step is used for verifying that whether the format result of previous step is correct, for example URL, EMAIL, Chinese character, integer, phone etc.
Client is carried out the detection of special character to input
Comprise: single quotation marks, 1=1, or etc. prevent SQL injection attacks, back slash, CDATA etc. prevent XML injection attacks, and branch, for, loop etc. prevent script injection attacks
The format of service end to input data
Service end is carried out format verification by regular expression
Service end is carried out the detection of special character to input
Service end is carried out the checking of rightness of business to input data
Obtain sensitive parameter in service end by special purpose interface
In service end, the information of returning is formatd, and be the close friend's output through service design, avoid sensitive information leakage simultaneously.
Configuration management
The long-range real-time expense control system of marketing has adopted following measure to configuring safety:
The configuration files such as database connection are managed by middleware, other every configuration files that have administration interface, and management all must and have log recording through authority checking.
Can only and there be strong authentication inspection control at the configuration management interface of the long-range real-time expense control system of marketing from this locality login, coordinates the service logic inspection of service end, even if service end inspection also cannot be walked around by illegal explosion in interface.
The long-range real-time expense control system of marketing adopts role or user ID to carry out management concession, and for example role examines function, and restriction can only be processed by system examination & approval person.
Session management
The long-range real-time expense control system of marketing has been taked following measure to secure session:
By configuring rational session duration, be for example set as 60 minutes, can automatically remove session in the long-range real-time control system of taking of overtime rear marketing
Only allow to use HTTP POST mode to do data submit operation, and the association attributes of Cookie and HTTP is carried out to safe setting, httponly attribute is set is the operation of true restriction client javascript to cookie, maxage attribute is set is 0 cookie was lost efficacy after exiting browser.
After logining successfully, create new session, generate new session id and do not reuse the identical session id of former session, by session and IP address binding are arranged, reduce the stolen risk of session.
Session data is kept at service end by the long-range real-time expense control system of marketing, and avoids unauthorized access, and carry out strict input data variation, avoids illegally distorting
The long-range real-time expense control system of marketing provides the strong authentication step of re-authentication for key business, for example, when bank-enterprise interconnection, must provide certificate
In the time that user publishes or closes browser, the long-range real-time expense control system of marketing can be pointed out user and thoroughly remove session information, guarantees that the safety of session stops.
Encryption technology
The long-range real-time expense control system of marketing adopts following encryption measures to Various types of data:
Password: adopt ciphertext to preserve, the cryptographic algorithm of use should meet the encryption technology designing requirement of Guo Wang company.
Message: use the transmission of HTTPS security protocol, use RSA agreement encrypted transmission, use digital signature to guarantee information completely and transmission security, use Base64 coding to preserve.
Sensitive data: use algorithm for encryption to preserve, the cryptographic algorithm of use should meet the encryption technology designing requirement of Guo Wang company.
Integrated data: all employings SFTP security protocol transmission turning by ftp flow for file type, other types data are used the transmission of HTTPS security protocol, for key business data, adopt digital signature to carry out security protection.
Parameter operation
The security control measure that the long-range real-time expense control system of marketing adopts in parameter operation is as follows:
The long-range real-time expense control system of marketing to input message format, the multiple check such as client validation, service end checking, and control sensitive parameter and can only obtain from service end
Market long-range real-time expense control system session voucher and account IP identifies client, and uses in sensitive information being loaded into session internal memory in the process loading in business, is not directly transferred to client
The long-range real-time expense control system of marketing is only used HTTP POST mode to submit information to
Key business inquiry is carried out transmitting after Base64 coding encrypting
The filtrator that the long-range real-time expense control system of marketing is used the unified authority platform of state's net to provide is tackled and session credential verification whole access URL, for any unauthorized access, jumps to without exception login page log.
Exception management
The application of marketing remote bill control is used Structured Exception Handling mechanism;
The application of marketing remote bill control is used general error message;
When program occurs when abnormal, stop current business, and current business is carried out to rolling back action, ensure the completeness and efficiency of business, can nullify if desired active user's session;
When the generation of designing program is abnormal, in daily record, record detailed error message.
Daily record and audit
Marketing remote bill control is applied in log events, records operator, running time, operation place, operational motion, at least comprises following event:
Marketing remote bill control is applied about the startup of audit function and is closed;
The startup of system and stopping;
Configuration variation in system;
Access control information;
The abnormal operation event of user to data.
Data security
General requirement according to State Grid Corporation of China to data safe design, in conjunction with following table data security attributive analysis and data circulation path analysis, formulates the measure of data security protection, and to marketing, long-range real-time expense control application data is carried out safeguard protection.
To apply the data that produce be internal data to marketing remote bill control, and the personnel of intra-company can granted access, during confidentiality assignment is; Can produce significant impact to the unwarranted destruction of data or amendment, and may cause application system service disruption, integrality assignment is high; Because this project relates to user power utilization confidential data, can correctly obtain when needed expense control business information needed or cannot recover in time this information if cannot ensure, to cause real-time expense control business continuity to be affected, and cause serious traffic lost, availability assignment is high.
Confidentiality requirement
(1) generation of data or collection must be through access control, and the means of access control adopt the account of Deta bearer system self and the access control mechanisms of password or application software;
(2) confidentiality of data transmission
The security of communicating by letter between server: message, uses encryption technology to carry out Confidentiality protection to the sensitive information of transmission; File, carrys out transfer files with safe host-host protocol;
The security of client and server communication: the trusted path between message communication applications client and server: communicating pair provides real Endpoint ID, protection communication data exempts from amendment and leaks; Utilize the communication of trusted path to be initiated by server end or client; If contain sensitive data in the data of transmission, must adopt encryption technology to carry out Confidentiality protection to the significant field of transmission data, the cryptographic algorithm of use should meet the encryption technology designing requirement of Guo Wang company;
File is current is much slower than symmetric cryptography in view of the arithmetic speed of asymmetric encryption, and the file encryption that comprises sensitive data can adopt high-intensity symmetric cryptography, need to use rivest, shamir, adelman to be encrypted symmetric key, to ensure the safety of symmetric key.
(3) confidentiality that data are used
The use of data should be carried out error detection and verification operation, and ephemeral data needs to store or destroy after using;
In the use procedure of file, need to avoid producing temporary file, if there is temporary file, in situation with good conditionsi, need temporary file to do the encryption process, after temporary file uses, must destroy in time.
(4) confidentiality of data storage
Be encrypted storage for sensitive data, the cryptographic algorithm of use meets the encryption technology designing requirement of Guo Wang company;
(5) confidentiality that data are deleted
In situation with good conditionsi, should ensure that sensitive data is irrecoverable after destroying, as adopted the means such as data zero clearing, low-level formatting or storage medium physical destroying.
Data are deleted must be through access control, and the means of access control can be the access control mechanismss of account and password or the application software of Deta bearer system self.Secondary-confirmation is at least passed through in the deletion of data.
Data integrity requirement
(1) integrality of data transmission
In the transmitting procedure of data, need to ensure the integrality of data; prevent that malicious attacker from intercepting and distorting, deleting data; select to adopt use the cipher mechanism (as: MAC, signature value) of key or use hardware device (encryption equipment, encrypted card, IC-card/USB KEY) to protect integrity of data transmission, after integrity check value is attached to business datum.
(2) integrality that data are used
Ensure the integrality of deal with data by system business transaction integrality mechanism, generally carry function by calling system and realize.Error detection and verification operation are carried out in the use of sensitive data in application program, ensure correctness and the integrality of raw data.
Availability requirement
(1) availability of data acquisition
Gather or input after data, must verify the form of image data, to guarantee its availability.The mode of checking comprises: data layout checking, data length checking, data type checking, and can consider to adopt the mode of white list to verify data layout.
(2) availability of data transmission
The high data of sensitive data or availability requirement forbid adopting udp protocol in transmission, adopt Transmission Control Protocol transmission, possess broken string re-transmission simultaneously and guarantee its availability.
(3) availability of data processing
Data, in transfer process, adopt general standard format, consider the format needs of the relevant related system such as sales service application and power information acquisition system.
(4) availability that data are used
Obtain data when trusted area never, data before use, need to be verified its form, guarantee its availability.The mode of checking comprises: data layout checking, data length checking, data type checking, or consider to adopt the mode of white list to verify data layout.
Host Security
Operating system safety protecting design
The target of protected host security of system is to adopt Information Assurance technology to guarantee that business datum is entering, leave or keep availability, integrality and confidentiality when resident service device.
According to the requirement of national information safe class protection, dispose host operating system safeguard procedures according to definite grade; The safeguard procedures of operating system aspect comprise that host access control, Host Security reinforcing, main frame intrusion detection, content host safety, virus prevention, host identities are differentiated and host monitor audit.
According to the requirement of national information safe class protection, dispose host data base safeguard procedures according to definite grade; The safeguard procedures of database aspect comprise data encryption, backup recovery, resource control, remaining information protection etc.
Database safeguarding design
1. a software that installation needs
Each software defectiveness, for oracle database software, self-defined installation, only chooses the assembly needing, few mistake less of doing, it is particularly important that this point seems aspect security, one has the assembly of potential security hole, if it is not mounted.It just can not affect whole system.
2. locking or inefficacy default user
For oracle database system, when installation, have a series of default user and generate, should, after installing DB is complete, through functional screening, lock or these users of losing efficacy.
3. the password default of amendment available subscribers
The user that can not lock or lose efficacy, must amendment password default.Such as thering is the SYS user and the SYSTEM user with DBA authority of SYSDBA authority, all should revise password default.Will speak of as for being effectively controlled at below of Password Length and complicacy.
4. restriction operating system access right
Oracle database system is interdependent on operating system, if operating system is invaded by people, by serial of methods such as amendment configuration files, the security of oracle database is also by all gone so.
5. the security patch that regular update producer releases
As time goes on, producer can release a series of security patch and make up the potential safety hazard of existing system conventionally.For oracle database, should regularly check that following network address obtains the up-to-date secure alarm of Oracle company and solution.
Network security
Network environment is to support the key of the normal operation of whole application system, requires preventing malice personnel by network, operation system to be attacked, the attack that simultaneously stops malicious persons to be started the network equipment.
The safety of network environment should consider comprehensively, and this part stresses to consider to the network equipment in information Intranet delivering path and through the security protection of the business information stream of Internet Transmission.Comprising: the safe designs such as network equipment safety, network foundation service safe, network service information stream safety and structural safety, access control, safe design, intrusion defense.
System network environment is described
Network environment security protection is towards the network environment facility that network support platform is provided for the long-range real-time expense control business of marketing, safety equipment, network foundation service facility that network environment specifically comprises provides connection route, switching equipment and security protection system construction in network introduced, in the time that system is carried out Network Security Construction, require to draw network topology structure figure to embody network structure, and at network topology structure figure upper body existing network network safety protection structure.
The target of carrying out network environment security protection is that preventing malice personnel attack operation system by network, the attack that simultaneously stops malicious persons to be started the network equipment, before occurring, security incident to pass through concentrated log audit, the means such as intrusion detection time series analysis, and to information Intranet, information outer net, terminal, the perception of the safe conditions such as the network equipment and monitoring, realize giving warning in advance of security incident, find attack intension, after occurring, security incident can carry out track of issues by concentrated event auditing system and intruding detection system, event source locates to find malicious persons position or formulates in time corresponding security strategy to prevent that event from occurring again, realize post audit, tracing of malicious act and operation checked, detecting intrusion, reconstruction event and system condition, Generating Problems report.
The principle of wireless network environment security protection is that information intranet handles official business environment can not use wireless networking, and long distance wireless access via telephone line must be used safety access system.
Network equipment safety
The network equipment is included in safely the security protection that the safety equipment self such as router, switch, EPON/GPON, wireless device and fire wall, security gateway of network operation support and safety guard are provided in national grid basic network and each security domain.
The equipment that all provides network support to serve for each territory for State Grid Corporation of China, carries out security protection by three grades of basic demands of satisfy hierarchy protection.
The network equipment in each territory, by the grade of this determined security domain in territory, adopts access control, security hardening, monitor audit, identity discriminating, backup recovery, part resource control to carry out the network equipment security protection of the aspects such as device security access, equipment safety management, the scanning of equipment weakness, security incident audit, configuration file backup, processing power guarantee, device link redundancy.
EPON/GPON device security protection: EPON security protection should, according to " YD/T 1771-2008 access network technology requirement---EPON system intercommunity " related request, be carried out security protection from equipment, data and three aspects of network.
Local or Remote carries out equipment control must carry out authentication;
Formulate strict device management strategies, comprised and limit management ip address, formulation login-timeout and Account lockout strategy;
Adopt safer SSH mode to carry out telemanagement;
Adopt and carry out network monitoring and management based on SNMP V3 agreement;
Network foundation service safe
Network foundation service is the respective services for ensureing that network is normal, efficient, stable operation provides, and as DNS, DHCP etc., requires configure independently basic service system and take effective safety practice to ensure its security at information intranet and extranet.
Externally provide the server such as DNS, mail of service should be deployed in information outer net and carry out security protection, ensure the isolation of itself and internal network service system.
The name server that operation separates on different networks is obtained redundancy.
Outside and inner name server separately (are physically separated or operation BIND Views) and use transponder (forwarders).External nameserver should be accepted from the almost inquiry of any address, but transponder is not accepted.They should be configured to only accept the inquiry from home address.Close the recursive function (starting to locate the process of DNS record from root server downwards) on external nameserver.Which dns server this can limit and Internet contacts.
Restriction dynamic-dns upgrades.
Region is transmitted and is only limited on the equipment of mandate.
Utilize transaction signature to carry out digital signature to region transmission and area update.
Hide the BIND version operating on server.
Deletion operates in the unnecessary service on dns server, as FTP, telnet and HTTP.
On network periphery and dns server, use firewall services.In port/service that restrict access is needed in those DNS functions.
Should upgrade in time or application safety patch for the software version of provided service, with the threat that prevents from existing leak to be introduced because of software, as provide the BIND lowest version of DNS service to have the leak that can be utilized by malicious persons, should upgrade to more recent version.
Internet Transmission safety
When Internet Transmission, may be intercepted and captured, distort, delete, therefore will be taken safety measures to ensure the safety via Internet Transmission information at network level.
According to the requirement of national information safe class protection, dispose the safety prevention measures such as identity discriminating, data encryption, intrusion detection, content safety according to definite grade.
When business information is transmitted across security domain via network, to require and take suitable encryption and decryption measure based on information flow confidentiality, illegally do not intercepted when ensureing sensitive information via Internet Transmission; Consideration information, through the integrality of Internet Transmission, adopts digital signature means guarantee information illegally not distorted or delete content; Realize the protection for sensitive information stream, in application program, adopt and encrypt or insert digital signature realization in information flow, if application program is not supported above function and transformation difficulty, also can introduce the modes such as IPSEC VPN and realize with third party technology means.
Dispose intruding detection system to carry out network monitoring at each main servers place network segment, important service server traffic is mapped to Network Intrusion Detection System listening port, and according to concrete application data customization intrusion detection rule base, intruding detection system should record the source IP address of invasion, object IP address, attack type, the information such as the time of attacking, require customization intrusion detection to report to the police tactful, notify in time keeper by comparatively responsive intrusion event customization with internet message or mail form, keeper will regularly carry out analyzing and processing to intrusion detection event.
Structural safety
For meeting peak traffic phase demand, processing power, the bandwidth of the main network equipment need to possess redundant space; The long-range real-time expense control application core server of marketing should be divided the independently network segment, adopts state to net unified isolation technology and isolates; For the long-range real-time allocated bandwidth higher prior rank of taking between control application and sales service application and power information acquisition system of marketing, ensure minimum bandwidth.
Access control
According to state's net uniform requirement, and between information Intranet, use the control that conducts interviews of the logical access opertaing devices such as fire wall, use the control that conducts interviews of information security network isolating devices for other networks; Should support the session status control of granularity to port level, support the control to the application layer protocol such as HTTP, TELNET command level, support the control to maximum flow number and network linking number; Should take technological means to prevent address spoofing; Between user and system, arrange to the access control rule of user's granularity.
Safe design
The running status of application IMS system to the network equipment in network, network traffics, user behavior etc. carry out record, and analyze according to record, regularly generate audit statement.
Intrusion defense
By network invasion monitoring/network intrusion protection equipment, the behaviors such as port scanning, brute force attack, wooden horse backdoor attack, Denial of Service attack, buffer overflow attack are detected, in the time attack being detected, record and report to the police; Network boundary application anti-virus filtering gateway filters malicious code, and malicious code storehouse and detection system upgrade in time.
Hardware environment
Server apparatus
Database server
The long-range real-time expense control application Production database server of marketing is born system electricity charge calculation of measured data storage and management, is that the information of system is collected and the center of processing, and requires system to have very high reliability, extensibility and processing power.
1) cpu performance estimation
The long-range real-time expense control application platform of marketing is a typical OLTP(Transaction Processing) application, IT field is to OLTP(Transaction Processing) conventional measuring and calculating standard is that (per minute carries out the number of times of transaction processing to TPC-C parameter value, Transaction Per Minute), unit is tpmC.Adopt following computing formula to carry out the measuring and calculating of CPU processing power in conjunction with the long-range real-time expense control application platform feature of marketing:
TPM(transactions per minute)=TASK×S×F×P/(T×C)/X
The total business volume per hour of TASK(peak traffic period): the long-range real-time expense control user's that markets measuring and calculating completes frequency, the business need by Utilities Electric Co.: high pressure user calculates once for every 15 minutes, low-voltage customer, calculate once every day.For high pressure user (here according to M ten thousand families), in 10 minutes, complete electricity charge measuring and calculating.For low-voltage customer (here according to N ten thousand families), once take detection and calculate according to completing in 2 hours.X: owing to adopting memory database technology in native system, so main business transaction performance pressure has been transferred to memory database end, the transaction processing of Production database time reduces greatly, according to practical experience, the database host processing demands for lasting storage now, be less than 1/10 under traditional structure, therefore X is set as 10 here.The peak traffic time will be carried out the calculating of high pressure user and low-voltage customer simultaneously, and 1,000 ten thousand take the database TASK value following (high pressure user and low-voltage customer are by 2:98 estimation, i.e. M=20 ten thousand, N=980 ten thousand) of controlling user:
TASK=(M×2+N/2) /X=530000
S: the complexity ratio of long-range real-time expense control application with respect to the transaction of standard TPC-C test benchmark environment of marketing.Because the transaction taking in complexity and the TPC-C standard testing of controlling service application exists larger difference, must set a rational respective value.According to taking control service application practical operating experiences, the complexity value that the each operation of expense control service application is compared to the every transaction in TPC-C standard testing can be set as 10, i.e. S(business operation complexity)=10.
F: the portfolio development of system the five-year is reserved.The processing power of this design reserved 30%, i.e. the pre-allowance of F(business development)=130%.
P: peak is processed and accounted for whole day treatment capacity number percent=70%.
T: the duration of the peak traffic period of every day, unit is minute.Portfolio concentrated in 2 hours and completed every day, i.e. T(peak traffic duration)=120.
C:CPU utilization factor.According to Production database server practical application experience, for ensureing sufficient server handling ability and extendability, require the cpu busy percentage of server lower than 65%.Therefore,, in the time calculating server performance index, setting cpu busy percentage is 65%, i.e. C=65%.
Cluster TPM=530000 × 10 × 1.3 × 0.7/(120 × 0.65)=61833
Separate unit server TPM=1137500/(1+(N-1) × 80%), wherein N represents cluster server quantity, and this place establishes N=2 temporarily, and separate unit server TPM value is 631944.Calculate Production database server TPM value as following table by above formula:
Table 4TPM value table
Sequence number Take control number of users Cluster TPM Unit TPM Explanation
1 In 5000000 families 30917 17177 Taking control user by 5,000,000 calculates
2 500-1000 ten thousand families 61833 34352 Taking control user by 1,000 ten thousand calculates
3 1000-1500 ten thousand families 92750 51528 Taking control user by 1,500 ten thousand calculates
4 1500-2000 ten thousand families 123666 68704 Taking control user by 2,000 ten thousand calculates
5 2000-3000 ten thousand families 185499 103055 Taking control user by 3,000 ten thousand calculates
6 More than 3000 ten thousand families 247332 137407 Taking control user by 4,000 ten thousand calculates
2) memory size estimation
The measuring and calculating of database server memory size is mainly considered from five factors: operating system committed memory size, data base administration process committed memory size, data buffer area committed memory size, client connection process committed memory size and memory usage.
Operating system and the shared internal memory of data base administration process are smaller under normal circumstances, are no more than 512M.Each client connection process committed memory is approximately 2M-3M.
The internal memory that data buffer area takies is the most important ingredient of database server internal memory, also be a part for ratio maximum, data buffer area is mainly used in data cached, if the internal memory that data buffer area is occupied is more, the data of buffer memory are just more, and in the time processing the request of client, the probability that obtains target data in buffer memory is just high, thereby reduce magnetic disc i/o, improved the processing speed of database.
3) storage I/O and network I/O
Storage I/O aspect, the current storage I/O interface that can select has two kinds of SCSI and optical-fibre channels (FC), and optical-fibre channel technology is compared with traditional SCSI technology (cable), has advantage at aspects such as connecting distance, number of devices and performance.Therefore, suggestion adopts the optical channel card of 8Gbps.Network I/O adopts optical fiber gigabit networking interface.
4) take control database server type selecting
According to the long-range real-time Performance And Reliability index request that takes control application data base server of marketing, consider that database server generally adopts the mode of Longitudinal Extension, select 64 unix server composition clusters of 2 enterprise-levels as the long-range real-time expense control system Production database server of marketing.Its CPU configuration foundation TPM value above, the ratio of memory size GB and core cpu number configures according to 8:1.
Application server
The long-range real-time expense control application of marketing adopt based on standard J2EE multilayer system framework, application server is mainly used in application deployment middleware software platform, memory database, operation service application, loading marketing customer information archives class are calculated basic data, be responsible for the processing of electricity charge measuring and calculating service logic and measuring and calculating engine basic data is provided, there is the characteristic such as high I/O, high concurrent, large internal memory, require to there is larger internal memory and higher processing speed and reliability supports.
In three layers or multilayer system framework, the page of J2EE application server deployment system is shown logic and corresponding service logic, also needs to provide for objects such as various EJB, JavaBean, Servlet the service of management and scheduling.In actual system Construction, the general employing of the application server mode extending transversely taking middleware as main application meets increasing of business and system scale expansion, meets the requirement of the Performance And Reliability of system by distributed design.
Memory database is mainly that relatively static news file data are loaded in memory database, and measuring and calculating engine directly carries out reading and writing data at internal memory, uses internal memory to carry out data management, Hoisting System execution efficiency.Utilize the data segmentation technique of memory database simultaneously, expand in time as required in the horizontal according to business development situation, both avoided backstage IO bottleneck, make again middle layer dynamically can expand, easily use, increased architecture design dirigibility.According to the accessing characteristic of memory database, itself and application service are disposed to same host node, to maximize the readwrite performance that promotes memory database.
CPU processing power, memory size etc. in view of affecting the main factor of application server performance.CPU processing power and the memory size of application server are calculated in detail below.
1) CPU processing power measuring and calculating
Adopt SPECjbb as measuring and calculating standard for application server.Concept, input that TPC-C benchmark test has been used in SPECjbb benchmark test produce and trade mode.SPECjbb replaces the table (Table) in database with java class, with the record (Record) in Java object replacement database.SPECjbb major concern be the processing power of second layer service logic, investigate the application program of writing with Java and operate in the performance showing on certain station server.In SPECjbb2005 rule, require only to move a Java Virtual Machine (JVM).In whole test, the crucial factor that affects test performance is: technology, the kernel processes of operating system, the integer processing power of CPU, the sizes of Cache such as JVM (Java Virtual Machine), JIT (Just-In-Time), Garbage Collection (refuse collection), Thread (thread), memory size and structure; The linear expansion ability of server S MP.
Formula is: SPECJBB2005 (bops)=TASK × A × S × F × P/C;
The business processing amount that the TASK(peak traffic phase is per second): the long-range real-time expense control user's that markets measuring and calculating completes frequency, the business need by Utilities Electric Co.: high pressure user every 60 minutes once, low-voltage customer, once a day.For high pressure user (here according to M ten thousand families), according to completing electricity charge measuring and calculating in half an hour.For low-voltage customer (here according to N ten thousand families), in coming according to 2 hours, complete and once take detection calculation, 1,000 ten thousand take the database TASK value following (database high pressure user and low-voltage customer are by 1:9 estimation M=100 ten thousand, N=900 ten thousand) of controlling user:
TASK=M/30/60+N/120/60=1806
A:JVM performance parameter index, span is 0-100, according to industry experience, value is 50;
S: business operation complexity, according to industry experience, value is 60;
F: the portfolio development of system the five-year is reserved, the pre-allowance of F(business development)=130%;
P: peak is processed and accounted for whole day treatment capacity number percent, with reference to the performance requirement of conventional electric power marketing application system, value is 70%;
C:CPU utilization factor.According to the practical experience of the long-range real-time expense control application platform of marketing is shown, the cpu busy percentage of a station server requires lower than 75%.Therefore,, in the time calculating server performance index, setting cpu busy percentage is 75%, i.e. C(CPU utilization factor)=75%;
Cluster SPECJBB2005 (bops)=1806 × 50 × 60 × 1.3 × 0.7/0.75=6573840
Every station server SPECJBB2005 value=server cluster SPECJBB2005 value/(N × 90%)
Wherein N represents number of servers, supposes to adopt 4 application server composition clusters, separate unit server S PECJBB2005 (bops)=6573840/3.6=1826067
Go out application server SPECJBB2005 (bops) value by above formula to calculating as follows:
Sequence number Take control number of users Cluster SPECjbb2005 bops Unit SPECjbb2005 bops Explanation
1 In 500 general-purpose families 3286920 913033 Taking control user by 5,000,000 calculates
2 500-1000 general-purpose family 6573840 1826067 Taking control user by 1,000 ten thousand calculates
3 1000-1500 general-purpose family 9857120 2738089 Taking control user by 1,500 ten thousand calculates
4 1500-2000 ten thousand families 13144040 3651122 Taking control user by 2,000 ten thousand calculates
5 2000-3000 ten thousand families 19721547 5478201 Taking control user by 3,000 ten thousand calculates
6 More than 3000 ten thousand families 26288080 7302244 Taking control user by 4,000 ten thousand calculates
2) memory size estimation
The main following factor of application server memory size estimation is considered: operating system occupies that memory size, application management server process occupy memory size, JAVA virtual machine (hereinafter to be referred as JVM) occupies memory size and memory usage.
Operating system and the shared internal memory of application management server process are smaller under normal circumstances, are no more than 2048M.When the JAVA of big data quantity is processed, need to distribute larger JVM internal memory, in order to obtain better performance, the JVM that application server is set separately conventionally occupies internal memory, and memory usage is too high will have a strong impact on server performance.
Memory database is mainly used in loading expense detection and calculates the static data (as files on each of customers, electricity price information etc.) relatively such as customer basis data needing, but the content loading is not all information of entity list, but select wherein a part of field to load, therefore the data capacity of selected loading is less than marketing basic data entity list capacity.Load test according to taking the buffer memory of controlling Calculating model, obtain buffer memory capacity and actual quantity ratio is about 5:1; Extrapolate accordingly company of province of all categories (city) corresponding buffer size amount in the time that expense detection is calculated, buffer memory capacity demand schedule is as follows:
Sequence number Userbase Load marketing basic data (GB) Buffer memory capacity demand (GB) Explanation
1 In 5000000 families 3.5 17.5 Calculate by 500 general-purpose families
2 500-1000 ten thousand families 7 35 Calculate by 1000 general-purpose families
3 1000-1500 ten thousand families 10.5 52.5 Calculate by 1500 general-purpose families
4 1500-2000 ten thousand families 14 70 Calculate by 2000 general-purpose families
5 2000-3000 ten thousand families 21 105 Calculate by 3000 general-purpose families
6 More than 3000 ten thousand families 28 140 Calculate by 4000 general-purpose families
3) application server type selecting
According to the long-range real-time Performance And Reliability index request that takes control application platform server of marketing, select the application server of enterprise-level X86 rack server composition cluster as system.Its CPU configuration foundation SPECJBB2005 value above, the ratio of memory size GB and CPU is according to being not less than 8:1 configuration.
Interface server
This server is mainly used in reception & disposal power information and gathers electric energy that (or negative control) system transmits in real time to the expense control system registration information of checking meter, and for electricity charge measuring and calculating engine real time scan, loading processing etc. in batches, company of each province (city) disposes 2.
Test training data storehouse server
In view of electricity charge measuring and calculating importance, build test Training Environment, company of each province (city) disposes 2, and its configuration requirement is as follows:
Table 7, the server configuration of test training data storehouse
Processor 4 road PC servers, more than every 8 cores of 4 CPU(), dominant frequency is more than 2.66GHz;
Internal memory ≥32GB;
Hard disk The hot-plug hard disk of 4 built-in 15K RPM 300GB, RAID1;
Network interface card 2 PCI-Express;
HBA card 2 FC optical channel cards;
Power supply Redundant power;
Other peripheral hardwares DVD-ROM, magnetic tape station, keyboard etc.;
Operating system LINUX operating system;
Test training application server
The application measuring and calculating server of test Training Environment, company of each province (city) disposes 2, and its configuration requirement is as follows:
Table 8 test training application server configuration
Processor 2 road PC servers, more than every 8 cores of 2 CPU(), dominant frequency is more than 2.66GHz;
Internal memory ≥16GB;
Hard disk The hot-plug hard disk of 2 built-in 15K RPM 300GB, RAID1;
Network interface card 2 PCI-Express;
Power supply Redundant power;
Other peripheral hardwares DVD-ROM, magnetic tape station, keyboard etc.;
Operating system LINUX operating system;
Archive management server
For management data backup, to include province (city) centralized backup systematic unity in and consider, native system is not considered separately backup server.
Software environment design
Operating system planning and design
According to the long-range real-time requirement that control system applies is built that takes of marketing, server host (as database server, application server etc.) can use UNIX operating system, (SuSE) Linux OS.
Customer end adopted Windows 7/XP operating system.
In this project, UNIX operating system is installed in the database server suggestion of the long-range real-time expense control application of marketing.Long-range real-time expense control system applies server and the distributed cache server suggestions of marketing adopt (SuSE) Linux OS.
Database software planning and design
Database Systems software requirement is as follows:
Adopt large-scale relationship type distributed data base product.
Support to sql like language: meet ANSI/ISO SQL-89 and ANSI/ISO SQL-92 standard, simultaneously, perfect SQL expansion is provided, has comprised UNION, INTERSECT, MINUS, outside connection and tree construction inquiry (CONNECT BY), and renewable connection view etc.
Support parallel work-flow and grid computing: support two-shipper or multi-host parallel work.Comprise the integrity control technology of multiserver coordination technique, issued transaction.Mechanism and the automatic collision detection mechanism of support based on row level lock, meets data consistency and system responses ability under highly-parallel operating environment.
Partitioning technique: support the table partitioning technique (as scope, list, HASH, assemblage province etc.) of Volume data table, and partitioned mode should be transparent to applying.
Provide Advanced Replication Technology: the data in network enabled between isomorphism or heterogeneous database effectively transmit and redundancy copies.
Must support C2 or higher level safety standard, multilevel security control.
The security of system strengthening: can provide the security architecture based on role, for data security provides Reliable guarantee.Supported data storage encryption, data transmission are encrypted.
Numerous types of data managerial ability: can support, for multimedia information access and OO data management, can process the various types of data including video, image, voice and traditional text and numerical information.
Support Unicode coding, support Chinese character ISN, meet double-byte encodings.
Explorative: to may operate in the operating system platform of various main flows, support the procotol of various main flows, and xenogenesis Access technology of data pool can be provided.
Good optimisation strategy: the optimisation strategy based on cost, sharable storing process, shared SQL buffer zone, the abundant sub-ability of triggering, the remote procedure call of submitting the row level lock mechanism of degree of parallelism to and protected by transparent two stages submission are provided.
Easy use, development efficiency maintenance management instrument high, easy to maintenance can be provided.
This project can select Oracle 11g as database management language, and Oracle database enterprise version 11g meets the availability of current mission critical applications program and the instrument of scalability needs and function for enterprise provides.It not only comprises all component of Oracle database, and can further be enhanced by buying option and routine package.Oracle not only can improve system parallel processing and fast query ability by RAC assembly and subregion assembly, and can monitor with optimization component and find system bottleneck and Reasonable Parameters is set, thereby ensures system stability, efficiently operation.
The design of data Replica software plan
Can adopt mode very flexibly to be configured, comprise bidirectional replication and multi-level data Replica.Particularly copy at bi-directional data, should meet the various complexity of user in network environment and copy demand.
Can be between isomery IT foundation structure, realize mass data second one-level data capture, conversion and delivery.Pay attention to efficiency, flow and diversity.
Support as: broadcast replication, concentrate copy, the replication mode such as cascade copies.
Can copy across different databases, as: the data sources such as Oracle, IBM DB2, SQL Server, Sybase ASE and Teradata.
At present, Sybase system software meets above-mentioned requirements as Oracle GoldenGate completely as Oracle and data synchronizing software.This project selects Oracle GoldenGate as data synchronizing software.
Middleware software planning and design
The design of J2EE platform software
The various technology that comprehensive current enterprise-level application adopts, J2EE technology path has good technological accumulation, in each enterprise-level application, is verified.J2EE technology path is adopted by Software Industry mainstream vendor, for enterprise-level application provides the carrying platform of superior performance.
The specific requirement of J2EE application platform software is as follows:
The powerful unified platform is provided, meets J2EE specification, and authenticate by J2EE, support J2EE 1.4 or more highest version.
Comprehensive support to EJB, Servlet & JSP, JMS, JTA, JTS, JNDI, RMI, JDBC and XML technology should be provided, and can build on this basis and dispose all kinds of J2EE application programs.
J2EE application platform and operating system are independent, support the operating system of various main flows, comprise UNIX, Linux, Windows Server 2000/2003.
Support the hardware environment of various isomeries, as the hosted environment such as IBM, HP.
Support the Sybases such as Oracle, DB2, Sybase, Informix, SQL Server.
Support for cluster: support the trunking mode of the many examples of unit and the many examples of multimachine, support the configuration of heat deployment and dynamic systematic parameter, and do not need to restart server; Comprise dynamic creation database connection pool, and it is configured and management etc.
Support the load balancing between multiple front-end Web server; In J2EE application platform software, should comprise corresponding software and realize WEB server load balancing.
Must support Chinese character ISN, meet double-byte encodings.
Can realize and being connected of various existing enterprise information systems (as ERP, database and file system etc.), provide unified approach for accessing all kinds of Enterprise Information Resources EIS.
Can a large amount of hardware devices of cluster, and regarded as single resource pool.In the time that wherein a certain hardware breaks down, can take over and bear additional load by other equipment in cluster immediately, to guarantee the continuity of service provision.
Can system compliability be provided and improve application system performance by Buffer Pool, resource distribution and load balancing techniques.
Realize " plug and play " of resource, improve flexibility ratio and the openness of whole enterprise systems architecture.
At present, mainstream applications server software meets above-mentioned requirements completely as Oracle Weblogic, Oracle AS, IBM Websphere etc.
Cache software
The various caching technologys that comprehensive current enterprise-level application adopts, the specific requirement of cache software is as follows:
High-performance: by data shift-in application program efficient access, solve delay issue remarkable improving performance, alleviate ink-bottle effect and reduce data contention.
Reliability: fast, transparent standby and inefficacy rollback, the server of normal operation can be born the work of failed server automatically.
Extensibility: the extendability of read and write, dynamic expansion in operational process, to continual service in external expansion, dynamic retractility capacity is also processed, and data fault-tolerant and continued operation support, to the linear expansion of Storage and Processing.
Availability: automatically carry out subregion, and in whole cluster balanced load.Synchronous copy data, to realize lasting availability.
Security: cluster and the data management technique of equity, there is no the fault of single-point, server is monitored running status each other.
The support good to JAVA.
System disaster tolerance
The standby construction of system calamity should be followed State Grid Corporation of China's calamity for construction scheme unified planning, design and implementation.The long-range real-time expense control application of marketing will be disposed economizing (city) level, according to business characteristic and application requirements, system is carried out to data level calamity standby.
1, Disaster Preparation Center's memory disk RAID is configured to be equal to or a little less than production center standard configuration.
2, storage space configuration will be considered the demand of checking and rehearsal.
3, by data Replica, data are carried out to calamity standby.
Technical indicator
Expense control application technology index comprises business function index and application software technology requirement.
Business function index
Application software technology requirement
Processing power
Reliability
Whole application software system should be able to non-stop run in continuous 7 × 24 hours, the alarm in time of breaking down.
Application system should possess automatic or manual recovery measure, to can recover rapidly normal operation in the time making a mistake.When software systems fault, automatic recovery time < 15 minutes, manual recovery time < 4 hours.
Application software will prevent from consuming too much system resource and make system crash.
Maintainable
The ability of problem or defect during maintainability refers to and revise existing system function in the situation that not affecting other parts of system.
Application system should adopt Software Component Design thought, and system framework separates with service logic.
When exception error report appears in application system, detailed abnormal information must can be provided.
The mistake that system occurs in operational process should have clear and definite mistake numbering, and can in the corresponding service manual of system, find error handling method and step.
In the time that system loading strengthens, still need to guarantee required service quality, and should not change the framework of whole system.
Application system must be supported the independent upgrading of each member.
When arbitrary module in application software is upgraded, is loaded, under the prerequisite of not upgrading with the interface of upper and lower module, the running of not impact business and service.
Utilize the unified operation management monitor supervision platform of the overall situation to realize the unified monitoring of the long-range real-time expense control application of right marketing, monitoring content comprises running status, alarm, daily record, analysis etc.
Ease for use
Application system must provide conforming graphic user interface style.
Application system should realize in B/S mode the operation interface of domestic consumer.
Application system must support to open the operation of multiple management windows so that different task is walked abreast simultaneously.
Application system should support can have access to by Tab key or enter key all control object of same window.
Application system must adopt Paging system to show Query Result, and shows the record count, current page and the total page number that return.
Application system finds that user's submission has false information, must clearly point out with the form of pop-up window the reason of user error, and interface control focus is placed in the control object making a mistake.
The operation interface of application system must clearly identify the input message that must fill out.
Before the operation that causes system data to change is carried out, system should eject prompt window and confirm for user.
For complicated message structure, system should adopt the mechanism of subfield in same window, to show the different information contents, and automatically refreshes the information content of different piece.
When application system is being carried out request that user submits to and cannot return time, must clear and definite tag system in the busy stage.
Application system function menu must be organized according to the sorting technique of functional domain, function items.
The menu function using for operator's lack of competence, application system does not show this menu or is set to down state.
System must provide online help function, can find corresponding operation instruction in detail for each operating function.
After operator's login system, system must be reminded the task of waiting for that this operator processes on one's own initiative.
The query statistic result of application system can the unloading common formatted file such as be EXECL.
Application system provides FAQ function, supports management, the issue etc. of FAQs.
Application system provides issue management function, supports collection, the feedback etc. of FAQs.
The business processing interface in the regular concrete post towards basic unit must be succinct, practical, directly perceived, and data message layering shows, before conventional row, be of little use by rear or blanking.
Operation bond order meets work disposal step, and redirect automatically, to improve day to day operation treatment effeciency.
Conclusion
Along with the installation all standing of intelligent electric meter, the client of remote bill control, whole power informations of power information acquisition system Real-time Collection client, realize Intelligent centralized meter reading, realize the electricity charge and automatically calculate, changed traditional write by hand metering calculation expense pattern, simplified recording, checking, and charging flow process, saved the time that counting cost by gas meter takies, the attendant that makes to power has the more time to carry out the maintenance of power supply service and power supply facilities.By remote bill control system, can realize the mode reminding user recharging and paying such as note, 95598 voice broadcasts, can also and implement personalized intelligent power early warning according to customization customer attribute customization expense control strategy, long-rangely stop the operation of sending a telegram in reply.Real-time interactive intelligence is taken the on-line running of control system, greatly reduces electricity charge risk, leads the change of electric power way of paying, promotes Utilities Electric Co.'s benefit.And bring service application to promote, and strengthen Demand-side monitoring management, improve the quality of power supply, improve power supply reliability.And started the intelligent interaction with electricity consumption user, optimize electricity consumption, reasonable energy utilization.
Advanced task management and Task Scheduling Mechanism
Advanced task management and Task Scheduling Mechanism are the preconditions that ensures multinomial robotization business, are mainly divided into task strategy, load balancing management etc.The realization of task strategy has the characteristic that immediately comes into force and allow personal settings, the xml form that is configured to of personalization is preserved, and the mode that common configuration is kept in database realizes.Can configuration schedules strategy, load strategy, task retry strategy.Can realize load balancing, in the random integers between 1-N (quantity of the task server that N is current normal operation) that produce, make each task server relative equilibrium in the total quantity of executing the task by this coefficient.Task, being saved in before database, all can be assigned to this coefficient.In the time having many task scheduling servers, can be by arranging respectively the task that loading coefficient is corresponding on each station server.Use random number can make task record be evenly distributed in full table, improve recall precision thereby be convenient to database.
Set up the Policy model based on user's side demand
According to electricity consumption client's user property, use electrical feature, affiliated customer group's difference, to also variant by the demand of electric continuity, electrical safety, the quality of power supply, utilize Markov switching matrix algorithms, analysis user demand, design charges prosecutor case, provides hommization, personalized service.Set up many cover measuring and calculating strategy, prediction policies, stop telegram in reply strategy, set up a set of specification tactical management way.As to calculate policy criteria be mainly to pay a set of measuring and calculating policy criteria that the many factors such as situation is formulated according to user property, electric weight electricity charge situation and the electricity charge, be based upon and take into full account validity and accuracy that remote bill control user power utilization load is controlled, ensure rationally effectively to utilize on the basis of system resource simultaneously.
The Policy model of selecting according to user, in conjunction with asynchronous task, forms a set of efficient automation application, to reach real-time intelligent control.
Intelligent interaction
Set up the pattern of paying the fees by all kinds of means, can pass through network, the various ways such as self-service, payment whenever and wherever possible, system and show between two-way intercommunication, user can understand electricity consumption situation in real time.If system is calculated certain family electricity consumption situation in real time, after comparing by measuring and calculating, find account balance deficiency, system sends early warning note in real time, and reminding user is paid the fees in time, and user, receiving after prompting, pays the fees by network, after payment, can eliminate early warning.User can understand the electricity consumption situation of family fixed time section in time, reaches reasonable, using electricity wisely, electricity consumption transparence.
Application layer measuring and calculating, memory bank business processing
First traditional data is processed will search suitable data item on disk, then the result finding is placed in buffer memory, finally result is returned to operation system.In order to improve the performance of data base management system (DBMS), data base management system (DBMS) generally improves the performance of system by data base set irrespective of size buffer memory, file-level buffer memory two-level cache.Even but data are all cached in internal memory, due to it search algorithm or consider based on disk, be generally B+ tree, not efficient for the seek rate of setting based on B+ when total data is all in internal memory.But no matter how become, the architecture of traditional data base management system (DBMS) all leaves external memory in based on data and designs, because the bottleneck data base management system (DBMS) of external memory data access itself can not solve, the improvement of architecture is limited by very large, must introduce memory database tupe MMDB, MMDB is in order to prevent the sequential search of data, and index technology still needs to use, but index is now simpler than the index of RDBMS.For example, a conventional index is all the address of following these data after the data item of node, but the index of MMDB directly points to the place of storage data, thereby has reduced the redundancy of data.Because all data of MMDB are all in internal memory, thereby do not need to carry out cache management, eliminated the movement of data on buffering and disk.MMDB need to be optimized processing but be simpler than the optimization process in RDBMS, is to select the fastest access path substantially, does not need to consider disk factor.Expense control system has been introduced MMDB pattern in measuring and calculating key business.
Balanced encryption load
Meet state's net corporate information system safety standard, adopt unified Guo Wang company encryption equipment system to carry out data ciphering and deciphering, data security is reliable.Build one " the preposition program of encryption equipment ", thereby call and complete data interaction according to encryption equipment call method by the preposition program of this encryption equipment.The preposition program of encryption equipment is utilized Java multithreading, configures access IP and the port of many encryption equipments, according to the task amount of terminal access, the data access of many encryption equipments is carried out to load balancing, ensures high performance requirement.

Claims (9)

1. remote power utilization information control system, it is characterized in that: comprise sales service system and the long-range real-time expense control system of marketing, negative control system, power information acquisition system, SMS platform and general headquarters' customer service system, the long-range real-time expense control system of described marketing comprises: control of expenses program, electricity charge measuring and calculating program, the application of expense control strategy and exception management program.
2. remote power utilization information control system according to claim 1, it is characterized in that: described expense control tactical management program is to formulate all standard strategy of expense control business according to user's classification of electricity consumption client, power consumption situation, application of policies time, credit grade, comprising: the management of expense control policy criteria, the management of instruction extension distributing policy, credits threshold standard management.
3. remote power utilization information control system according to claim 1, is characterized in that: described electricity charge measuring and calculating program is to carry out the calculating of all types of electric weight of electricity consumption client, the electricity charge according to the electricity price standard of electricity consumption client's meter reading data, electricity consumption customer profile information and execution.
4. voltameter is shown in electric weight, transformer loss electric weight, line loss electric weight to copying at last, reduces electric weight (main submeter, turn confession, fixed than quantitatively), moves back benefit electric weight all kinds electric weight and calculate, and draws measuring and calculating electric weight; By measuring and calculating electric weight and corresponding electricity price, calculate the various electricity charge again.
5. the calculating that comprises catalogue power cost, basic charge as per installed capacity, power factor adjustment charge, levies on the behalf each electricity charge types such as the electricity charge is calculated in the measuring and calculating electricity charge.
6., after calculating, the electric weight electricity charge information of automatically auditing measuring and calculating according to the auditing rule arranging, to carrying out benchmark comparison by the user of examination & verification.
7. remote power utilization information control system according to claim 1, is characterized in that: described expense control application of policies program is according to the result of benchmark comparison, generates and takes the application of policies request of controlling user.
8. comprise prompting, early warning, cancellation early warning, power failure, telegram in reply.
9. remote power utilization information control system according to claim 1, it is characterized in that: described exception management program refers to and receives occur in electricity charge measuring and calculating abnormal, comprise that the electricity charge are calculated unsuccessfully and careful dyskaryotic data, and abnormal information is sent to sales service application processing.
CN201410222825.8A 2014-05-23 2014-05-23 Electric power utilization information remote control system Pending CN104063756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410222825.8A CN104063756A (en) 2014-05-23 2014-05-23 Electric power utilization information remote control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410222825.8A CN104063756A (en) 2014-05-23 2014-05-23 Electric power utilization information remote control system

Publications (1)

Publication Number Publication Date
CN104063756A true CN104063756A (en) 2014-09-24

Family

ID=51551455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410222825.8A Pending CN104063756A (en) 2014-05-23 2014-05-23 Electric power utilization information remote control system

Country Status (1)

Country Link
CN (1) CN104063756A (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317821A (en) * 2014-09-29 2015-01-28 国家电网公司 Method for checking power failure information by using image technology
CN104333547A (en) * 2014-10-24 2015-02-04 国家电网公司 Safety protection method of two-way interaction intelligent ammeter
CN104618353A (en) * 2015-01-16 2015-05-13 河南机电高等专科学校 Computer security network
CN104881788A (en) * 2015-05-26 2015-09-02 广东电网有限责任公司佛山供电局 Data processing method of electricity customer, system and customer service management platform
CN104978695A (en) * 2015-06-24 2015-10-14 国家电网公司 Electricity charge data processing method and apparatus
CN105117662A (en) * 2015-09-17 2015-12-02 国网北京市电力公司 Power distribution network data exception processing method and device
CN105184688A (en) * 2015-11-03 2015-12-23 国网冀北电力有限公司经济技术研究院 Remote real-time cost control management for power network
CN105203887A (en) * 2015-10-20 2015-12-30 国家电网公司 Prewarning method, device and system for overload of transformer
CN105553956A (en) * 2015-12-09 2016-05-04 国家电网公司 Mail blocking method and device based on sensitive information recognition
CN105608540A (en) * 2015-12-31 2016-05-25 上海慧驿致信息科技有限公司 Marketing cost management system
CN105976088A (en) * 2016-04-27 2016-09-28 北京科东电力控制系统有限责任公司 Marketing remote real-time cost control application operation analysis and monitoring method
CN105978964A (en) * 2016-05-09 2016-09-28 中国民航信息网络股份有限公司 Aviation logistics data intelligent distribution model and method
CN106251236A (en) * 2016-07-13 2016-12-21 广东电网有限责任公司 A kind of electricity electricity charge checking method
CN106327055A (en) * 2016-08-08 2017-01-11 烟台海颐软件股份有限公司 Big data technology-based electric power fee controlling method and system
CN106340175A (en) * 2016-11-28 2017-01-18 中环天仪股份有限公司 Electromagnetic flowmeter wireless meter reading system and implementation method
CN106789075A (en) * 2016-12-27 2017-05-31 艾体威尔电子技术(北京)有限公司 POS digital signature is anti-to cut machine system
CN106993041A (en) * 2017-04-01 2017-07-28 国网福建省电力有限公司 A kind of power marketing moves work data synchronous method
CN106991579A (en) * 2017-03-31 2017-07-28 国网福建省电力有限公司 A kind of electric power remote real-time fee control method
CN106992984A (en) * 2017-04-01 2017-07-28 国网福建省电力有限公司 A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN107341675A (en) * 2017-07-17 2017-11-10 重庆邮电大学 A kind of intelligent grid remote bill control decision-making framework and method based on semantic knowledge
CN107679100A (en) * 2017-09-12 2018-02-09 国网四川省电力公司成都供电公司 Teller system for electrical management
CN107742192A (en) * 2017-11-22 2018-02-27 国网江西省电力有限公司电力科学研究院 A kind of distributed power marketing strategy method and system based on big data
CN108076077A (en) * 2016-11-08 2018-05-25 华为技术有限公司 A kind of conversation controlling method and device
CN108564259A (en) * 2016-04-18 2018-09-21 欧洲阿菲尼帝科技有限责任公司 Technology for carrying out benchmaring to the pairing strategy in contact centring system
CN109193949A (en) * 2018-10-24 2019-01-11 九州能源有限公司 A kind of photovoltaic plant monitors cloud platform and system automatically
CN109190928A (en) * 2018-08-13 2019-01-11 烟台海颐软件股份有限公司 A kind of power supply plan auxiliary generating method and system based on graph visualization
CN109286681A (en) * 2018-11-08 2019-01-29 合肥帧讯软件有限公司 Data exchange service software
CN109389022A (en) * 2017-08-09 2019-02-26 宏碁股份有限公司 Method and device for processing image data
CN109889546A (en) * 2019-03-28 2019-06-14 北京邮电大学 A kind of quick fine granularity multiple-domain network interconnection method of controlling security
CN110135670A (en) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 The method for building up of project of transmitting and converting electricity technical economy intelligent evaluation
CN110458593A (en) * 2019-06-19 2019-11-15 国家电网公司 Marketing real-time fee control system
CN110660165A (en) * 2019-09-18 2020-01-07 四川杰斯顿电气设备有限公司 Extensible modular electricity selling system and using method
CN111031029A (en) * 2019-12-09 2020-04-17 广东电网有限责任公司 Work order and power failure data interaction device supporting multi-protocol conversion
CN111598534A (en) * 2020-05-08 2020-08-28 苏州百捷信息科技有限公司 Universal marketing expense management platform and management method
CN111724046A (en) * 2020-05-29 2020-09-29 国网福建省电力有限公司 Electricity purchase management system
CN111753169A (en) * 2020-06-29 2020-10-09 金电联行(北京)信息技术有限公司 Data acquisition system based on internet
CN111818008A (en) * 2020-05-21 2020-10-23 云南电网有限责任公司信息中心 Network data safety exchange method based on Webservice
CN111818229A (en) * 2020-06-23 2020-10-23 国家电网有限公司客户服务中心 Service operation efficiency promotion management system based on 95598 calling platform
CN111932237A (en) * 2020-07-31 2020-11-13 武汉阿迪克电子股份有限公司 Cloud-based one-card transaction method and system
CN112184035A (en) * 2020-09-30 2021-01-05 深圳供电局有限公司 Customer characteristic element statistical system and method
CN112258175A (en) * 2020-09-04 2021-01-22 国网浙江省电力有限公司 Cloud platform-based electric power market electric charge settlement data supervision platform and use method thereof
CN112598414A (en) * 2020-12-09 2021-04-02 北京中电普华信息技术有限公司 Electric power marketing charging method and electric power marketing charging engine
CN112613907A (en) * 2020-12-18 2021-04-06 北京思特奇信息技术股份有限公司 Method and system for quickly matching marketing campaign products meeting user conditions
CN112712404A (en) * 2020-12-28 2021-04-27 国网宁夏电力有限公司营销服务中心(国网宁夏电力有限公司计量中心) Intelligent intensive processing and business safety protection system for electric charge account
CN113239349A (en) * 2021-06-05 2021-08-10 内蒙古电力(集团)有限责任公司内蒙古电力科学研究院分公司 Network security testing method for power monitoring system
CN113392426A (en) * 2020-03-11 2021-09-14 Abb瑞士股份有限公司 Method and system for enhancing data privacy of an industrial or electrical power system
US11425248B2 (en) 2008-01-28 2022-08-23 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
US11509768B2 (en) 2008-01-28 2022-11-22 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013155A (en) * 2010-10-26 2011-04-13 京信通信系统(中国)有限公司 Remote meter reading system utilizing time division (TD) network and implementation method thereof
CN102116793A (en) * 2009-12-31 2011-07-06 上海可鲁系统软件有限公司 Multifunction ammeter
CN102509162A (en) * 2011-11-18 2012-06-20 深圳市科陆电子科技股份有限公司 Intelligent resident electricity utilization management method and management system
CN102568108A (en) * 2012-01-17 2012-07-11 石家庄科林电气股份有限公司 Prepayment reminding method for intelligent electric meter based on remote charge control mode
CN103198420A (en) * 2013-03-29 2013-07-10 山东电力集团公司 Real-time interactive long-distance fee-control management system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102116793A (en) * 2009-12-31 2011-07-06 上海可鲁系统软件有限公司 Multifunction ammeter
CN102013155A (en) * 2010-10-26 2011-04-13 京信通信系统(中国)有限公司 Remote meter reading system utilizing time division (TD) network and implementation method thereof
CN102509162A (en) * 2011-11-18 2012-06-20 深圳市科陆电子科技股份有限公司 Intelligent resident electricity utilization management method and management system
CN102568108A (en) * 2012-01-17 2012-07-11 石家庄科林电气股份有限公司 Prepayment reminding method for intelligent electric meter based on remote charge control mode
CN103198420A (en) * 2013-03-29 2013-07-10 山东电力集团公司 Real-time interactive long-distance fee-control management system and method

Cited By (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11509768B2 (en) 2008-01-28 2022-11-22 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
US11425248B2 (en) 2008-01-28 2022-08-23 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
CN104317821A (en) * 2014-09-29 2015-01-28 国家电网公司 Method for checking power failure information by using image technology
CN104333547A (en) * 2014-10-24 2015-02-04 国家电网公司 Safety protection method of two-way interaction intelligent ammeter
CN104333547B (en) * 2014-10-24 2018-01-19 国家电网公司 A kind of method for security protection of two-way interaction intelligent electric energy meter
CN104618353A (en) * 2015-01-16 2015-05-13 河南机电高等专科学校 Computer security network
CN104881788A (en) * 2015-05-26 2015-09-02 广东电网有限责任公司佛山供电局 Data processing method of electricity customer, system and customer service management platform
CN104881788B (en) * 2015-05-26 2018-11-02 广东电网有限责任公司佛山供电局 The data processing method and system of Electricity customers, customer service management platform
CN104978695A (en) * 2015-06-24 2015-10-14 国家电网公司 Electricity charge data processing method and apparatus
CN105117662A (en) * 2015-09-17 2015-12-02 国网北京市电力公司 Power distribution network data exception processing method and device
CN105203887A (en) * 2015-10-20 2015-12-30 国家电网公司 Prewarning method, device and system for overload of transformer
CN105184688A (en) * 2015-11-03 2015-12-23 国网冀北电力有限公司经济技术研究院 Remote real-time cost control management for power network
CN105553956A (en) * 2015-12-09 2016-05-04 国家电网公司 Mail blocking method and device based on sensitive information recognition
CN105608540A (en) * 2015-12-31 2016-05-25 上海慧驿致信息科技有限公司 Marketing cost management system
CN108564259A (en) * 2016-04-18 2018-09-21 欧洲阿菲尼帝科技有限责任公司 Technology for carrying out benchmaring to the pairing strategy in contact centring system
CN113095653A (en) * 2016-04-18 2021-07-09 阿菲尼帝有限公司 Techniques for benchmarking pairing strategies in contact center systems
CN113095653B (en) * 2016-04-18 2023-11-07 阿菲尼帝有限公司 Techniques for benchmarking pairing strategies in a contact center system
CN105976088A (en) * 2016-04-27 2016-09-28 北京科东电力控制系统有限责任公司 Marketing remote real-time cost control application operation analysis and monitoring method
CN105978964A (en) * 2016-05-09 2016-09-28 中国民航信息网络股份有限公司 Aviation logistics data intelligent distribution model and method
CN106251236A (en) * 2016-07-13 2016-12-21 广东电网有限责任公司 A kind of electricity electricity charge checking method
CN106327055A (en) * 2016-08-08 2017-01-11 烟台海颐软件股份有限公司 Big data technology-based electric power fee controlling method and system
CN106327055B (en) * 2016-08-08 2019-10-11 烟台海颐软件股份有限公司 A kind of electricity expense control method and system based on big data technology
CN108076077A (en) * 2016-11-08 2018-05-25 华为技术有限公司 A kind of conversation controlling method and device
CN106340175A (en) * 2016-11-28 2017-01-18 中环天仪股份有限公司 Electromagnetic flowmeter wireless meter reading system and implementation method
CN106789075A (en) * 2016-12-27 2017-05-31 艾体威尔电子技术(北京)有限公司 POS digital signature is anti-to cut machine system
CN106789075B (en) * 2016-12-27 2019-12-24 艾体威尔电子技术(北京)有限公司 POS digital signature anti-cutting system
CN106991579A (en) * 2017-03-31 2017-07-28 国网福建省电力有限公司 A kind of electric power remote real-time fee control method
CN106992984A (en) * 2017-04-01 2017-07-28 国网福建省电力有限公司 A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN106993041A (en) * 2017-04-01 2017-07-28 国网福建省电力有限公司 A kind of power marketing moves work data synchronous method
CN107341675A (en) * 2017-07-17 2017-11-10 重庆邮电大学 A kind of intelligent grid remote bill control decision-making framework and method based on semantic knowledge
CN109389022A (en) * 2017-08-09 2019-02-26 宏碁股份有限公司 Method and device for processing image data
CN107679100A (en) * 2017-09-12 2018-02-09 国网四川省电力公司成都供电公司 Teller system for electrical management
CN107742192A (en) * 2017-11-22 2018-02-27 国网江西省电力有限公司电力科学研究院 A kind of distributed power marketing strategy method and system based on big data
CN110135670A (en) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 The method for building up of project of transmitting and converting electricity technical economy intelligent evaluation
CN109190928A (en) * 2018-08-13 2019-01-11 烟台海颐软件股份有限公司 A kind of power supply plan auxiliary generating method and system based on graph visualization
CN109193949A (en) * 2018-10-24 2019-01-11 九州能源有限公司 A kind of photovoltaic plant monitors cloud platform and system automatically
CN109193949B (en) * 2018-10-24 2020-11-13 九州能源有限公司 Photovoltaic power plant automatic monitoring cloud platform and system
CN109286681A (en) * 2018-11-08 2019-01-29 合肥帧讯软件有限公司 Data exchange service software
CN109889546B (en) * 2019-03-28 2020-07-28 北京邮电大学 Rapid fine-grained multi-domain network interconnection security control method
CN109889546A (en) * 2019-03-28 2019-06-14 北京邮电大学 A kind of quick fine granularity multiple-domain network interconnection method of controlling security
CN110458593A (en) * 2019-06-19 2019-11-15 国家电网公司 Marketing real-time fee control system
CN110660165A (en) * 2019-09-18 2020-01-07 四川杰斯顿电气设备有限公司 Extensible modular electricity selling system and using method
CN111031029A (en) * 2019-12-09 2020-04-17 广东电网有限责任公司 Work order and power failure data interaction device supporting multi-protocol conversion
CN113392426A (en) * 2020-03-11 2021-09-14 Abb瑞士股份有限公司 Method and system for enhancing data privacy of an industrial or electrical power system
CN111598534A (en) * 2020-05-08 2020-08-28 苏州百捷信息科技有限公司 Universal marketing expense management platform and management method
CN111818008A (en) * 2020-05-21 2020-10-23 云南电网有限责任公司信息中心 Network data safety exchange method based on Webservice
CN111818008B (en) * 2020-05-21 2022-11-11 云南电网有限责任公司信息中心 Network data safety exchange method based on Webservice
CN111724046A (en) * 2020-05-29 2020-09-29 国网福建省电力有限公司 Electricity purchase management system
CN111724046B (en) * 2020-05-29 2023-03-07 国网福建省电力有限公司 Electricity purchase management system
CN111818229A (en) * 2020-06-23 2020-10-23 国家电网有限公司客户服务中心 Service operation efficiency promotion management system based on 95598 calling platform
CN111753169A (en) * 2020-06-29 2020-10-09 金电联行(北京)信息技术有限公司 Data acquisition system based on internet
CN111932237A (en) * 2020-07-31 2020-11-13 武汉阿迪克电子股份有限公司 Cloud-based one-card transaction method and system
CN112258175A (en) * 2020-09-04 2021-01-22 国网浙江省电力有限公司 Cloud platform-based electric power market electric charge settlement data supervision platform and use method thereof
CN112184035A (en) * 2020-09-30 2021-01-05 深圳供电局有限公司 Customer characteristic element statistical system and method
CN112598414A (en) * 2020-12-09 2021-04-02 北京中电普华信息技术有限公司 Electric power marketing charging method and electric power marketing charging engine
CN112613907A (en) * 2020-12-18 2021-04-06 北京思特奇信息技术股份有限公司 Method and system for quickly matching marketing campaign products meeting user conditions
CN112712404A (en) * 2020-12-28 2021-04-27 国网宁夏电力有限公司营销服务中心(国网宁夏电力有限公司计量中心) Intelligent intensive processing and business safety protection system for electric charge account
CN113239349A (en) * 2021-06-05 2021-08-10 内蒙古电力(集团)有限责任公司内蒙古电力科学研究院分公司 Network security testing method for power monitoring system
CN113239349B (en) * 2021-06-05 2024-01-09 内蒙古电力(集团)有限责任公司内蒙古电力科学研究院分公司 Network security testing method for power monitoring system

Similar Documents

Publication Publication Date Title
CN104063756A (en) Electric power utilization information remote control system
CN112765245A (en) Electronic government affair big data processing platform
Thota et al. Big data security framework for distributed cloud data centers
CN106991035A (en) A kind of Host Supervision System based on micro services framework
CN105430000A (en) Cloud computing security management system
CN101594360B (en) Local area network system and method for maintaining safety thereof
CN106462438A (en) Attestation of a host containing a trusted execution environment
CN106487775A (en) A kind for the treatment of method and apparatus of the business datum based on cloud platform
RU2458385C2 (en) Transaction isolated data storage system
GB2458568A (en) System for enforcing security policies on electronic files
CN102739774B (en) Method and system for obtaining evidence under cloud computing environment
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN102227116B (en) Safe local area network management method and local area network
CN101827101A (en) Information asset protection method based on credible isolated operating environment
CN114003943B (en) Safe double-control management platform for computer room trusteeship management
CN103188105A (en) Safety enhancing system and method thereof of NAS equipment
CN106603488A (en) Safety system based on power grid statistical data searching method
CN107743125A (en) A kind of data safety control method of power business terminal
CN112837194A (en) Intelligent system
CN100561516C (en) Network gridding service system of national geolopy spatial data
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
Lakhe Practical Hadoop Security
De Oliveira et al. Monitoring personal data transfers in the cloud
Roy et al. A Study on Google Cloud Platform (GCP) and Its Security
CN107895121A (en) A kind of bank client data safety control method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140924