CN107920089A - A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method - Google Patents

A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method Download PDF

Info

Publication number
CN107920089A
CN107920089A CN201711456891.1A CN201711456891A CN107920089A CN 107920089 A CN107920089 A CN 107920089A CN 201711456891 A CN201711456891 A CN 201711456891A CN 107920089 A CN107920089 A CN 107920089A
Authority
CN
China
Prior art keywords
protection
safety
network
authentication
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711456891.1A
Other languages
Chinese (zh)
Inventor
许道强
陈霄
霍尧
郑红娟
朱庆
朱玮珂
杨奕彬
王德峰
黄苏文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Nari Technology Co Ltd, NARI Nanjing Control System Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201711456891.1A priority Critical patent/CN107920089A/en
Publication of CN107920089A publication Critical patent/CN107920089A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, three aspects are protected from the protection of system main website, collection CG channel-guard, collecting device, the safety protection technique and safety management method of the coordinating and unifying are taken, safe design is carried out to authenticated encryption system.Wherein, system main website protection module is protected by the safety prevention measure and setting network security boundary for formulating main website, so as to ensure the safety of system main website;Gather CG channel-guard module and protection, the protection of power information Intranet, the protection of optical fiber private network, power line carrier protection are netted using GPRS accesses, realize the channel safety of intelligent network lotus interactive terminal system;Collecting device protection module ensures the safety of collecting device from technological means, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.The present invention constructs the sustainable general safety protectiving scheme of a dynamic, and relatively reliable protection service is provided for intelligent network lotus interactive terminal information.

Description

A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method
Technical field
The invention belongs to intelligent power distribution network technology field, and in particular to a kind of intelligent network lotus interactive terminal protecting information safety Authentication encryption method.
Background technology
The information system of intelligent network lotus interactive terminal is the important component of electric power information, and there is an urgent need to it Security risk assessment analysis is carried out, studies and defines the security protection Authenticated Encryption Schemes for meeting its security needs, design is applicable in Subjective entropy, improve the safety protection level of power information acquisition system.And with the propulsion of intelligent grid, Information technology is new due to introducing substantial amounts of information network in power industry extensive use, intelligent network lotus interactive terminal information system Technology so that while intelligent processing information, safety problem becomes more complicated, more urgent.Selective analysis and assessment Safety problem and potential security risk existing for each link of interactive terminal information acquisition system, research safety prevention policies, carry Go out effective security protection scheme at present not yet to carry out, therefore design an intelligent network lotus interactive terminal comprehensive safety protecting certification Encipherment scheme is particularly important.
The content of the invention
Purpose:In order to overcome the deficiencies in the prior art, the present invention provides a kind of intelligent network lotus interactive terminal information Security protection authentication encryption method.
Technical solution:In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, including system main website layer, telepak layer and Collecting device layer, is correspondingly arranged system main website protection module, collection CG channel-guard module and collecting device protection module respectively;
System main website protection module needs the potential security risk of intelligent network lotus interactive terminal information acquisition system tackled, comprising Five physical layer, network level, host aspect, application and data plane aspects;
Collection CG channel-guard module includes telepak protection module and local channel protection module;
Collecting device protection module strengthens the security control to collecting device in management, while collection is ensured from technological means The safety of equipment, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
In system main website layer, the operation of system main website on a private network, and carries out the protection of network route, network boundary is prevented Shield, network equipment security configuration.
In telepak layer, firewall security measures are taken in the access of remote collection channel, when using public communication network When, forbid it directly to be interconnected with system Intranet, install dedicated public network access isolating device additional, ensure network failure and security incident It is limited within regional area;The communication data of telepak and local channel uses authenticated encryption mechanism, adds at communication both ends Data authentication encryption device is filled, ensures the confidentiality, integrity, and availability of data.
In collecting device layer, collecting device is using ID authentication mechanism and data encryption measure.
System main website protection module, the specific safety prevention measure comprising main website and network perimeter security protection, safety are anti- Shield measure includes host placement location, formulates Unified Policy and distinguishes user and the visitor of information, distributes different access for it Information and processing authority, database server have intrusion detection capability and anti-virus ability, using reliable safety measure into Row isolation;Network perimeter security protection includes preventing with the safety of sales service application system interface and other correlation system interfaces Shield, formulates corresponding safety measure, with specification and instructs power information acquisition system to carry out data friendship by network with other systems The safety requirements changed.
Telepak protection module includes GPRS access net protection and the protection of optical fiber private network;The specific bag of GPRS access net protection Contain:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system;
Step 6:Carry out the backup of secure configuration file.
The intelligent network lotus interactive terminal protecting information safety authentication encryption method, it is characterised in that:Local channel is prevented Protecting module includes the protection of power information Intranet and power line carrier protection.
The protection of power information Intranet specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system:Deployment intruding detection system examines the data through network transmission in a network Survey, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the associated profile of security strategy Backup, in case recover be used.
Power line carrier protection then by specification electric line carrier communication stipulations, is solved using advanced PLC technology Across the platform change cross-interference issue of carrier signal, carries out the security control in data acquisition, strengthens unit-area management.
Collecting device protection module includes ID authentication mechanism and data encryption measures, adds in acquisition terminal and electric energy table side Dress collection Special safety authenticated encryption chip, coordinates collecting device to install collection Special safety authenticated encryption mould additional in system main website side Block, the security authentication mechanism of acquisition terminal and electric energy meter is realized by hardware mode, and realizes transparent encryption to accessing data And decryption processing;The workflow of authenticated encryption module is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no Receive the data access request of originating end;Realized during authentication by checking the legitimacy of digital certificate;
Step 2:For originating end with receiving terminal authentication by rear, both sides, which establish mutual trust passage and consult, carries out data visit The working key asked;
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, and both sides are to receiving The decryption and integrity verification that the encryption information arrived carries out, realize the security protection to important information.
Data encryption measure, gather Special safety authenticated encryption chip and encrypting module managed by specialized agency, make and Provide, it is entirely controlled, and using by State Commercial Cryptography Administration approval Encryption Algorithm be encrypted wait security protection operate.
Beneficial effect:A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method provided by the invention, structure The sustainable general safety protectiving scheme of a dynamic has been built, relatively reliable protection is provided for intelligent network lotus interactive terminal information Service, proposes effective security protection scheme, improves the overall safety protective capacities of intelligent network lotus interactive terminal, it is ensured that intelligence electricity Net system safe and stable operation.
Brief description of the drawings
Fig. 1 is security protection authenticated encryption system overall framework schematic diagram of the present invention;
Fig. 2 is the GPRS wireless public networks access security protection schematic diagram of the present invention;
Fig. 3 is the main website and expert terminals encrypted work schematic diagram of the present invention;
Fig. 4 is main website-concentrator-carrier wave meter encrypted work schematic diagram of the present invention;
Fig. 5 is main website-concentrator-collector-electric energy meter encrypted work schematic diagram of the present invention.
Embodiment
The present invention is further described with specific embodiment below in conjunction with the accompanying drawings.Following embodiments are only used for more Technical scheme is clearly demonstrated, and is not intended to limit the protection scope of the present invention and limits the scope of the invention.
As shown in Figure 1, a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, designed information peace Full protection system includes main website layer, telepak layer and collecting device layer.The system studied can be divided into system main website protection mould Block, collection CG channel-guard module and collecting device protection module.System main website protection module needs the intelligent net load interaction tackled The potential security risk of terminal information acquisition system is mainly comprising physical layer, network level, host aspect, application sum number According to five aspects such as aspect;Collection CG channel-guard module contains telepak protection and local channel protection;Collecting device is prevented Module is protected in addition to strengthening to the security control of collecting device in management, with greater need for the guarantee collecting device from technological means Safety, mainly uses ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
The safety prevention measure part of system main website protection module mainly includes following several respects in the present invention:
(1)Host should be placed on the Special machine room with conditions such as antidetonation, waterproof and dustproof, antistatics, main equipment room and operation room point Open, avoid irrelevant personnel from operating master device;Computer room epidemic disaster to meet host operation technical requirements, host reliable ground, Equipped with power supply, battery capacity meets system safety requirements;
(2)Formulate computer room safety management method.Unified Policy is formulated on the basis of subscriber authentication and authorization control mechanism User and the visitor of information are distinguished, distributes different access information and processing authority for it.
(3)Database server has intrusion detection capability and anti-virus ability, and the data of database want daily self-timing Data redundancy backup is carried out, and possesses the ability of long-distance disaster;For core data sensitive in database, to be considered as counting According to encrypted measure;Access to database will have stringent verification and review mechanism, and record operation log.
(4)Server and work station will be provided with fire wall, anti-virus software, and upgrade in time patch and virus base, and Software installation and use to server and work station carry out necessary monitoring, prevent that consciously or unconsciously installing some has safety The software of hidden danger.
(5)The core equipments such as interchanger, server, active station, front end processor need redundant configuration, eliminate the single-point of key node Failure.The redundant measure of database server includes disk array, cluster or two-node cluster hot backup etc..
(6)The modification of some important parameters, the execution of control command for collecting device, use through authentication and close Transmission is encrypted in the session key that key agreement protocol negotiates, it is ensured that the security of control operation.Operating process information needs detailed Thin record, and preserve for a long time.
(7)Operating personnel issue parameter in main website, configure hardware identification operator's identity of similar password card, communication data The close steel of communication in password card is loaded, prevents hacker from invading operating system and sending control instruction.
(8)Stringent control panel etc. patches use of the equipment on system host, to prevent viral transmission and information-leakage.
(9)To be isolated between the intranet and extranet of system using reliable safety measure, and to needing to carry out by network The data of transmission start to transmit again after carrying out strong encryption processing.
The network perimeter security guard section of system main website protection module is to formulate corresponding safety measure in the present invention, with rule Model and power information acquisition system and other systems are instructed to carry out the safety requirements of data exchange by network.Including:
(1)It is the security protection with sales service application system interface first, for details, reference can be made to Fig. 1.
(2)Secondly the security protection with other correlation system interfaces.
Collection CG channel-guard module in the present invention includes telepak protection module and local channel protection module.Remotely CG channel-guard module includes GPRS access net protection and the protection of optical fiber private network, and GPRS is as a kind of free wireless public network, in order to protect Application safety of the power information acquisition system after wireless public network access is demonstrate,proved, it is necessary to the wireless public network access Electricity Information Network such as strengthen Security protection, to access must formulate stringent security isolation measure.The security protection schematic diagram of wireless public network access is as schemed 2.GPRS access net protection specifically includes:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system (IDS);
Step 6:Carry out the backup of secure configuration file.
And optical fiber private network possesses higher security level, it is special not have to consider as the dedicated cable network of electric power Safety prevention measure.
Local channel protection module in the present invention includes the protection of power information Intranet and power line carrier protection, electric power letter It is electric system core business net to cease Intranet, is key protection object, specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system (IDS):In a network dispose intruding detection system to the data through network transmission into Row detection, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the relevant configuration of security strategy The backup of file, in case recovering to be used.
Power line carrier protection then needs specification electric line carrier communication stipulations, is solved using advanced PLC technology Across the platform change cross-interference issue of carrier signal, carries out the security control in data acquisition, strengthens unit-area management.
Collecting device protection module in the present invention includes ID authentication mechanism and data encryption measures, certification and encryption mould The workflow of block is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no Receive the data access request of originating end.Realized during authentication by checking the legitimacy of digital certificate.
Step 2:With receiving terminal authentication by rear, both sides establish mutual trust passage and consult into line number originating end According to the working key of access.
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, both sides The decryption carried out to received encryption information and integrity verification, realize the security protection to important information.
For several typical drainage patterns, collection Special safety authenticated encryption chip and encrypting module are provided in system master Stand, the authenticated encryption operating diagram to important information transmission of acquisition terminal, electric energy meter each several part, such as Fig. 3, Fig. 4, Fig. 5.
ID authentication mechanism in the present invention, it is characterised in that install collection Special safety additional in acquisition terminal and electric energy table side Authenticated encryption chip, coordinates collecting device to install collection Special safety authenticated encryption module additional in system main website side, passes through hardware side Formula realizes the security authentication mechanism of acquisition terminal and electric energy meter, and realizes transparent encryption and decryption process to accessing data.
Data encryption measure in the present invention, it is characterised in that collection Special safety authenticated encryption chip and encrypting module by Specialized agency's management, make and provide, entirely controlled, and is encrypted using the Encryption Algorithm by State Commercial Cryptography Administration's approval Security protection operates.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, including system main website layer, telepak layer With collecting device layer, system main website protection module, collection CG channel-guard module and collecting device protection module are correspondingly arranged respectively;
System main website protection module needs the potential security risk of intelligent network lotus interactive terminal information acquisition system tackled, comprising Five physical layer, network level, host aspect, application and data plane aspects;
Collection CG channel-guard module includes telepak protection module and local channel protection module;
Collecting device protection module strengthens the security control to collecting device in management, while collection is ensured from technological means The safety of equipment, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
2. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: In system main website layer, the operation of system main website on a private network, and carries out the protection of network route, network boundary protects, network is set Standby security configuration.
3. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: In telepak layer, firewall security measures are taken in the access of remote collection channel, when using public communication network, forbid it Directly interconnected with system Intranet, install dedicated public network access isolating device additional, ensure that network failure and security incident are limited in office Within portion region;The communication data of telepak and local channel uses authenticated encryption mechanism, and installing data additional at communication both ends recognizes Encryption device is demonstrate,proved, ensures the confidentiality, integrity, and availability of data.
4. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: In collecting device layer, collecting device is using ID authentication mechanism and data encryption measure.
5. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: System main website protection module, the specific safety prevention measure comprising main website and network perimeter security protection, safety prevention measure bag Include host placement location, formulate Unified Policy and distinguish user and the visitor of information, distribute for it different access informations and Processing authority, database server have intrusion detection capability and anti-virus ability, are isolated using reliable safety measure;Net The protection of network security boundary includes the security protection with sales service application system interface and other correlation system interfaces, formulates corresponding Safety measure, with specification and instructs power information acquisition system will by the safety of network progress data exchange with other systems Ask.
6. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: Telepak protection module includes GPRS access net protection and the protection of optical fiber private network;GPRS access net protection specifically includes:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system;
Step 6:Carry out the backup of secure configuration file.
7. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that: Local channel protection module includes the protection of power information Intranet and power line carrier protection.
8. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 7, it is characterised in that: The protection of power information Intranet specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system:Deployment intruding detection system examines the data through network transmission in a network Survey, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the associated profile of security strategy Backup, in case recover be used.
9. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 7, it is characterised in that: By specification electric line carrier communication stipulations, carrier signal then is solved using advanced PLC technology for power line carrier protection Across platform change cross-interference issue, carries out the security control in data acquisition, strengthens unit-area management.
10. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, its feature exist In:Collecting device protection module includes ID authentication mechanism and data encryption measures, installs additional and adopts in acquisition terminal and electric energy table side Collect Special safety authenticated encryption chip, coordinate collecting device to install collection Special safety authenticated encryption module additional in system main website side, The security authentication mechanism of acquisition terminal and electric energy meter is realized by hardware mode, and realizes that transparent encryption is conciliate to accessing data Close processing;The workflow of authenticated encryption module is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no Receive the data access request of originating end;Realized during authentication by checking the legitimacy of digital certificate;
Step 2:For originating end with receiving terminal authentication by rear, both sides, which establish mutual trust passage and consult, carries out data visit The working key asked;
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, and both sides are to receiving The decryption and integrity verification that the encryption information arrived carries out, realize the security protection to important information.
CN201711456891.1A 2017-12-28 2017-12-28 A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method Pending CN107920089A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711456891.1A CN107920089A (en) 2017-12-28 2017-12-28 A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711456891.1A CN107920089A (en) 2017-12-28 2017-12-28 A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method

Publications (1)

Publication Number Publication Date
CN107920089A true CN107920089A (en) 2018-04-17

Family

ID=61894349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711456891.1A Pending CN107920089A (en) 2017-12-28 2017-12-28 A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method

Country Status (1)

Country Link
CN (1) CN107920089A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048838A (en) * 2019-04-19 2019-07-23 鼎信信息科技有限责任公司 A kind of carrier wave system
CN110633956A (en) * 2019-09-05 2019-12-31 国网上海市电力公司 Information safety protection system of interactive service type microgrid
CN111526018A (en) * 2020-05-06 2020-08-11 广东纬德信息科技股份有限公司 Communication encryption system and communication encryption method based on power distribution
CN112272048A (en) * 2020-10-24 2021-01-26 青岛鼎信通讯股份有限公司 Network port locking method applied to medium-voltage carrier communication equipment
CN113393210A (en) * 2021-06-15 2021-09-14 镇江高等职业技术学校 Internet of things system terminal for industrial production
CN114285598A (en) * 2021-11-23 2022-04-05 贵州电网有限责任公司 Safety protection design method of intelligent measurement system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882859A (en) * 2012-09-13 2013-01-16 广东电网公司电力科学研究院 Security protection method based on public network data transmission information system
US20150035682A1 (en) * 2012-03-01 2015-02-05 Panasonic Corporation Slave suitable for energy management systems and energy management system
CN105763542A (en) * 2016-02-02 2016-07-13 国家电网公司 Device and method of encryption and authentication for distribution terminal serial port communication
CN105844395A (en) * 2016-03-22 2016-08-10 国家电网公司 Cooling, heating and power hybrid energy integrated information management system
CN205847326U (en) * 2016-08-08 2016-12-28 中国南方电网有限责任公司电网技术研究中心 The electric power monitoring system safety access device that layering is disposed

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150035682A1 (en) * 2012-03-01 2015-02-05 Panasonic Corporation Slave suitable for energy management systems and energy management system
CN102882859A (en) * 2012-09-13 2013-01-16 广东电网公司电力科学研究院 Security protection method based on public network data transmission information system
CN105763542A (en) * 2016-02-02 2016-07-13 国家电网公司 Device and method of encryption and authentication for distribution terminal serial port communication
CN105844395A (en) * 2016-03-22 2016-08-10 国家电网公司 Cooling, heating and power hybrid energy integrated information management system
CN205847326U (en) * 2016-08-08 2016-12-28 中国南方电网有限责任公司电网技术研究中心 The electric power monitoring system safety access device that layering is disposed

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048838A (en) * 2019-04-19 2019-07-23 鼎信信息科技有限责任公司 A kind of carrier wave system
CN110048838B (en) * 2019-04-19 2020-05-05 南方电网数字电网研究院有限公司 Power line carrier system
CN110633956A (en) * 2019-09-05 2019-12-31 国网上海市电力公司 Information safety protection system of interactive service type microgrid
CN111526018A (en) * 2020-05-06 2020-08-11 广东纬德信息科技股份有限公司 Communication encryption system and communication encryption method based on power distribution
CN111526018B (en) * 2020-05-06 2023-08-01 广东纬德信息科技股份有限公司 Communication encryption system and communication encryption method based on power distribution
CN112272048A (en) * 2020-10-24 2021-01-26 青岛鼎信通讯股份有限公司 Network port locking method applied to medium-voltage carrier communication equipment
CN113393210A (en) * 2021-06-15 2021-09-14 镇江高等职业技术学校 Internet of things system terminal for industrial production
CN114285598A (en) * 2021-11-23 2022-04-05 贵州电网有限责任公司 Safety protection design method of intelligent measurement system

Similar Documents

Publication Publication Date Title
CN107920089A (en) A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method
CN104184735B (en) Power marketing mobile application security guard system
CN207283594U (en) Power transmission and transformation equipment state monitoring system based on network security subregion
US8918639B2 (en) Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid
CN106789015B (en) Intelligent power distribution network communication safety system
CN108063751A (en) A kind of public network safety access method for new energy power plant
CN106992984A (en) A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN110535653A (en) A kind of safe distribution terminal and its means of communication
EP3684007A1 (en) Physically secured authorization for utility applications
CN105430000A (en) Cloud computing security management system
CN105162808B (en) A kind of safe login method based on national secret algorithm
CN109995796A (en) Industrial control system terminal safety protection method
CN103269332A (en) Safeguard system for power secondary system
CN104539598A (en) Tor-improved safety anonymous network communication system and method
CN109981568B (en) Transformer substation remote operation safety protection method based on dual-channel identity authentication
CN106603488A (en) Safety system based on power grid statistical data searching method
CN106549502B (en) A kind of safe distribution of electric power protecting, monitoring system
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN110633956A (en) Information safety protection system of interactive service type microgrid
CN103051632A (en) Intelligent power-consumption communication safety protection method and system
CN105991524A (en) Family information security system
CN109120619A (en) A kind of computer network communications system
CN101646172B (en) Method and device for generating key in distributed MESH network
CN114531266A (en) Power distribution network data protection system and method based on intermediate database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180417

RJ01 Rejection of invention patent application after publication