CN107920089A - A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method - Google Patents
A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method Download PDFInfo
- Publication number
- CN107920089A CN107920089A CN201711456891.1A CN201711456891A CN107920089A CN 107920089 A CN107920089 A CN 107920089A CN 201711456891 A CN201711456891 A CN 201711456891A CN 107920089 A CN107920089 A CN 107920089A
- Authority
- CN
- China
- Prior art keywords
- protection
- safety
- network
- authentication
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, three aspects are protected from the protection of system main website, collection CG channel-guard, collecting device, the safety protection technique and safety management method of the coordinating and unifying are taken, safe design is carried out to authenticated encryption system.Wherein, system main website protection module is protected by the safety prevention measure and setting network security boundary for formulating main website, so as to ensure the safety of system main website;Gather CG channel-guard module and protection, the protection of power information Intranet, the protection of optical fiber private network, power line carrier protection are netted using GPRS accesses, realize the channel safety of intelligent network lotus interactive terminal system;Collecting device protection module ensures the safety of collecting device from technological means, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.The present invention constructs the sustainable general safety protectiving scheme of a dynamic, and relatively reliable protection service is provided for intelligent network lotus interactive terminal information.
Description
Technical field
The invention belongs to intelligent power distribution network technology field, and in particular to a kind of intelligent network lotus interactive terminal protecting information safety
Authentication encryption method.
Background technology
The information system of intelligent network lotus interactive terminal is the important component of electric power information, and there is an urgent need to it
Security risk assessment analysis is carried out, studies and defines the security protection Authenticated Encryption Schemes for meeting its security needs, design is applicable in
Subjective entropy, improve the safety protection level of power information acquisition system.And with the propulsion of intelligent grid,
Information technology is new due to introducing substantial amounts of information network in power industry extensive use, intelligent network lotus interactive terminal information system
Technology so that while intelligent processing information, safety problem becomes more complicated, more urgent.Selective analysis and assessment
Safety problem and potential security risk existing for each link of interactive terminal information acquisition system, research safety prevention policies, carry
Go out effective security protection scheme at present not yet to carry out, therefore design an intelligent network lotus interactive terminal comprehensive safety protecting certification
Encipherment scheme is particularly important.
The content of the invention
Purpose:In order to overcome the deficiencies in the prior art, the present invention provides a kind of intelligent network lotus interactive terminal information
Security protection authentication encryption method.
Technical solution:In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, including system main website layer, telepak layer and
Collecting device layer, is correspondingly arranged system main website protection module, collection CG channel-guard module and collecting device protection module respectively;
System main website protection module needs the potential security risk of intelligent network lotus interactive terminal information acquisition system tackled, comprising
Five physical layer, network level, host aspect, application and data plane aspects;
Collection CG channel-guard module includes telepak protection module and local channel protection module;
Collecting device protection module strengthens the security control to collecting device in management, while collection is ensured from technological means
The safety of equipment, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
In system main website layer, the operation of system main website on a private network, and carries out the protection of network route, network boundary is prevented
Shield, network equipment security configuration.
In telepak layer, firewall security measures are taken in the access of remote collection channel, when using public communication network
When, forbid it directly to be interconnected with system Intranet, install dedicated public network access isolating device additional, ensure network failure and security incident
It is limited within regional area;The communication data of telepak and local channel uses authenticated encryption mechanism, adds at communication both ends
Data authentication encryption device is filled, ensures the confidentiality, integrity, and availability of data.
In collecting device layer, collecting device is using ID authentication mechanism and data encryption measure.
System main website protection module, the specific safety prevention measure comprising main website and network perimeter security protection, safety are anti-
Shield measure includes host placement location, formulates Unified Policy and distinguishes user and the visitor of information, distributes different access for it
Information and processing authority, database server have intrusion detection capability and anti-virus ability, using reliable safety measure into
Row isolation;Network perimeter security protection includes preventing with the safety of sales service application system interface and other correlation system interfaces
Shield, formulates corresponding safety measure, with specification and instructs power information acquisition system to carry out data friendship by network with other systems
The safety requirements changed.
Telepak protection module includes GPRS access net protection and the protection of optical fiber private network;The specific bag of GPRS access net protection
Contain:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system;
Step 6:Carry out the backup of secure configuration file.
The intelligent network lotus interactive terminal protecting information safety authentication encryption method, it is characterised in that:Local channel is prevented
Protecting module includes the protection of power information Intranet and power line carrier protection.
The protection of power information Intranet specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and
Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain
Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system:Deployment intruding detection system examines the data through network transmission in a network
Survey, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the associated profile of security strategy
Backup, in case recover be used.
Power line carrier protection then by specification electric line carrier communication stipulations, is solved using advanced PLC technology
Across the platform change cross-interference issue of carrier signal, carries out the security control in data acquisition, strengthens unit-area management.
Collecting device protection module includes ID authentication mechanism and data encryption measures, adds in acquisition terminal and electric energy table side
Dress collection Special safety authenticated encryption chip, coordinates collecting device to install collection Special safety authenticated encryption mould additional in system main website side
Block, the security authentication mechanism of acquisition terminal and electric energy meter is realized by hardware mode, and realizes transparent encryption to accessing data
And decryption processing;The workflow of authenticated encryption module is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out
Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no
Receive the data access request of originating end;Realized during authentication by checking the legitimacy of digital certificate;
Step 2:For originating end with receiving terminal authentication by rear, both sides, which establish mutual trust passage and consult, carries out data visit
The working key asked;
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, and both sides are to receiving
The decryption and integrity verification that the encryption information arrived carries out, realize the security protection to important information.
Data encryption measure, gather Special safety authenticated encryption chip and encrypting module managed by specialized agency, make and
Provide, it is entirely controlled, and using by State Commercial Cryptography Administration approval Encryption Algorithm be encrypted wait security protection operate.
Beneficial effect:A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method provided by the invention, structure
The sustainable general safety protectiving scheme of a dynamic has been built, relatively reliable protection is provided for intelligent network lotus interactive terminal information
Service, proposes effective security protection scheme, improves the overall safety protective capacities of intelligent network lotus interactive terminal, it is ensured that intelligence electricity
Net system safe and stable operation.
Brief description of the drawings
Fig. 1 is security protection authenticated encryption system overall framework schematic diagram of the present invention;
Fig. 2 is the GPRS wireless public networks access security protection schematic diagram of the present invention;
Fig. 3 is the main website and expert terminals encrypted work schematic diagram of the present invention;
Fig. 4 is main website-concentrator-carrier wave meter encrypted work schematic diagram of the present invention;
Fig. 5 is main website-concentrator-collector-electric energy meter encrypted work schematic diagram of the present invention.
Embodiment
The present invention is further described with specific embodiment below in conjunction with the accompanying drawings.Following embodiments are only used for more
Technical scheme is clearly demonstrated, and is not intended to limit the protection scope of the present invention and limits the scope of the invention.
As shown in Figure 1, a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, designed information peace
Full protection system includes main website layer, telepak layer and collecting device layer.The system studied can be divided into system main website protection mould
Block, collection CG channel-guard module and collecting device protection module.System main website protection module needs the intelligent net load interaction tackled
The potential security risk of terminal information acquisition system is mainly comprising physical layer, network level, host aspect, application sum number
According to five aspects such as aspect;Collection CG channel-guard module contains telepak protection and local channel protection;Collecting device is prevented
Module is protected in addition to strengthening to the security control of collecting device in management, with greater need for the guarantee collecting device from technological means
Safety, mainly uses ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
The safety prevention measure part of system main website protection module mainly includes following several respects in the present invention:
(1)Host should be placed on the Special machine room with conditions such as antidetonation, waterproof and dustproof, antistatics, main equipment room and operation room point
Open, avoid irrelevant personnel from operating master device;Computer room epidemic disaster to meet host operation technical requirements, host reliable ground,
Equipped with power supply, battery capacity meets system safety requirements;
(2)Formulate computer room safety management method.Unified Policy is formulated on the basis of subscriber authentication and authorization control mechanism
User and the visitor of information are distinguished, distributes different access information and processing authority for it.
(3)Database server has intrusion detection capability and anti-virus ability, and the data of database want daily self-timing
Data redundancy backup is carried out, and possesses the ability of long-distance disaster;For core data sensitive in database, to be considered as counting
According to encrypted measure;Access to database will have stringent verification and review mechanism, and record operation log.
(4)Server and work station will be provided with fire wall, anti-virus software, and upgrade in time patch and virus base, and
Software installation and use to server and work station carry out necessary monitoring, prevent that consciously or unconsciously installing some has safety
The software of hidden danger.
(5)The core equipments such as interchanger, server, active station, front end processor need redundant configuration, eliminate the single-point of key node
Failure.The redundant measure of database server includes disk array, cluster or two-node cluster hot backup etc..
(6)The modification of some important parameters, the execution of control command for collecting device, use through authentication and close
Transmission is encrypted in the session key that key agreement protocol negotiates, it is ensured that the security of control operation.Operating process information needs detailed
Thin record, and preserve for a long time.
(7)Operating personnel issue parameter in main website, configure hardware identification operator's identity of similar password card, communication data
The close steel of communication in password card is loaded, prevents hacker from invading operating system and sending control instruction.
(8)Stringent control panel etc. patches use of the equipment on system host, to prevent viral transmission and information-leakage.
(9)To be isolated between the intranet and extranet of system using reliable safety measure, and to needing to carry out by network
The data of transmission start to transmit again after carrying out strong encryption processing.
The network perimeter security guard section of system main website protection module is to formulate corresponding safety measure in the present invention, with rule
Model and power information acquisition system and other systems are instructed to carry out the safety requirements of data exchange by network.Including:
(1)It is the security protection with sales service application system interface first, for details, reference can be made to Fig. 1.
(2)Secondly the security protection with other correlation system interfaces.
Collection CG channel-guard module in the present invention includes telepak protection module and local channel protection module.Remotely
CG channel-guard module includes GPRS access net protection and the protection of optical fiber private network, and GPRS is as a kind of free wireless public network, in order to protect
Application safety of the power information acquisition system after wireless public network access is demonstrate,proved, it is necessary to the wireless public network access Electricity Information Network such as strengthen
Security protection, to access must formulate stringent security isolation measure.The security protection schematic diagram of wireless public network access is as schemed
2.GPRS access net protection specifically includes:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system (IDS);
Step 6:Carry out the backup of secure configuration file.
And optical fiber private network possesses higher security level, it is special not have to consider as the dedicated cable network of electric power
Safety prevention measure.
Local channel protection module in the present invention includes the protection of power information Intranet and power line carrier protection, electric power letter
It is electric system core business net to cease Intranet, is key protection object, specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and
Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain
Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system (IDS):In a network dispose intruding detection system to the data through network transmission into
Row detection, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the relevant configuration of security strategy
The backup of file, in case recovering to be used.
Power line carrier protection then needs specification electric line carrier communication stipulations, is solved using advanced PLC technology
Across the platform change cross-interference issue of carrier signal, carries out the security control in data acquisition, strengthens unit-area management.
Collecting device protection module in the present invention includes ID authentication mechanism and data encryption measures, certification and encryption mould
The workflow of block is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out
Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no
Receive the data access request of originating end.Realized during authentication by checking the legitimacy of digital certificate.
Step 2:With receiving terminal authentication by rear, both sides establish mutual trust passage and consult into line number originating end
According to the working key of access.
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, both sides
The decryption carried out to received encryption information and integrity verification, realize the security protection to important information.
For several typical drainage patterns, collection Special safety authenticated encryption chip and encrypting module are provided in system master
Stand, the authenticated encryption operating diagram to important information transmission of acquisition terminal, electric energy meter each several part, such as Fig. 3, Fig. 4, Fig. 5.
ID authentication mechanism in the present invention, it is characterised in that install collection Special safety additional in acquisition terminal and electric energy table side
Authenticated encryption chip, coordinates collecting device to install collection Special safety authenticated encryption module additional in system main website side, passes through hardware side
Formula realizes the security authentication mechanism of acquisition terminal and electric energy meter, and realizes transparent encryption and decryption process to accessing data.
Data encryption measure in the present invention, it is characterised in that collection Special safety authenticated encryption chip and encrypting module by
Specialized agency's management, make and provide, entirely controlled, and is encrypted using the Encryption Algorithm by State Commercial Cryptography Administration's approval
Security protection operates.
The above is only the preferred embodiment of the present invention, it should be pointed out that:For the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method, including system main website layer, telepak layer
With collecting device layer, system main website protection module, collection CG channel-guard module and collecting device protection module are correspondingly arranged respectively;
System main website protection module needs the potential security risk of intelligent network lotus interactive terminal information acquisition system tackled, comprising
Five physical layer, network level, host aspect, application and data plane aspects;
Collection CG channel-guard module includes telepak protection module and local channel protection module;
Collecting device protection module strengthens the security control to collecting device in management, while collection is ensured from technological means
The safety of equipment, using ID authentication mechanism and data encryption measure, improves the security protection ability of collecting device.
2. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
In system main website layer, the operation of system main website on a private network, and carries out the protection of network route, network boundary protects, network is set
Standby security configuration.
3. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
In telepak layer, firewall security measures are taken in the access of remote collection channel, when using public communication network, forbid it
Directly interconnected with system Intranet, install dedicated public network access isolating device additional, ensure that network failure and security incident are limited in office
Within portion region;The communication data of telepak and local channel uses authenticated encryption mechanism, and installing data additional at communication both ends recognizes
Encryption device is demonstrate,proved, ensures the confidentiality, integrity, and availability of data.
4. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
In collecting device layer, collecting device is using ID authentication mechanism and data encryption measure.
5. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
System main website protection module, the specific safety prevention measure comprising main website and network perimeter security protection, safety prevention measure bag
Include host placement location, formulate Unified Policy and distinguish user and the visitor of information, distribute for it different access informations and
Processing authority, database server have intrusion detection capability and anti-virus ability, are isolated using reliable safety measure;Net
The protection of network security boundary includes the security protection with sales service application system interface and other correlation system interfaces, formulates corresponding
Safety measure, with specification and instructs power information acquisition system will by the safety of network progress data exchange with other systems
Ask.
6. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
Telepak protection module includes GPRS access net protection and the protection of optical fiber private network;GPRS access net protection specifically includes:
Step 1:Access VPN fire walls;
Step 2:Configure router;
Step 3:Configure radius server;
Step 4:Configuration DHCP server;
Step 5:It is equipped with intruding detection system;
Step 6:Carry out the backup of secure configuration file.
7. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, it is characterised in that:
Local channel protection module includes the protection of power information Intranet and power line carrier protection.
8. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 7, it is characterised in that:
The protection of power information Intranet specifically includes:
Step 1:Configure strong logic isolation device:Install strong logic isolation device additional on power information Intranet border, effectively control and
Data access safety between management access net and power information Intranet;
Step 2:Strictly managed by layering point domain:Inside power information Intranet, it is necessary to require, divide in strict accordance with layering point domain
Independent private local area network, by the router between network layer, ensures access safety between domain;
Step 3:It is equipped with intruding detection system:Deployment intruding detection system examines the data through network transmission in a network
Survey, the terminal address transmitted according to network customizes invasion detection system rule, and carries out the associated profile of security strategy
Backup, in case recover be used.
9. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 7, it is characterised in that:
By specification electric line carrier communication stipulations, carrier signal then is solved using advanced PLC technology for power line carrier protection
Across platform change cross-interference issue, carries out the security control in data acquisition, strengthens unit-area management.
10. intelligent network lotus interactive terminal protecting information safety authentication encryption method according to claim 1, its feature exist
In:Collecting device protection module includes ID authentication mechanism and data encryption measures, installs additional and adopts in acquisition terminal and electric energy table side
Collect Special safety authenticated encryption chip, coordinate collecting device to install collection Special safety authenticated encryption module additional in system main website side,
The security authentication mechanism of acquisition terminal and electric energy meter is realized by hardware mode, and realizes that transparent encryption is conciliate to accessing data
Close processing;The workflow of authenticated encryption module is as follows:
Step 1:Originating end sends ID authentication request, and receiving terminal carries out identity to it and verifies, is verified, shows to send out
Origin or beginning is legitimate request person, and receiving terminal replys the information that authentication passes through;Otherwise, receiving terminal informs that authentication fails, no
Receive the data access request of originating end;Realized during authentication by checking the legitimacy of digital certificate;
Step 2:For originating end with receiving terminal authentication by rear, both sides, which establish mutual trust passage and consult, carries out data visit
The working key asked;
Step 3:Originating end is encrypted the important message of access using the working key of negotiation with receiving terminal, and both sides are to receiving
The decryption and integrity verification that the encryption information arrived carries out, realize the security protection to important information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711456891.1A CN107920089A (en) | 2017-12-28 | 2017-12-28 | A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711456891.1A CN107920089A (en) | 2017-12-28 | 2017-12-28 | A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107920089A true CN107920089A (en) | 2018-04-17 |
Family
ID=61894349
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711456891.1A Pending CN107920089A (en) | 2017-12-28 | 2017-12-28 | A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107920089A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110048838A (en) * | 2019-04-19 | 2019-07-23 | 鼎信信息科技有限责任公司 | A kind of carrier wave system |
CN110633956A (en) * | 2019-09-05 | 2019-12-31 | 国网上海市电力公司 | Information safety protection system of interactive service type microgrid |
CN111526018A (en) * | 2020-05-06 | 2020-08-11 | 广东纬德信息科技股份有限公司 | Communication encryption system and communication encryption method based on power distribution |
CN112272048A (en) * | 2020-10-24 | 2021-01-26 | 青岛鼎信通讯股份有限公司 | Network port locking method applied to medium-voltage carrier communication equipment |
CN113393210A (en) * | 2021-06-15 | 2021-09-14 | 镇江高等职业技术学校 | Internet of things system terminal for industrial production |
CN114285598A (en) * | 2021-11-23 | 2022-04-05 | 贵州电网有限责任公司 | Safety protection design method of intelligent measurement system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882859A (en) * | 2012-09-13 | 2013-01-16 | 广东电网公司电力科学研究院 | Security protection method based on public network data transmission information system |
US20150035682A1 (en) * | 2012-03-01 | 2015-02-05 | Panasonic Corporation | Slave suitable for energy management systems and energy management system |
CN105763542A (en) * | 2016-02-02 | 2016-07-13 | 国家电网公司 | Device and method of encryption and authentication for distribution terminal serial port communication |
CN105844395A (en) * | 2016-03-22 | 2016-08-10 | 国家电网公司 | Cooling, heating and power hybrid energy integrated information management system |
CN205847326U (en) * | 2016-08-08 | 2016-12-28 | 中国南方电网有限责任公司电网技术研究中心 | The electric power monitoring system safety access device that layering is disposed |
-
2017
- 2017-12-28 CN CN201711456891.1A patent/CN107920089A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150035682A1 (en) * | 2012-03-01 | 2015-02-05 | Panasonic Corporation | Slave suitable for energy management systems and energy management system |
CN102882859A (en) * | 2012-09-13 | 2013-01-16 | 广东电网公司电力科学研究院 | Security protection method based on public network data transmission information system |
CN105763542A (en) * | 2016-02-02 | 2016-07-13 | 国家电网公司 | Device and method of encryption and authentication for distribution terminal serial port communication |
CN105844395A (en) * | 2016-03-22 | 2016-08-10 | 国家电网公司 | Cooling, heating and power hybrid energy integrated information management system |
CN205847326U (en) * | 2016-08-08 | 2016-12-28 | 中国南方电网有限责任公司电网技术研究中心 | The electric power monitoring system safety access device that layering is disposed |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110048838A (en) * | 2019-04-19 | 2019-07-23 | 鼎信信息科技有限责任公司 | A kind of carrier wave system |
CN110048838B (en) * | 2019-04-19 | 2020-05-05 | 南方电网数字电网研究院有限公司 | Power line carrier system |
CN110633956A (en) * | 2019-09-05 | 2019-12-31 | 国网上海市电力公司 | Information safety protection system of interactive service type microgrid |
CN111526018A (en) * | 2020-05-06 | 2020-08-11 | 广东纬德信息科技股份有限公司 | Communication encryption system and communication encryption method based on power distribution |
CN111526018B (en) * | 2020-05-06 | 2023-08-01 | 广东纬德信息科技股份有限公司 | Communication encryption system and communication encryption method based on power distribution |
CN112272048A (en) * | 2020-10-24 | 2021-01-26 | 青岛鼎信通讯股份有限公司 | Network port locking method applied to medium-voltage carrier communication equipment |
CN113393210A (en) * | 2021-06-15 | 2021-09-14 | 镇江高等职业技术学校 | Internet of things system terminal for industrial production |
CN114285598A (en) * | 2021-11-23 | 2022-04-05 | 贵州电网有限责任公司 | Safety protection design method of intelligent measurement system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107920089A (en) | A kind of intelligent network lotus interactive terminal protecting information safety authentication encryption method | |
CN104184735B (en) | Power marketing mobile application security guard system | |
CN207283594U (en) | Power transmission and transformation equipment state monitoring system based on network security subregion | |
US8918639B2 (en) | Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid | |
CN106789015B (en) | Intelligent power distribution network communication safety system | |
CN108063751A (en) | A kind of public network safety access method for new energy power plant | |
CN106992984A (en) | A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net | |
CN110535653A (en) | A kind of safe distribution terminal and its means of communication | |
EP3684007A1 (en) | Physically secured authorization for utility applications | |
CN105430000A (en) | Cloud computing security management system | |
CN105162808B (en) | A kind of safe login method based on national secret algorithm | |
CN109995796A (en) | Industrial control system terminal safety protection method | |
CN103269332A (en) | Safeguard system for power secondary system | |
CN104539598A (en) | Tor-improved safety anonymous network communication system and method | |
CN109981568B (en) | Transformer substation remote operation safety protection method based on dual-channel identity authentication | |
CN106603488A (en) | Safety system based on power grid statistical data searching method | |
CN106549502B (en) | A kind of safe distribution of electric power protecting, monitoring system | |
CN104065485A (en) | Power grid dispatching mobile platform safety guaranteeing and controlling method | |
CN109617875A (en) | A kind of the secure accessing platform and its implementation of terminal communication network | |
CN110633956A (en) | Information safety protection system of interactive service type microgrid | |
CN103051632A (en) | Intelligent power-consumption communication safety protection method and system | |
CN105991524A (en) | Family information security system | |
CN109120619A (en) | A kind of computer network communications system | |
CN101646172B (en) | Method and device for generating key in distributed MESH network | |
CN114531266A (en) | Power distribution network data protection system and method based on intermediate database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180417 |
|
RJ01 | Rejection of invention patent application after publication |