CN103873462A - IEC62351-based security configuration verification method for IED schema file and IED configuration file - Google Patents

IEC62351-based security configuration verification method for IED schema file and IED configuration file Download PDF

Info

Publication number
CN103873462A
CN103873462A CN201410051945.6A CN201410051945A CN103873462A CN 103873462 A CN103873462 A CN 103873462A CN 201410051945 A CN201410051945 A CN 201410051945A CN 103873462 A CN103873462 A CN 103873462A
Authority
CN
China
Prior art keywords
tree
file
ied
configuration file
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410051945.6A
Other languages
Chinese (zh)
Other versions
CN103873462B (en
Inventor
陶文伟
李金�
张喜铭
周鹏
樊腾飞
梁寿愚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Co Ltd
Original Assignee
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Co Ltd filed Critical China Southern Power Grid Co Ltd
Priority to CN201410051945.6A priority Critical patent/CN103873462B/en
Publication of CN103873462A publication Critical patent/CN103873462A/en
Application granted granted Critical
Publication of CN103873462B publication Critical patent/CN103873462B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/16Electric power substations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/18Systems supporting electrical power generation, transmission or distribution using switches, relays or circuit breakers, e.g. intelligent electronic devices [IED]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention aims to provide an IEC62351-based security configuration verification method for an IED schema file and an IED configuration file, and whether the communication in a substation automatic system is safe or not is determined by verifying the security configuration of the IED schema file and the IED configuration file in the substation automatic system, so that the security policy of the substation automatic system is directed. The method comprises the following steps that a security extension definition tree structure is constructed according to the SCL schema file security extension definition specific to GOOSE/SMV security regulated by the IEC62351 standard; an SCL schema file tree structure to be verified and an IED configuration file tree structure are constructed; the SCL schema file tree structure to be verified is traversed, and is matched with the security extension definition tree structure; the IED configuration file tree structure is traversed, and the validity of the IED configuration file is verified by using the SCL schema file tree structure; the IED configuration file tree structure is traversed, and whether a security configuration item exists in the IED configuration file is determined by using the security extension definition tree structure; if yes, the verification is passed; if not, the verification is not passed.

Description

IED pattern based on IEC62351 and the security configuration verification method of configuration file
Technical field
The present invention relates to file security checking, the present invention is a kind of inspection for (IED) configuration file of intelligent electronic device in intelligent substation and schema file security configuration item specifically, be mainly used in the intelligent substation IED configuration file of checking based on IEC62351 standard and schema file security configuration, taking determine intelligent substation IED equipment in communication process whether as secure communication.
Background technology
IEC 61850 has proposed one group of common communication standard of transformer station, by a series of standardization to equipment, make IED(intelligent electronic device) can under unified standard, carry out seamless link, in order to advance the development need of domestic transformer station, the domestic DL/T860 standard having proposed based on IEC 61850.
The feature of IEC 61850 is 1) object-oriented modeling; 2) Abstract Common Service Interface; 3) towards real-time service; 4) configuration language; 5) whole electric power system unified Modeling.
Transformer substation communication system is divided into substation level, wall, process layer by IEC 61850 standards.The unified Abstract Common Service Interface that adopts in network service upper strata of IEC61850, to concrete network, by bottom layer realization interface mappings is docked to abstract communication interface.Between substation level and wall, Abstract Common Service Interface is mapped to and manufactures message specification (MMS), TCP/IP (TCP/IP) Ethernet or optical networking.The Ethernet transmission of the network using broadcast type between wall and process layer.
State Grid Corporation of China clearly proposes research and extension taking IEC 61850 and electronic type PT/CT as basic digital transformer substation in Eleventh Five-Year Plan.IEC 61850 has proposed the direct access network based on ethernet of all devices between three layers of Substation process-levels, wall, station level.Network has become most important communication mode in transformer station as can be seen here.
But, while proposition due to IEC 61850 standards, only focus on the common share communication between IED, and the safety in communication process is not paid attention to, once cause transformer station invaded, and transformer station inside is without any safeguard procedures, consequence will be difficult to imagine.
In April, 2005, the IEC of International Organization for standardization has formulated IEC62351 data and communication security standard (draft), to solve data and the communication security problem in power communication field.In IEC62351, certification and encryption are core contents.In certification and ciphering process, will consider the use of certificate, in IEC62351, use certificate, need to configure next associated with certificate.
(the patent No.: 200810084515.9) for based on IEC 61850 is described in patent proving standardization configuration, by SCL schema file, IED configuration file is verified, because IEC 61850 standards do not relate to safety, so this patent, does not relate to the expansion of security configuration, the existence of SCL schema file security configuration item and the security configuration existence of IED configuration file.
The IED schema file that a kind of checking of this patent proposition requires based on IEC 62351 and the security configuration requirement of configuration file.By the security configuration requirement based on IEC62351, the schema file of SCL is mated to checking, determine that SCL schema file exists after security configuration, then the security configuration of configuration file to IED is carried out existence checking and model validation.
Summary of the invention
The object of the present invention is to provide a kind of IED pattern based on IEC62351 and the security configuration verification method of configuration file, by the IED schema file in checking electric substation automation system and the security configuration of configuration file, determine the safety of whether communicating by letter in electric substation automation system, to instruct the security strategy of electric substation automation system.
Object of the present invention can realize by following technical measures:
IED pattern based on IEC62351 and a security configuration verification method for configuration file, comprise the steps:
(1), according to the definition of the SCL schema file security extension for GOOSE/SMV safety of IEC62351 standard regulation, build security extension definition tree;
(2) construct SCL schema file tree to be verified and IED configuration file tree;
(3) travel through SCL schema file tree to be verified, with security extension definition tree type structure matching, if coupling continues step (4), otherwise, can not be by checking;
(4) traversal IED configuration file tree, uses SCL schema file tree to verify the validity of IED configuration file, if IED configuration file is effective, enters step (5), otherwise, can not be by checking;
(5) traversal IED configuration file tree, uses in security extension definition tree type structural determination IED configuration file whether deposit security configuration item, exists, be verified, otherwise, can not be by checking.
In described step (1), structure for the process of the SCL schema file security extension definition tree GOOSESecurityConfTree of GOOSE/SMV safety is:
Step 1.1: input SCL pattern GOOSE/SMV security extension defined file,
Step 1.2: traversal file, the relation of describing according to schema file, builds a multiway tree GOOSESecurityConfTree;
In described step (2), the process that builds SCL schema file tree SCLTree to be verified is:
Step 2.1: input SCL schema file to be verified,
Step 2.2: traversal file, the relation of describing according to schema file, builds a multiway tree SCLTree;
The process that builds IED configuration file tree IEDTree to be verified is:
Step 2.3: input IED configuration file to be verified,
Step 2.4: traversal file, the relation of describing according to configuration file, builds a multiway tree IEDTree;
The coupling of described step (3) specifically refers to traversal SCL schema file tree SCLTree, search the subtree in SCLTree, and compare with security extension definition tree GOOSESecurityConfTree, if exist certain subtree of SCLTree identical with GOOSESecurityConfTree, enter step 5, otherwise, report an error, finish.
Coupling in described step (4) specifically refers to traversal IED configuration file tree IEDTree, uses SCL schema file tree SCLTree to carry out validation verification to IEDTree, and detailed process comprises:
Step 4.1: traversal IEDTree tree;
Step 4.2: from IEDTree tree root, by traversal SCLTree tree, judge IEDTree node name, nodal community, node set membership, whether meet the constraint of SCLTree tree;
Step 4.3: if meet, return very, otherwise, return to vacation; Be true if return results, enter step 6, otherwise, report an error, finish.
In described step (5), traversal IED configuration file tree IEDTree, uses security extension definition tree GOOSESecurityConfTree to carry out existence checking to IEDTree, to determine in IED configuration file, safety is configured, and detailed process comprises:
Step 5.1: traversal IEDTree tree;
Step 5.2: from the child node of IEDTree, judge the subtree that whether exists GOOSESecurityConfTree to retrain in IEDTree;
Step 5.3: if exist, return very, be verified, otherwise, return to vacation, checking is not passed through.
The present invention contrasts prior art, has the following advantages:
The security configuration checking of the IED pattern of the inventive method based on IEC 62351 and configuration file, object is to solve the security configuration problem that the electric substation automation system of IEC 61850 standards is reinforced in the secure communication based on IEC 62351 standards.Because prior art is only verified for the IED configuration file of IEC 61850 standards, and since IEC 62351 standards propositions, the security configuration of IED configuration file need to be verified equally.The security configuration coupling of the schema file SCL file of this method by IED, and mate by security configuration by after SCL file IED file is carried out to security configuration checking, thereby whether definite IED configuration file there is safe configuration.To instruct the configuration management of electric substation automation system at secure context.
Brief description of the drawings
Fig. 1 is file architectural schematic of the present invention;
Fig. 2 is the inventive method schematic flow sheet;
Fig. 3 is the security extension definition of the SCL schema file based on IEC62351 standard.
Embodiment
Fig. 1 has provided the reference architecture figure of the security configuration checking of IED pattern based on IEC62351 and configuration file, and it mainly comprises three parts: security extension, SCL schema file and the IED configuration file of SCL schema file.
SCL schema file security extension is according to the expansion content in IEC 62351 standards, and main description based on the certificate in accessing points configures, and certificate can provide the encryption of information, certifying signature etc.
SCL schema file provides the type range describe of IED configuration file, and to determine the description scope of IED configuration file, before IEC 62351 standards do not have security extension part, SCL schema file is not arranged security configuration.
IED configuration file, the ability of description IED equipment.Before IEC 62351 standard SCL do not have security configuration description, IED configuration file does not need safety to be configured.
After IEC 62351 standards propose, this patent is based on IEC 62351 standards, propose first SCL schema file to be mated by the security extension part of SCL configuration file, to determine that SCL schema file exists security extension, with the security configuration of constraint IED configuration file, with the SCL schema file that has security extension, IED configuration file is verified again, and after being verified, to carry out existence checking to IED configuration file for SCL schema file security extension part, to determine that IED configuration file exists security configuration.
IED pattern based on IEC62351 of the present invention and the security configuration verification method of configuration file, comprise the steps:
(1), according to the definition of the SCL schema file security extension for GOOSE/SMV safety of IEC62351 standard regulation, build security extension definition tree;
(2) construct SCL schema file tree to be verified and IED configuration file tree;
(3) travel through SCL schema file tree to be verified, with security extension definition tree type structure matching, if coupling continues step (4), otherwise, can not be by checking;
(4) traversal IED configuration file tree, uses SCL schema file tree to verify the validity of IED configuration file, if IED configuration file is effective, enters step (5), otherwise, can not be by checking;
(5) traversal IED configuration file tree, uses in security extension definition tree type structural determination IED configuration file whether deposit security configuration item, exists, be verified, otherwise, can not be by checking.
In described step (1), structure for the process of the SCL schema file security extension definition tree GOOSESecurityConfTree of GOOSE/SMV safety is:
Step 1.1: input SCL pattern GOOSE/SMV security extension defined file,
Step 1.2: traversal file, the relation of describing according to schema file, builds a multiway tree GOOSESecurityConfTree;
In described step (2), the process that builds SCL schema file tree SCLTree to be verified is:
Step 2.1: input SCL schema file to be verified,
Step 2.2: traversal file, the relation of describing according to schema file, builds a multiway tree SCLTree;
The process that builds IED configuration file tree IEDTree to be verified is:
Step 2.3: input IED configuration file to be verified,
Step 2.4: traversal file, the relation of describing according to configuration file, builds a multiway tree IEDTree;
The coupling of described step (3) specifically refers to traversal SCL schema file tree SCLTree, search the subtree in SCLTree, and compare with security extension definition tree GOOSESecurityConfTree, if exist certain subtree of SCLTree identical with GOOSESecurityConfTree, enter step 5, otherwise, report an error, finish.
Coupling in described step (4) specifically refers to traversal IED configuration file tree IEDTree, uses SCL schema file tree SCLTree to carry out validation verification to IEDTree, and detailed process comprises:
Step 4.1: traversal IEDTree tree;
Step 4.2: from IEDTree tree root, by traversal SCLTree tree, judge IEDTree node name, nodal community, node set membership, whether meet the constraint of SCLTree tree;
Step 4.3: if meet, return very, otherwise, return to vacation; Be true if return results, enter step 6, otherwise, report an error, finish.
In described step (5), traversal IED configuration file tree IEDTree, uses security extension definition tree GOOSESecurityConfTree to carry out existence checking to IEDTree, to determine in IED configuration file, safety is configured, and detailed process comprises:
Step 5.1: traversal IEDTree tree;
Step 5.2: from the child node of IEDTree, judge the subtree that whether exists GOOSESecurityConfTree to retrain in IEDTree;
Step 5.3: if exist, return very, be verified, otherwise, return to vacation, checking is not passed through.
For convenience of description, our hypothesis has the application example of following two table configuration files, in Table a and table b,
Table a
Figure BDA0000465996240000071
Table b
Figure BDA0000465996240000072
Configuration file shown in table a can be by the validation verification of the SCL schema file definition based on IEC 61850, but can not be by the validity check of the SCL schema file of the security extension definition based on IEC 62351, because it is not according to security configuration as described in accompanying drawing 3, as GOOSESecurity or SMVSecurity.Table b is the example of the validity check of a SCL schema file that can define by the security extension based on IEC 62351.
The present invention is by utilizing the SCL schema file security extension part of IEC62351 standard-required, application SCL schema file is carried out to matching check, to determine whether application SCL schema file exists the content of security extension part, in determining with application SCL schema file, exist after security extension content, use application SCL schema file to carry out verification of correctness to IED configuration file, on the basis of verification of correctness, security extension part for SCL is carried out existence checking to IED configuration file, has security configuration to determine in IED file.
Embodiments of the present invention are not limited to this; under the above-mentioned basic fundamental thought of the present invention prerequisite; amendment, replacement or the change to other various ways that content of the present invention is made according to the ordinary skill knowledge of this area and customary means, within all dropping on rights protection scope of the present invention.

Claims (7)

1. a security configuration verification method for the IED pattern based on IEC62351 and configuration file, is characterized in that comprising the steps:
(1), according to the definition of the SCL schema file security extension for GOOSE/SMV safety of IEC62351 standard regulation, build security extension definition tree;
(2) construct SCL schema file tree to be verified and IED configuration file tree;
(3) travel through SCL schema file tree to be verified, with security extension definition tree type structure matching, if coupling continues step (4), otherwise, can not be by checking;
(4) traversal IED configuration file tree, uses SCL schema file tree to verify the validity of IED configuration file, if IED configuration file is effective, enters step (5), otherwise, can not be by checking;
(5) traversal IED configuration file tree, uses in security extension definition tree type structural determination IED configuration file whether deposit security configuration item, exists, be verified, otherwise, can not be by checking.
2. the method for claim 1, is characterized in that: in described step (1), structure for the process of the SCL schema file security extension definition tree GOOSESecurityConfTree of GOOSE/SMV safety is:
Step 1.1: input SCL pattern GOOSE/SMV security extension defined file,
Step 1.2: traversal file, the relation of describing according to schema file, builds a multiway tree GOOSESecurityConfTree.
3. method as claimed in claim 2, is characterized in that: in described step (2), the process that builds SCL schema file tree SCLTree to be verified is:
Step 2.1: input SCL schema file to be verified,
Step 2.2: traversal file, the relation of describing according to schema file, builds a multiway tree SCLTree.
4. method as claimed in claim 3, is characterized in that: in described step (2), the process that builds IED configuration file tree IEDTree to be verified is:
Step 2.3: input IED configuration file to be verified,
Step 2.4: traversal file, the relation of describing according to configuration file, builds a multiway tree IEDTree.
5. method as claimed in claim 4, it is characterized in that: the coupling of described step (3) specifically refers to traversal SCL schema file tree SCLTree, search the subtree in SCLTree, and compare with security extension definition tree GOOSESecurityConfTree, if exist certain subtree of SCLTree identical with GOOSESecurityConfTree, enter step (5), otherwise, report an error, finish.
6. method as claimed in claim 5, it is characterized in that: the coupling in described step (4) specifically refers to traversal IED configuration file tree IEDTree, use SCL schema file tree SCLTree to carry out validation verification to IEDTree, detailed process comprises:
Step 4.1: traversal IEDTree tree;
Step 4.2: from IEDTree tree root, by traversal SCLTree tree, judge IEDTree node name, nodal community, node set membership, whether meet the constraint of SCLTree tree;
Step 4.3: if meet, return very, otherwise, return to vacation; Be true if return results, enter step 6, otherwise, report an error, finish.
7. method as claimed in claim 6, it is characterized in that: in described step (5), traversal IED configuration file tree IEDTree, use security extension definition tree GOOSESecurityConfTree to carry out existence checking to IEDTree, to determine in IED configuration file, safety is configured, and detailed process comprises:
Step 5.1: traversal IEDTree tree;
Step 5.2: from the child node of IEDTree, judge the subtree that whether exists GOOSESecurityConfTree to retrain in IEDTree;
Step 5.3: if exist, return very, be verified, otherwise, return to vacation, checking is not passed through.
CN201410051945.6A 2014-02-14 2014-02-14 Based on the IED pattern of IEC62351 and the security configuration verification method of configuration file Expired - Fee Related CN103873462B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410051945.6A CN103873462B (en) 2014-02-14 2014-02-14 Based on the IED pattern of IEC62351 and the security configuration verification method of configuration file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410051945.6A CN103873462B (en) 2014-02-14 2014-02-14 Based on the IED pattern of IEC62351 and the security configuration verification method of configuration file

Publications (2)

Publication Number Publication Date
CN103873462A true CN103873462A (en) 2014-06-18
CN103873462B CN103873462B (en) 2015-09-09

Family

ID=50911589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410051945.6A Expired - Fee Related CN103873462B (en) 2014-02-14 2014-02-14 Based on the IED pattern of IEC62351 and the security configuration verification method of configuration file

Country Status (1)

Country Link
CN (1) CN103873462B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410153A (en) * 2014-11-06 2015-03-11 中国南方电网有限责任公司 IEC62351 intelligent substation process layer intelligent electronic device communication method and communication system
CN104506500A (en) * 2014-12-11 2015-04-08 广东电网有限责任公司电力科学研究院 GOOSE message authentication method based on transformer substation
CN104702466A (en) * 2015-02-12 2015-06-10 中国南方电网有限责任公司 IEC62351 (International Electrotechnical Commission 62351)-based process layer safety test system and method
CN105306489A (en) * 2015-11-20 2016-02-03 国网智能电网研究院 Method for detecting security of electrical equipment
CN105939330A (en) * 2016-02-04 2016-09-14 杭州迪普科技有限公司 Method and device for processing local security policy configuration
CN105956410A (en) * 2016-07-01 2016-09-21 中国南方电网有限责任公司 Rapid universal detection method for IEC61850 full model
CN106656614A (en) * 2016-12-29 2017-05-10 山东鲁能智能技术有限公司 Method and system for generating custom-made forwarding table based on power distribution terminal device XML file
CN108616387A (en) * 2018-03-30 2018-10-02 北京润科通用技术有限公司 A kind of configuration method and device of the virtual terminal based on AFDX buses

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271330A (en) * 2007-03-22 2008-09-24 Abb研究有限公司 Validating a standardized configuration description
CN102262703A (en) * 2011-08-09 2011-11-30 山东电力工程咨询院有限公司 Method for constructing figure and RDF (Radio Direction Finder) model for designing intelligent transformer substation
CN102867274A (en) * 2012-07-27 2013-01-09 江苏省电力公司电力科学研究院 Management and graphical display system for intelligent substation SCL (substation configuration description language) configuration files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271330A (en) * 2007-03-22 2008-09-24 Abb研究有限公司 Validating a standardized configuration description
CN102262703A (en) * 2011-08-09 2011-11-30 山东电力工程咨询院有限公司 Method for constructing figure and RDF (Radio Direction Finder) model for designing intelligent transformer substation
CN102867274A (en) * 2012-07-27 2013-01-09 江苏省电力公司电力科学研究院 Management and graphical display system for intelligent substation SCL (substation configuration description language) configuration files

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410153A (en) * 2014-11-06 2015-03-11 中国南方电网有限责任公司 IEC62351 intelligent substation process layer intelligent electronic device communication method and communication system
CN104506500A (en) * 2014-12-11 2015-04-08 广东电网有限责任公司电力科学研究院 GOOSE message authentication method based on transformer substation
CN104702466B (en) * 2015-02-12 2018-02-23 中国南方电网有限责任公司 A kind of process layer safety test system and method based on IEC62351
CN104702466A (en) * 2015-02-12 2015-06-10 中国南方电网有限责任公司 IEC62351 (International Electrotechnical Commission 62351)-based process layer safety test system and method
CN105306489A (en) * 2015-11-20 2016-02-03 国网智能电网研究院 Method for detecting security of electrical equipment
CN105306489B (en) * 2015-11-20 2020-01-21 国网智能电网研究院 Method for detecting safety of electrical equipment
CN105939330B (en) * 2016-02-04 2019-07-09 杭州迪普科技股份有限公司 Handle the method and device of local security policy configuration
CN105939330A (en) * 2016-02-04 2016-09-14 杭州迪普科技有限公司 Method and device for processing local security policy configuration
CN105956410A (en) * 2016-07-01 2016-09-21 中国南方电网有限责任公司 Rapid universal detection method for IEC61850 full model
CN106656614A (en) * 2016-12-29 2017-05-10 山东鲁能智能技术有限公司 Method and system for generating custom-made forwarding table based on power distribution terminal device XML file
CN106656614B (en) * 2016-12-29 2019-07-26 山东鲁能智能技术有限公司 Customization forwarding table generation method and system based on distribution terminal equipment XML file
CN108616387A (en) * 2018-03-30 2018-10-02 北京润科通用技术有限公司 A kind of configuration method and device of the virtual terminal based on AFDX buses
CN108616387B (en) * 2018-03-30 2021-02-02 北京润科通用技术有限公司 Configuration method and device of virtual terminal based on AFDX (avionics full Duplex switched Ethernet) bus

Also Published As

Publication number Publication date
CN103873462B (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN103873462B (en) Based on the IED pattern of IEC62351 and the security configuration verification method of configuration file
CN102622463B (en) Drawing-model uniformity based method for automatic check of design drawings
CN102760184B (en) Information interaction method for heterogeneous electric power application system
CN104133953B (en) Intelligent substation secondary design system
CN105184189B (en) The online managing and control system of intelligent substation SCD file
Wang et al. Research on the remote maintenance system architecture for the rapid development of smart substation in China
CN102801213B (en) Integrated method and integrated device of SCD (System Configuration Document) of transformer station
CN103873461B (en) Based on the safety interacting method of the GOOSE message of IEC62351
BR102015007965A2 (en) SYSTEM, COMPUTER-RELATED NON-TRANSIENT MEDIA AND METHOD
CN104486075A (en) Intelligent substation ICD model file digital signature verification method
CN104063765A (en) SCD file management method for intelligent substation
CN103294568A (en) Distribution network model incremental storage method based on E language
CN105224511A (en) A kind of method of calibration of intelligent substation SCD file
CN106021203A (en) Intelligent substation misoperation-preventive locking logic imaging expressing method
CN102141950A (en) Method for checking interlock logics of intelligent substation measuring and controlling device
CN114153920A (en) Big data edge platform and method
CN102546296B (en) Automatic detecting method and device for electric power industry information system networking safety evaluation
CN105205039A (en) Customizable SCD (substation configuration description) file verification method
CN104702573B (en) Home network terminal and its automatic right-discriminating method and automatic right-discriminating system
CN107545116A (en) A kind of intelligent substation reorganization and expansion change impact analysis method based on model decoupling
Veichtlbauer et al. Advanced metering and data access infrastructures in smart grid environments
Santodomingo et al. Towards the automatic alignment of CIM and SCL ontologies
CN107577789A (en) Province based on information interactive bus ground artwork interconnected method
Zhang et al. Research on the key technology of smart substation model configuration and check
CN107480883A (en) A kind of transformer station secondary system resource allocation method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150909

Termination date: 20190214