CN104378356A - Demand response (DR) event safety management method and system based on role - Google Patents

Demand response (DR) event safety management method and system based on role Download PDF

Info

Publication number
CN104378356A
CN104378356A CN201410563905.XA CN201410563905A CN104378356A CN 104378356 A CN104378356 A CN 104378356A CN 201410563905 A CN201410563905 A CN 201410563905A CN 104378356 A CN104378356 A CN 104378356A
Authority
CN
China
Prior art keywords
event
role
information
participant
demand response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410563905.XA
Other languages
Chinese (zh)
Other versions
CN104378356B (en
Inventor
李建华
郭龙华
伍军
夏正敏
林超
杨大路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Shanghai Jiaotong University
Original Assignee
SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd, Shanghai Jiaotong University filed Critical SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201410563905.XA priority Critical patent/CN104378356B/en
Publication of CN104378356A publication Critical patent/CN104378356A/en
Application granted granted Critical
Publication of CN104378356B publication Critical patent/CN104378356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Provided is a demand response (DR) event safety management method and system based on a role. The DR event safety management method based on the role comprises the steps that safety analysis is carried out on a power supply side and a power utilization side, and an analysis result serves a basis of an intelligent decision of a DR event; the DR event serves as a logic user, a support vector machine (SVM) is adopted to carry out safety verification on the role of the DR event, and safety management is carried out on the information of the DR event based on the role; the role information of the DR event is used for encrypting the DR event, so that safe transmission of the information in a public network is guaranteed. A participant of the DR event at the power utilization side encrypts the information of the event, the intelligent decision is made for the DR event at the power utilization side while a safety analysis result of the participant of the DR event at the power utilization side serves as one of reference points, and the intelligent decision is executed; an execution result is fed back, and a historical behavior library is updated.

Description

The demand response event method for managing security of based role and system
Technical field
The present invention relates to network security and intelligent grid field, specifically a kind of demand response event method for managing security of based role and system.
Technical background
Intelligent grid relies on the electric energy switching network of messaging platforms and intelligent control platform as one, has informationization, automation, the feature such as interactive, and to realizing energy-saving and emission-reduction, electric power resource distributes rationally and play an important role.Demand response (Demand Response, being called for short DR) technology is one of core technology in intelligent grid, by taking effective incentive measure, power consumer is guided to optimize power mode, improve terminal power consumption efficiency, realize effective control of power system load, create good economic benefit and social benefit.In recent years, along with proposition and the development of automatic demand response concept, the new model of this demand response further enhancing the participation initiative of user, improves level of response.The carrier that DR event is transmitted as information between the Utilities Electric Co. in automatic demand response and power consumer, has very important status in the entire system.
DR event is due to the particularity of its status, once be attacked by lawless person and distort, or be forged issue, will bring grave danger to the normal use of the normal operation of Utilities Electric Co. and power consumer, these threats bring new challenge to national security and public safety.Meanwhile, because in electric power system, involved department, equipment, user etc. are of a great variety, validated user unauthorized operation, misoperation event happen occasionally.So in automatic demand response, how effectively to manage DR event and to carry out safe and reliable transmission to it, be one of problem demanding prompt solution in the automatic demand response safe practice of intelligent grid.
1) through finding existing literature search, Chinese Patent Application No. 201280040033.8, name is called " automation demand response system ".Receive the information from the demand response event of automation demand response server at automation demand response client place, system determines the multiple equipment wanting controlled building automation system during demand response event.System is the scheduling scheme that multiple equipment prepares the controlling behavior during demand response event.Control message is sent to building automation system by system, to perform the controlling behavior to multiple equipment according to the scheduling scheme for the controlling behavior of demand response event.
The scheme that this patent provides is in electricity consumption side according to DR event information, by this building automatic demand response system, carries out scheduling controlling to intrasystem equipment, with the power consumption of facility during automatically and efficiently reducing various DR event.But the program just carries out automated decision-making based on DR event information, if consider the safety problem of DR event information itself, also there is many tender spots, such as DR event such as is forged or distorts at the external factor.These external factor can cause automation demand response system to lose original effect.
2) Chinese Patent Application No. 201110349716.9, name is called " for changing power device and the power management apparatus of demand response control hierarchy ".The current power state information sent in real time is used by power device, controller by current electricity prices rank compared with the DR control hierarchy of expectation, and determine it is the use or the consideration economize on electricity aspect that increase power device, thus adjust the beginning rank of DR control adaptively.
The scheme that this patent provides is in electricity consumption side mount controller, and the DR information of Demand-side sends over by communication unit, determines whether respond this DR event by comparing DR control hierarchy.Such as, but the program can only carry out decision-making to the DR event of electricity consumption side, if consider the safety problem of supply side and communication unit, also there is tender spots, communication unit is by illegal attack etc.These factors can affect the normal operation of electricity consumption side demand response.
Summary of the invention
The application's object is, a kind of demand response event method for managing security and system of based role are provided, in order to solve the safety problem of existing demand response technology, utilize the method for machine learning, based role carries out effective safety management to DR event, and devises the safe transmission that a set of effective Information Transmission Model ensures DR event information.
Technical scheme concrete grammar of the present invention is as follows:
First the present invention carries out safety analysis to supply side and electricity consumption side, using analyze result as DR event intelligent decision according to one of; Using DR event as logical subscriber, adopt the method for SVMs (SVM), by authority is awarded to role, role is authorized to user, user does not directly associate with authority, achieve the logical separation of user and access rights, therefore it greatly facilitates rights management, prevents falseness and malice DR event from causing safety hazard to electric power system.In message transmitting procedure, for the demand response of electric power system, by being encrypted information with role, make information can transmitting.
The present invention specifically comprises the following steps:
The first step: when Utilities Electric Co. wants an initiation demand response event, safety analysis is carried out to supply side and electricity consumption side DR event participant, draws safety analysis result;
Described safety analysis result draws based on to the historical behavior analysis of DR event promoter and participant, and the time interval that weight and the behavior of historical behavior, moment relative current time occurred is inversely proportional to;
Second step: using safety analysis result as with reference to one of foundation, DR event intelligent decision is carried out to supply side, obtains DR event information;
Described supply side DR event intelligent decision is according to the situation such as running status, electrical network emergency, electricity price information, supply side security information being DR participant's state information, Back ground Information and electrical network, content selectes the user involved by DR, determine both sides' interaction mechanism, setting DR target.
3rd step: using DR event as logical subscriber, adopt the method for SVMs (SVM) to carry out safety verification to the role of DR event, based role carries out safety management to DR event information, and concrete steps comprise: concrete steps comprise:
3.1) according to information type and the event attribute of DR event, create role's set, be designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) according to the various operations that DR event performs data resource, creation operation set, is designated as O;
3.4) assign operation for controlling, specify responsibility be separated and avoid conflict, set up a series of constraints;
3.5) the role-security relations of distribution and DR event role assignments relation is set up;
3.6) the method establishment role of SVMs (SVM) and can the mapping of executive role is adopted;
Described SVM method refers to: using other validated user data as normal data, extract its characteristic vector, by choosing suitable parameter and kernel function is trained it, obtain master pattern, this secondary data is obtained it by master pattern computing can executive role.
Described characteristic vector refers to following two aspects: event information type, comprises Spot Price, load summate or transfer amount etc., event attribute, comprises title, time, participant, execution priority etc.
4th step: carry out initialization operation to safe information transmission unit during first time transmission, uses the role key of DR event to be encrypted it, all upgrades role key, guarantee that information carries out safe transmission in public network before each transmission.Described initialization procedure concrete steps comprise:
4.1) system manager generates a private key a_mk and PKI a_pk, and PKI a_pk is stored in cipher key store;
4.2) system manager generates the ID of all DR event participants, is designated as ID_U, forms participant ID set, generates role ID, be designated as ID_R, formation role ID set;
4.3) generate the initial key role_k of each role with private key a_mk and ID_R, be stored in cipher key store;
4.4) each DR event participant generates respective private key u_mk and PKI u_pk, and all PKI u_pk are stored in cipher key store, and private key exists in the local system of each DR event participant;
Described DR event information cryptographic algorithm refers to that the SM1 block cipher that national Password Management department examines, block length and key length are all 128 bits, algorithm security encryption strength and relevant software and hardware realizes performance and AES is suitable.
Described role key cryptographic algorithm refers to the SM2 block cipher that national Password Management department examines, and is the asymmetric arithmetic based on ECC algorithm.
The update method of described role key refers to and adopts hash algorithm to carry out computing to original key, the SM3 cryptographic Hash algorithm that hash algorithm adopts national Password Management department to examine, and Hash Value length is 256 bits, ensures one-time pad.
5th step: information is sent to electricity consumption side DR event participant, participant is decrypted event information;
Described transmission information comprises the DR event information after with role key encryption and the role key with DR event participant public key encryption.
6th step: using electricity consumption side DR event participant safety analysis result as with reference to one of foundation, DR event intelligent decision is carried out to electricity consumption side, and performs;
Described electricity consumption side DR event intelligent decision is according to being the situation such as DR participant's state information, Back ground Information and DR event information, electricity consumption side security information, and content determines the participation terminal of electricity consumption side from dynamic response.
7th step: the result that feedback is performed, and upgrade historical behavior storehouse.
Accompanying drawing explanation
Fig. 1 is demand response of the present invention (DR) safety management system configuration diagram.
Fig. 2 is supply side system construction drawing of the present invention.
Fig. 3 is demand response of the present invention (DR) safety management system overall flow figure.
Fig. 4 is DR event safety management figure of the present invention.
Fig. 5 is safe information transmission initialization flowchart of the present invention.
embodiment
Here elaborates to embodiments of the invention, and the embodiment of the present invention is implemented lower premised on technical solution of the present invention, give detailed execution mode and concrete operating process, but protection scope of the present invention is not limited to the following examples.
With reference to the accompanying drawings, the specific embodiment of the present invention is described in further detail.
Fig. 1 is demand response of the present invention (DR) safety management system configuration diagram.
With reference to figure 1, when Utilities Electric Co. needs to initiate DR event, Utilities Electric Co. enters DR event safety management system by user interface, the DR event information generated after encryption sends electricity consumption side information receiving end by supply side Information issued end to by public network, each DR event participant makes response by DR event management system, and performed by Electric control terminal, electric power terminal comprises all power consumption equipments, such as, television set, computer, printer, water dispenser etc.DR event implementation person refers to each functional department participating in the electric company initiating DR event, and DR event participant refers to each power consumer participating in DR pattern.The difference of supply side DR event safety management system and electricity consumption side DR event management system is, the former has DR event security managing unit, is responsible for carrying out safety management to the initiation of DR event, prevents false node and malicious node from issuing false DR event information.
Fig. 2 is the supply side system construction drawing of the present invention according to embodiment.
Be made up of following five unit with reference to Fig. 2, supply side DR event safety management system: user interface section, safety analysis unit, event intelligent decision unit, DR event security managing unit and safe information transmission unit are formed.
Electricity consumption side DR event safety management system is made up of following four unit: user interface section, safety analysis unit, event intelligent decision unit, safe information transmission unit are formed.
User interface section is made up of supply side Subscriber Interface Module SIM and electricity consumption side Subscriber Interface Module SIM, and be responsible for system and DR event implementation person and DR event participant and carry out information interaction, making automatic demand response system can play it should be powerful.
Safety analysis unit is made up of historical behavior database module and behavioral data analysis module.In the present invention, based on the historical behavior of main body, safety analysis is carried out to supply side DR event publisher and electricity consumption side DR event participant.The order that the historical behavior of real user occurs according to operation be numbered, numbering is designated as i, and behavior is divided into proper operation and misoperation, is denoted as R respectively iand F i, R during proper operation i=1, F i=0, R during faulty operation i=0, F i=-1, the numbering interval of historical behavior and current generation behavior is designated as N i, weights W i=1/N i, then the coefficient of safety of current time user meanwhile, in the historical behavior of main body, extract the characteristic informations such as access time, access object, access interval, access times, the feature of these characteristic informations and main body current behavior is carried out matching primitives, draws matching degree.Coefficient of safety and matching degree are as two that carry out safety analysis important reference indexs.Wherein, coefficient of safety characterizing consumer is to data processing safety height, and matching degree characterizing consumer is to feature operation fail safe height.
DR event decision unit is by DR event intelligent decision module and solution bank module composition.Supply side DR event intelligent decision module carries out intelligent decision according to the situation such as running status, electrical network emergency, electricity price information, supply side security information of DR participant's state information, Back ground Information and electrical network to DR event, user involved by DR is selected, determine both sides' interaction mechanism, setting DR target.Electricity consumption side DR event intelligent decision module carries out intelligent decision according to situations such as DR participant's state information, Back ground Information and DR event information, electricity consumption side security information to DR event, determines the participation terminal of electricity consumption side from dynamic response.
Each Utilities Electric Co. DR event entity comprises a series of relevant event information example; Utilities Electric Co.'s project (Utility Program) entity description is about all information of DR project, how managing from the angle of Utilities Electric Co. and participant by a series of attribute description project and to perform, attribute comprises title, time, participant, execution priority etc.; Event information type (Event lnfo Type) entity is a part for Utilities Electric Co.'s project entity, is used for describing information type, such as Spot Price, load summate or transfer amount etc. in detail, and attribute comprises title, bound, transformation period table etc.; Participant's account (Participant Account) entity then describes all information relevant with participant, and attribute comprises participant's title, credentials, affiliated colony, participation project etc.
DR event security managing unit is made up of access control module, machine learning module, event correcting module and role's library module.Access control based roles is carried out to DR event, from event information type and event attribute two dimensions, Role and privilege division is carried out to DR event, determine its function privilege according to DR event information type entities, determine its data permission according to DR event attribute.
Safe information transmission unit is made up of DR event information encrypting module, cipher key store module, role key encrypting module, carries out security hardening to DR event information in the information transmission of supply side and electricity consumption side.Cipher key store is responsible for encryption key distribution and renewal, and role key marked price module is encrypted role key, and DR event information encrypting module is encrypted DR event information.
Fig. 3 is demand response of the present invention (DR) safety management system overall flow figure.
With reference to Fig. 3, when Utilities Electric Co. needs to issue DR event information according to situations of carrying out such as operation of power networks state, electrical network emergency, electricity price information, deceptive information is issued for preventing false node and malicious node, first current to Utilities Electric Co. information security situation carries out analysis 101, then differentiate and whether meet essential safety requirements 102, if do not met, generate alarm and require that it revises 103.The DR event intelligent decision unit of supply side will carry out intelligent decision 104 according to safety analysis result and current electric grid state.The DR event information generated, carries out the DR event safety management 105 of based role to it.Manage rear use Role Information and operation has been encrypted to DR event, and send it to DR event participant.
After DR event participant receives DR event encryption information, advanced part decrypts information of acting operates.For preventing the false node in electricity consumption side and malicious node, first current to DR event participant information security situation is analyzed, and then differentiates and whether meets essential safety requirements, if do not met, generates alarm and requires that it is revised.The DR event intelligent decision unit of electricity consumption side will carry out intelligent decision according to safety analysis result and DR event information and self-demand, and perform this decision-making.By the result that feedback performs, and upgrade historical behavior storehouse.
Fig. 4 is DR event safety management figure of the present invention.
With reference to Fig. 4, DR event as logical subscriber.The collective of character representation one group access authority.DR event divides role according to its information type and event attribute.Authority refers to that DR event performs the mandate of certain operation in shielded system and data resource.Operation refers to the various operations that DR event performs data resource in demand response, as reading and writing, increase, amendment, deletion etc.A session is that a DR event is to the mapping of multiple role.When DR event have activated the part or all of role that he is awarded, he just establishes session.Session is a dynamic concept.Constraint is a series of constraintss on whole model, is used for controlling to assign operation, specify responsibility be separated and avoid conflict.The role-security relations of distribution are based upon the many-to-many relationship between role's set and set of access rights, is each role assignments many group access authority of system creation.DR event role assignments relation be based upon DR event sets and role gather between a kind of many-to-one relationship, for system each DR event distributes a role corresponding with its job duty, namely a DR event can only have a role, but a role can distribute to multiple DR event.
The present invention adopts the method for SVMs (SVM) to carry out safety verification to the role of DR event.By choosing suitable parameter and kernel function, extraction event information type and event attribute characteristic value are as index, comprise following two aspects: event information type comprises Spot Price, load summate or transfer amount etc., event attribute comprises title, time, participant, execution priority etc.Use SVMs (SVM) to train as normal data other validated user data under this role, obtain master pattern.Give no weight to different information, system accuracy is got a promotion.Give corresponding role for the user by safety verification, secondary identity authentication need be carried out for the user not by safety verification and just can obtain role authorization.After valid operation carries out each time, by this Data Update in master pattern database, the error rate of safety verification is constantly reduced.
Event information safe transmission unit supply side comprises DR event information encrypting module, role key encrypting module and cipher key store, and electricity consumption side comprises DR event information deciphering module and role key deciphering module.In information encryption process of the present invention, the SM1 block cipher that DR event information cryptographic algorithm adopts national Password Management department to examine, system manager has highest weight limit, be in charge of the key of all users and role, Role Management person is responsible for the role distributing user, and demand response automatic serving device has system manager's authority.
Fig. 5 is the safe information transmission initialization flowchart of the present invention according to embodiment.
At initialization procedure, its concrete steps are as follows:
Step 200, system manager generate a private key a_mk and PKI a_pk, and PKI a_pk is stored in cipher key store;
Step 201, system manager generate the ID of all DR event participants, are designated as ID_U, form participant ID set, generate role ID, be designated as ID_R, formation role ID set;
Step 202, generate the initial key role_k of each role with private key a_mk and ID_R, be stored in cipher key store;
Step 203, each DR event participant generate respective private key u_mk and PKI u_pk, and all PKI u_pk are stored in cipher key store, and private key exists in the local system of each DR event participant;
Its message transmitting procedure is as described below:
Step 300, system generate DR event information waiting for transmission;
Step 301, system use hash chain method to upgrade the secret key role_k of role, generate the secret key of role of this time;
Embodiment of the present invention initialization procedure, the initial key role_k of each role is generated with private key a_mk and ID_R, be stored in cipher key store, later when each information transmission, hash chain method is adopted to upgrade role key used, the role key of last time is passed to hash function again and obtains its cryptographic Hash, as this role key, use the role key after upgrading to be encrypted DR event information.The SM3 cryptographic Hash algorithm that hash algorithm adopts national Password Management department to examine, Hash Value length is 256 bits, ensures one-time pad, guarantees safe information transmission.
Step 302, with the PKI u_pk of DR event participant, the secret key of role to be encrypted, to generate Role Information ciphertext;
In the embodiment of the present invention, the SM2 block cipher that cryptographic algorithm uses national Password Management department to examine is the asymmetric arithmetic based on ECC algorithm.
Role's secret key pair DR event information that step 303 expression generates carries out symmetric cryptography, generates event information ciphertext;
In the embodiment of the present invention, the SM1 block cipher that cryptographic algorithm uses national Password Management department to examine, block length and key length are all 128 bits, algorithm security encryption strength and relevant software and hardware realizes performance and AES is suitable.
Step 304, Role Information ciphertext and event information ciphertext are sent to target DR event participant;
In the embodiment of the present invention, cipher-text information can by the information receiving end of public network transmissions to target DR event participant, to reduce communications cost.
Step 305, targeted customer decipher Role Information ciphertext with private key for user u_mk, obtain the secret key of role;
Step 306, use role secret key deciphering DR event information, information transmission terminates.

Claims (13)

1. a demand response event method for managing security for based role, it is characterized in that, the method comprises the following steps:
The first step: safety analysis is carried out to supply side DR event participant and electricity consumption side DR event participant, draws safety analysis result;
Second step: using safety analysis result as with reference to foundation, DR event intelligent decision is carried out to supply side, obtains DR event information;
3rd step: using DR event as logical subscriber, adopt the method for SVMs to carry out safety verification to the role of DR event, based role carries out safety management to DR event information;
4th step: carry out initialization operation to safe information transmission unit during first time transmission, all upgrades role key before each transmission, and the role key of DR event is to the encryption of DR event information, and the PKI of DR event participant is to role's secret key encryption;
5th step: information is sent to electricity consumption side DR event participant, participant is decrypted event information;
6th step: using electricity consumption side DR event participant safety analysis result as with reference to foundation, DR event intelligent decision is carried out to electricity consumption side, and performs;
7th step: the result that feedback is performed, and upgrade historical behavior storehouse.
2. the demand response event method for managing security of based role according to claim 1, it is characterized in that, supply side is relevant with the historical behavior of DR event promoter and participant with the safety analysis of electricity consumption side, and the time interval that weight and the behavior of historical behavior, moment relative current time occurred is inversely proportional to.
3. demand response event method for managing security according to claim 1, it is characterized in that, described second step, supply side DR event intelligent decision module carries out intelligent decision according to the running status of DR participant's state information, Back ground Information and electrical network, electrical network emergency, electricity price information, supply side security information situation to DR event, user involved by DR is selected, determine both sides' interaction mechanism, setting DR target.
4. demand response event method for managing security according to claim 1, it is characterized in that, described 6th step, electricity consumption side DR event intelligent decision module carries out intelligent decision according to DR participant's state information, Back ground Information and DR event information, electricity consumption side security information situation to DR event, determines the participation terminal of electricity consumption side from dynamic response.
5. demand response event method for managing security according to claim 1, is characterized in that, described 3rd step concrete steps comprise:
3.1) according to information type and the event attribute of DR event, create role's set, be designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) according to the various operations that DR event performs data resource, creation operation set, is designated as O;
3.4) assign operation for controlling, specify responsibility be separated and avoid conflict, set up a series of constraints;
3.5) the role-security relations of distribution and DR event role assignments relation is set up;
3.6) the method establishment role of SVMs and can the mapping of executive role is adopted;
6. demand response event method for managing security according to claim 5, it is characterized in that, the method of described SVMs refers to: using other validated user data as normal data, extract its characteristic vector, by choosing suitable parameter and kernel function is trained it, obtain master pattern, this secondary data is obtained it by master pattern computing can executive role.
7. demand response event method for managing security according to claim 6, it is characterized in that, extract characteristic vector and refer to following two aspects: event information type, comprises Spot Price, load summate or transfer amount, event attribute, comprises title, time, participant, execution priority.
8. demand response event method for managing security according to claim 1, is characterized in that, described 4th step, and initialization procedure concrete steps comprise:
4.1) system manager generates a private key a_mk and PKI a_pk, and PKI a_pk is stored in cipher key store;
4.2) system manager generates the ID of all DR event participants, is designated as ID_U, forms participant ID set, generates role ID, be designated as ID_R, formation role ID set;
4.3) generate the initial key role_k of each role with private key a_mk and ID_R, be stored in cipher key store;
4.4) each DR event participant generates respective private key u_mk and PKI u_pk, and all PKI u_pk are stored in cipher key store, and private key exists in the local system of each DR event participant;
9. demand demand response event method for managing security according to claim 1, it is characterized in that, described 4th step, the SM1 block cipher that DR event information cryptographic algorithm adopts national Password Management department to examine, block length and key length are all 128 bits, algorithm security encryption strength and relevant software and hardware realizes performance and AES is suitable.
10. demand response event method for managing security according to claim 1, is characterized in that, described 4th step, and the SM2 block cipher that role key cryptographic algorithm adopts national Password Management department to examine is the asymmetric arithmetic based on ECC algorithm.
11. demand response event method for managing security according to claim 1, is characterized in that, described 4th step, hash chain method is adopted to upgrade role key, the SM3 cryptographic Hash algorithm that hash algorithm adopts national Password Management department to examine, Hash Value length is 256 bits, ensures one-time pad.
12. demand response event method for managing security according to claim 1, it is characterized in that, described 5th step, transmission information comprises the DR event information after with role key encryption and with the role key after DR event participant public key encryption.
The demand response event safety management system of 13. 1 kinds of based role, it is characterized in that, comprise the supply side DR event safety management system be made up of user interface section, safety analysis unit, event intelligent decision unit, DR event security managing unit and safe information transmission unit, and form electricity consumption side DR event safety management system by user interface section, safety analysis unit, event intelligent decision unit and safe information transmission unit;
Described user interface section is responsible for system and DR event implementation person and DR event participant and is carried out information interaction;
Described safety analysis unit carries out safety analysis to supply side DR event publisher and electricity consumption side DR event participant;
Described DR event decision unit carries out intelligent decision to DR event;
Described DR event security managing unit carries out access control based roles to DR event;
Described safe information transmission unit carries out security hardening to supply side DR event publisher with communicating of electricity consumption side DR event participant.
CN201410563905.XA 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role Active CN104378356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410563905.XA CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410563905.XA CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Publications (2)

Publication Number Publication Date
CN104378356A true CN104378356A (en) 2015-02-25
CN104378356B CN104378356B (en) 2017-09-29

Family

ID=52557013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410563905.XA Active CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Country Status (1)

Country Link
CN (1) CN104378356B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592090A (en) * 2015-12-28 2016-05-18 上海交通大学 Event-based demand response dynamic security service method
CN105631309A (en) * 2015-12-29 2016-06-01 深圳市科漫达智能管理科技有限公司 Event authentication method and system
CN106888199A (en) * 2015-12-16 2017-06-23 国家电网公司 The demand response safety access method that role drives in intelligent grid
CN109272286A (en) * 2018-08-30 2019-01-25 中国传媒大学 It is a kind of towards SaaS multi-tenant using drama as the cloud film and television project management method and system of core

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269070A (en) * 2013-06-05 2013-08-28 广州中国科学院沈阳自动化研究所分所 Automatic demand response system and automatic demand response method
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269070A (en) * 2013-06-05 2013-08-28 广州中国科学院沈阳自动化研究所分所 Automatic demand response system and automatic demand response method
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
尚学伟 等: "基于角色的电力SCADA系统多区域权限访问控制模型设计", 《电网技术》 *
庞春江,庞会静: "RBAC模型的改进及其在电力ERP权限管理中的应用", 《电力系统自动化》 *
盛万兴 等: "智能用电中自动需求响应的特征及研究架构", 《电力系统自动化》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888199A (en) * 2015-12-16 2017-06-23 国家电网公司 The demand response safety access method that role drives in intelligent grid
CN106888199B (en) * 2015-12-16 2021-03-02 国家电网公司 Role-driven demand response secure access method in smart grid
CN105592090A (en) * 2015-12-28 2016-05-18 上海交通大学 Event-based demand response dynamic security service method
CN105631309A (en) * 2015-12-29 2016-06-01 深圳市科漫达智能管理科技有限公司 Event authentication method and system
CN109272286A (en) * 2018-08-30 2019-01-25 中国传媒大学 It is a kind of towards SaaS multi-tenant using drama as the cloud film and television project management method and system of core

Also Published As

Publication number Publication date
CN104378356B (en) 2017-09-29

Similar Documents

Publication Publication Date Title
CN109474423A (en) Data encryption/decryption method, server and storage medium
CN105656859B (en) Tax control equipment software safety online upgrading method and system
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN103259663A (en) User unified authentication method in cloud computing environment
WO2014149490A4 (en) Secure end-to-end permitting system for device operations
CN113360925A (en) Method and system for storing and accessing trusted data in electric power information physical system
CN105847000A (en) Token generation method and communication system based on same
CN104378356A (en) Demand response (DR) event safety management method and system based on role
CN103220141A (en) Sensitive data protecting method and system based on group key strategy
Zhang et al. Blockchain-based secure equipment diagnosis mechanism of smart grid
CN105471901A (en) Industrial information security authentication system
CN109670828A (en) A kind of application on-line signature method and system
CN105100248A (en) Cloud storage security realization method based on data encryption and access control
CN112818332A (en) Password management service platform for intelligent manufacturing
CN104125230A (en) Short message authentication service system and authentication method
CN104660583A (en) Encryption service method based on Web encryption service
CN113901432A (en) Block chain identity authentication method, equipment, storage medium and computer program product
CN113872992B (en) Method for realizing remote Web access strong security authentication in BMC system
CN106487505B (en) Key management, acquisition methods and relevant apparatus and system
CN110519222A (en) Outer net access identity authentication method and system based on disposable asymmetric key pair and key card
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN109903046A (en) User data management and device based on block chain
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
CN113542242A (en) Device management method and device management apparatus
CN102868521B (en) Method for enhancing secret key transmission of symmetrical secret key system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant