CN104378356B - The demand response event method for managing security and system of based role - Google Patents
The demand response event method for managing security and system of based role Download PDFInfo
- Publication number
- CN104378356B CN104378356B CN201410563905.XA CN201410563905A CN104378356B CN 104378356 B CN104378356 B CN 104378356B CN 201410563905 A CN201410563905 A CN 201410563905A CN 104378356 B CN104378356 B CN 104378356B
- Authority
- CN
- China
- Prior art keywords
- event
- role
- events
- key
- demand response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A kind of demand response of based role (Demand Response, abbreviation DR) event method for managing security and system, including:Safety analysis is carried out to supply side and electricity consumption side, the result of analysis is regard as one of foundation of intelligent decision of demand response event;Using DR events as logical subscriber, safety verification is carried out to the role of DR events using the method for SVMs (Support Vector Machine, abbreviation SVM), based role carries out safety management to DR event informations;It is encrypted using the Role Information of DR events, it is ensured that information carries out safe transmission in the public network.Event information is decrypted electricity consumption side DR event participants;Using electricity consumption side DR events participant's safety analysis result as one of reference frame, DR event intelligent decisions are carried out to electricity consumption side, and perform;The result performed will be fed back, and update historical behavior storehouse.
Description
Technical field
The present invention relates to network security and intelligent grid field, the demand response event safety of specifically a kind of based role
Management method and system.
Technical background
Intelligent grid is as a dependence messaging platforms and the electric energy exchange network of intelligent control platform, with information
Change, automation, it is interactive the features such as, played an important role to realizing that energy-saving and emission-reduction, electric power resource are distributed rationally.Demand response
(Demand Response, abbreviation DR) technology is one of core technology in intelligent grid, by taking effective excitation to arrange
Apply, guiding power consumer optimization power mode improves terminal power consumption efficiency, realizes effective control of power system load, produces
Good economic benefit and social benefit.In recent years, with the proposition and development of automatic demand response concept, this demand is rung
The new model answered further enhancing the participation initiative of user, improve level of response.DR events are used as automatic demand response
In Utilities Electric Co. and power consumer between information transmission carrier, have very important status in the entire system.
DR events are due to the particularity of its status, once being attacked and being distorted by criminal, or are forged issue, it will
Normal operation and power consumer to Utilities Electric Co. it is normal using bringing grave danger, these are threatened to national security and public
Safety belt carrys out new challenge.Simultaneously as the species such as involved department, equipment, user is various in power system, validated user is got over
Power operation, maloperation event happen occasionally.So, in automatic demand response, how effectively to manage DR events and it is carried out
Safe and reliable transmission, is one of urgent problem to be solved in the automatic demand response safe practice of intelligent grid.
1) found through being retrieved to existing literature, Chinese Patent Application No. 201280040033.8, entitled " automation demand
Response system ".The demand response event from automation demand response server is received at automation demand response client
Information, system determines to want the multiple equipment of controlled building automation system during demand response event.System is many
Individual equipment prepares the scheduling scheme of the controlling behavior during demand response event.It is automatic that control message is sent to building by system
Change system, the controlling behavior to multiple equipment is performed with the scheduling scheme according to the controlling behavior for demand response event.
The scheme that the patent is provided is, according to DR event informations, to pass through the building automatic demand response system in electricity consumption lateral root
System, is scheduled control, with the power consumption of facility during automatically and efficiently reducing various DR events to the equipment in system.
But the program is based only on DR event informations and carries out automated decision-making, if it is considered that the safety of DR event informations in itself is asked
Topic, also in the presence of many tender spots, the external factor such as DR events are forged or distorted.These external factor can cause automatically
Change demand response system and lose original effect.
2) Chinese Patent Application No. 201110349716.9, it is entitled " to be used for the electricity consumption for changing demand response control hierarchy
Device and power management apparatus ".By power device using the current power state information sent in real time, controller will current electricity
Valency rank compared with desired DR control hierarchies, and determine be increase power device using or consider economize on electricity for the use of, from
And it is adaptively adjusted the beginning rank of DR controls.
The scheme that the patent is provided is to install controller in electricity consumption side, and the DR information of Demand-side is transmitted across by communication unit
Come, decide whether to respond this DR event by comparing DR control hierarchies.But the program can only be to the DR of electricity consumption side
Event carries out decision-making, if it is considered that the safety problem of supply side and communication unit, also has tender spots, such as communication unit quilt
Illegal attack etc..These factors can influence the normal operation of electricity consumption side demand response.
The content of the invention
The application purpose is demand response event method for managing security and system there is provided a kind of based role, is used to
The safety problem of existing demand response technology is solved, using the method for machine learning, based role carries out effective to DR events
Safety management, and devise the safe transmission that a set of effective Information Transmission Model ensures DR event informations.
Technical scheme specific method is as follows:
The present invention carries out safety analysis to supply side and electricity consumption side first, and the intelligence of the result of analysis as DR events is determined
One of foundation of plan;Using DR events as logical subscriber, using SVMs (SVM) method, by the way that authority is awarded
To role, role is granted to user, and user does not associate directly with authority, realizes the logical separation of user and access rights,
Therefore it greatly facilitates rights management, prevents false and malice DR events from causing safety hazard to power system.In information
In transmitting procedure, for the demand response of power system, information is encrypted by using role, information is reliably passed
It is defeated.
The present invention specifically includes following steps:
The first step:When Utilities Electric Co. wants to initiate a demand response event, supply side and electricity consumption side DR events are joined
Safety analysis is carried out with person, safety analysis result is drawn;
Described safety analysis result is drawn based on the historical behavior analysis to DR events promoter and participant, is gone through
The time interval that with the behavior occurs for the weight of history behavior the relatively current moment at moment is inversely proportional;
Second step:Using safety analysis result as one of reference frame, DR event intelligent decisions are carried out to supply side, obtained
DR event informations;
The supply side DR events intelligent decision is according to the operation shape for being DR participant's status information, Back ground Information and power network
Situations such as state, power network emergency, electricity price information, supply side security information, content is that the user involved by DR is selected,
Both sides' interaction mechanism is determined, DR targets are set.
3rd step:Using DR events as logical subscriber, the method using SVMs (SVM) is entered to the role of DR events
Row safety verification, based role carries out safety management to DR event informations, and specific steps include:Specific steps include:
3.1) information type and event attribute according to DR events, creates role's set, is designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) the various operations performed according to DR events to data resource, create operational set, are designated as O;
3.4) operation is assigned, responsibility separation is specified and avoids conflict for control, set up a series of constraintss;
3.5) the role-security relations of distribution and DR event role's relations of distribution are set up;
3.6) mapping of role and executable role are set up using the method for SVMs (SVM);
Described SVM methods refer to:Using other validated user data as normal data, its characteristic vector is extracted, is passed through
The appropriate parameter of selection and kernel function are trained to it, obtain master pattern, this data is obtained by master pattern computing
To its executable role.
The characteristic vector refers to following two aspects content:Event information type, including Spot Price, load are cut down or turned
Shifting amount etc., event attribute, including title, time, participant, execution priority etc..
4th step:Initialization operation is carried out to safe information transmission unit when transmitting for the first time, the role of DR events is used
It is encrypted key, updates role key before transmission every time, it is ensured that information carries out safe transmission in public network.Institute
Stating initialization procedure specific steps includes:
4.1) system manager's generation one private key a_mk and public key a_pk, public key a_pk are stored in cipher key store;
4.2) system manager generates the ID of all DR events participants, is designated as ID_U, forms participant ID set, generation
Role ID, is designated as ID_R, forms role ID set;
4.3) the initial key role_k of each role is generated with private key a_mk and ID_R, is stored in cipher key store;
4.4) each DR events participant generates respective private key u_mk and public key u_pk, and all public key u_pk are stored in
In cipher key store, private key is present in the local system of each DR events participant;
The DR event informations AES refers to the SM1 block ciphers of national Password Management department examination & approval, packet
Length and key length are all 128 bits, and algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
The role key AES refers to the SM2 block ciphers of national Password Management department examination & approval, is to be based on
The asymmetric arithmetic of ECC algorithm.
The update method of the role key refers to carry out original key computing, hash algorithm use using hash algorithm
The SM3 cryptographic Hash algorithms of national Password Management department examination & approval, Hash Value length is 256 bits, it is ensured that one-time pad.
5th step:Electricity consumption side DR event participants are sent information to, event information is decrypted participant;
The transport packet includes the DR event informations after being encrypted with role key and with DR event participant's public key encryptions
Role key.
6th step:Using electricity consumption side DR events participant's safety analysis result as one of reference frame, electricity consumption side is carried out
DR event intelligent decisions, and perform;
The electricity consumption side DR events intelligent decision according to be DR participant's status information, Back ground Information and DR event informations,
Situations such as electricity consumption side security information, content is to determine the participation terminal that electricity consumption side is automated toed respond to.
7th step:The result performed will be fed back, and update historical behavior storehouse.
Brief description of the drawings
Fig. 1 is demand response (DR) safety management system configuration diagram of the present invention.
Fig. 2 is the supply side system construction drawing of the present invention.
Fig. 3 is demand response (DR) safety management system overall flow figure of the present invention.
Fig. 4 is DR events safety management figure of the present invention.
Fig. 5 is safe information transmission initialization flowchart of the present invention.
Embodiment
Here is that embodiments of the invention are elaborated, and the embodiment of the present invention is premised on technical solution of the present invention
It is lower to implement, detailed embodiment and specific operating process are given, but protection scope of the present invention is not limited to following reality
Apply example.
With reference to the accompanying drawings, the embodiment to the present invention is described in further detail.
Fig. 1 is demand response (DR) safety management system configuration diagram of the present invention.
With reference to Fig. 1, when Utilities Electric Co. needs to initiate DR events, Utilities Electric Co. enters DR events safety by user interface
Management system, the DR event informations after generation encryption send electricity consumption side information to by supply side information publishing side by public network
Receiving terminal, each DR events participant is responded by DR event management systems, is performed by Electric control terminal, electricity
Power terminal includes all electrical equipments, for example, television set, computer, printer, water dispenser etc..DR event implementation persons refer to participate in
Each functional department of the electric company of DR events is initiated, DR event participants refer to each power consumer for participating in DR patterns.Power supply
The difference of side DR events safety management system and electricity consumption side DR event management systems is that the former has DR event safety managements
Unit, is responsible for the initiation to DR events and carries out safety management, prevent dummy node and malicious node from issuing falseness DR event informations.
Fig. 2 is the supply side system construction drawing of the present invention according to embodiment.
Reference picture 2, supply side DR events safety management system is made up of following five units:User interface section, safety
Analytic unit, event intelligent decision unit, DR events security managing unit and safe information transmission unit are constituted.
Electricity consumption side DR events safety management system is made up of following four unit:User interface section, safety analysis unit,
Event intelligent decision unit, safe information transmission unit are constituted.
User interface section is made up of supply side Subscriber Interface Module SIM and electricity consumption side Subscriber Interface Module SIM, is responsible for system and DR
Event implementation person and DR events participant carry out information exchange, and automatic demand response system is played it should be powerful.
Safety analysis unit is made up of historical behavior database module and behavioral data analysis module.In the present invention, it is based on
The historical behavior of main body, safety analysis is carried out to supply side DR event publishers and electricity consumption side DR events participant.To truly it use
The order that the historical behavior at family occurs according to operation is numbered, and numbering is designated as i, and behavior is divided into correct operation and maloperation, point
R is not denoted as itiAnd Fi, R during correct operationi=1, Fi=0, R during faulty operationi=0, Fi=-1, historical behavior is with currently going
For numbering interval be designated as Ni, weights Wi=1/Ni, then the safety coefficient of current time userIt is same with this
When, access time is extracted in the historical behavior of main body, object is accessed, the characteristic informations such as interval, access times is accessed, by this
A little characteristic informations and the feature of main body current behavior carry out matching primitives, draw matching degree.Safety coefficient and matching degree are as entering
Two important reference indexs of row safety analysis.Wherein, safety coefficient characterizes user to data processing safety height, matching
Degree characterizes user to feature operation security height.
DR event decisions unit is by DR event intelligent decision modules and solution bank module composition.Supply side DR events are intelligently determined
Plan module is according to the running status of DR participant's status information, Back ground Information and power network, power network emergency, electricity price information, confession
Situations such as electric side security information, carries out intelligent decision to DR events, and the user involved by DR is selected, and determines that both sides interact
Mechanism, sets DR targets.Electricity consumption side DR event intelligent decision modules are according to DR participant's status information, Back ground Information and DR events
Situations such as information, electricity consumption side security information, carries out intelligent decision to DR events, determines the participation terminal that electricity consumption side is automated toed respond to.
Each Utilities Electric Co. DR events entity includes a series of related event information examples;Utilities Electric Co.'s project
All information of (Utility Program) entity description on DR projects, be from the angle of Utilities Electric Co. and participant with one
The attribute description project of row is how to manage and perform, and attribute includes title, time, participant, execution priority etc.;Event
Information type (Event lnfo Type) entity is a part for Utilities Electric Co.'s project entity, for information type is described in detail,
Such as Spot Price, load reduction or transfer amount, attribute includes title, bound, transformation period table etc.;Participant's account
(Participant Account) entity then describes all information relevant with participant, and attribute includes participant's title, money
Lattice certificate, affiliated colony, participation project etc..
DR events security managing unit is by access control module, machine learning module, event correcting module and role Ku Mo
Block is constituted.Access control based roles are carried out to DR events, from two dimensions of event information type and event attribute to DR things
Part carries out role and delineation of power, and its function privilege is determined according to DR event informations type entities, true according to DR event attributes
Its fixed data permission.
Safe information transmission unit is made up of DR event informations encrypting module, key library module, role key encrypting module,
Information transmission to DR event informations in supply side and electricity consumption side carries out security hardening.Cipher key store is responsible for encryption key distribution and renewal,
Role key is encrypted role key marked price module, and DR event informations are encrypted DR event informations encrypting module
Processing.
Fig. 3 is demand response (DR) safety management system overall flow figure of the present invention.
Reference picture 3, when Utilities Electric Co. is according to the progress situation need such as operation of power networks state, power network emergency, electricity price information
It is first current to Utilities Electric Co. to prevent dummy node and malicious node from issuing deceptive information when issuing DR event informations 100
Information security situation carries out analysis 101, then discriminates whether to meet essential safety requirements 102, if do not met, and generation alarm is simultaneously
It is required that its amendment 103.The DR events intelligent decision unit of supply side will be carried out according to safety analysis result and current electric grid state
Intelligent decision 104.The DR event informations of generation, the DR events safety management 105 of based role is carried out to it.After the completion of management,
Judge whether to need amendment 106, if desired, then return re-start safety management 105, as need not if use Role Information pair
Operation 107 is encrypted in DR events, and sends it to DR events participant 108.
DR event participants are received after DR event encryptions information 109, advanced row event information decryption oprerations 110.It is anti-
Only electricity consumption side dummy node and malicious node, information security situation first current to DR event participants carry out analysis 111, then
Discriminate whether to meet essential safety requirements 112, if do not met, generation alerts and requires its amendment 113.The DR events of electricity consumption side
Intelligent decision unit will carry out intelligent decision 114 according to safety analysis result and DR event informations and self-demand, and perform
The decision-making 115.The result performed will be fed back, and update historical behavior storehouse 116.
Fig. 4 is DR events safety management figure of the present invention.
Reference picture 4, DR events are used as logical subscriber.The collective of the group access authority of character representation one.DR events are believed according to it
Cease type and event attribute divides role.Authority refers to DR events and certain operation is performed in shielded system and data resource
Authorize.Operation refers to the various operations that DR events are performed to data resource in demand response, such as reading and writing, increase, modification, deletion.
One session is mapping of the DR event to multiple roles.When DR events have activated the role that partly or entirely he is awarded
When, he just establishes session.Session is a dynamic concept.Constraint is a series of constraintss on whole model, is used
Controlling to assign operation, specifying responsibility separation and avoiding conflict etc..The role-security relations of distribution be built upon role set with
Many-to-many relationship between set of access rights, is that each role of system creation distributes multigroup access rights.DR events role point
A kind of many-to-one relationship between DR event sets and role's set is built upon with relation, is each DR events distribution of system and its
The corresponding role of job duty, i.e., one DR event can only possess a role, but a role can distribute to it is multiple
DR events.
The present invention carries out safety verification using the method for SVMs (SVM) to the role of DR events.It is suitable by choosing
When parameter and kernel function, extract event information type and event attribute characteristic value and be used as index, including following two aspects content:
Event information type includes Spot Price, load reduction or transfer amount etc., and event attribute includes title, time, participant, execution
Priority etc..Other validated user data under the role are trained as normal data using SVMs (SVM),
Obtain master pattern.No weight is assigned to different information, system accuracy is got a promotion.For passing through safety verification
User assign correspondence role, can just obtain role for need to not carrying out secondary identity authentication by the user of safety verification awards
Power.After the progress of valid operation each time, this data is updated into master pattern database, makes the error rate of safety verification
Constantly reduction.
Event information safe transmission unit supply side includes DR event informations encrypting module, role key encrypting module and close
Key storehouse, electricity consumption side includes DR event informations deciphering module and role key deciphering module.In information ciphering process of the present invention, DR things
The SM1 block ciphers that part Information Encryption Algorithm is examined using national Password Management department, system manager has highest weight
Limit, is responsible for the key of all users and role, and Role Management person is responsible for the role of distribution user, and demand response takes automatically
Business device has system manager's authority.
Fig. 5 is the safe information transmission initialization flowchart of the present invention according to embodiment.
In initialization procedure, it comprises the following steps that shown:
Step 200, system manager generate a private key a_mk and public key a_pk, and public key a_pk is stored in cipher key store;
Step 201, system manager generate the ID of all DR events participants, are designated as ID_U, form participant ID set,
Role ID is generated, ID_R, formation role ID set is designated as;
Step 202, the initial key role_k for generating with private key a_mk and ID_R each role, are stored in cipher key store;
Step 203, each DR events participant generate respective private key u_mk and public key u_pk, and all public key u_pk are deposited
Storage is in cipher key store, and private key is present in the local system of each DR events participant;
The message transmitting procedure of the present invention is as described below:
Step 300, system generate DR event informations waiting for transmission;
Step 301, system are updated using hash chain method to role key role_k, generate the role key of this time;
Initialization procedure of the embodiment of the present invention, the initial key role_k of each role is generated with private key a_mk and ID_R,
It is stored in cipher key store, later in each information transfer, role key used is updated using hash chain method, will be upper
Secondary role key is transferred again to hash function and obtains its cryptographic Hash, as this role key, uses the role after renewal
DR event informations are encrypted key.The SM3 cryptographic Hash algorithms that hash algorithm is examined using national Password Management department, it is miscellaneous
Value length of gathering is 256 bits, it is ensured that one-time pad, it is ensured that safe information transmission.
Step 302, with the public key u_pk of DR event participants role key is encrypted, generates Role Information ciphertext;
In the embodiment of the present invention, the SM2 block ciphers that AES is examined using national Password Management department, are bases
In the asymmetric arithmetic of ECC algorithm.
Step 303 expression carries out symmetric cryptography to DR event informations with the role key of generation, generates event information ciphertext;
In the embodiment of the present invention, the SM1 block ciphers that AES is examined using national Password Management department, packet
Length and key length are all 128 bits, and algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
Step 304, Role Information ciphertext and event information ciphertext are sent to target DR event participants;
In the embodiment of the present invention, cipher-text information can be connect by public network transmissions to the information of target DR event participants
Receiving end, to reduce communications cost.
Step 305, targeted customer decrypt Role Information ciphertext with private key for user u_mk, obtain role key;
Step 306, with role key DR event informations are decrypted, information transfer terminates.
Claims (12)
1. the demand response event method for managing security of a kind of based role, it is characterised in that this method comprises the following steps:
The first step:Safety analysis is carried out to supply side demand response DR events participant and electricity consumption side DR events participant, drawn
Safety analysis result;
Second step:Using safety analysis result as reference frame, DR event intelligent decisions are carried out to supply side, DR events letter is obtained
Breath;
3rd step:Using DR events as logical subscriber, safety is carried out to the role of DR events using the method for SVMs and tested
Card, based role carries out safety management to DR event informations;
4th step:Initialization operation is carried out when transmitting for the first time to safe information transmission unit, every time equal more new role before transmission
Key, the role key of DR events is encrypted to DR event informations, and the public key of DR event participants is encrypted to role key;
5th step:Electricity consumption side DR event participants are sent information to, event information is decrypted participant;
6th step:Using electricity consumption side DR events participant's safety analysis result as reference frame, DR event intelligence is carried out to electricity consumption side
Energy decision-making, and perform;
7th step:The result performed will be fed back, and update historical behavior storehouse.
2. the demand response event method for managing security of based role according to claim 1, it is characterized in that, supply side and
The safety analysis of electricity consumption side is relevant with the historical behavior of DR events promoter and participant, and weight and the behavior of historical behavior are sent out
The time interval at raw relatively current moment at moment is inversely proportional.
3. demand response event method for managing security according to claim 1, it is characterized in that, the second step, supply side
DR event intelligent decision modules according to the running status of DR participant's status information, Back ground Information and power network, power network emergency,
Electricity price information, supply side security information situation carry out intelligent decision to DR events, and the user involved by DR is selected, it is determined that
Both sides' interaction mechanism, sets DR targets.
4. demand response event method for managing security according to claim 1, it is characterized in that, the 6th step, electricity consumption side
DR event intelligent decision modules are according to DR participant's status information, Back ground Information and DR event informations, electricity consumption side security information feelings
Condition carries out intelligent decision to DR events, determines the participation terminal that electricity consumption side is automated toed respond to.
5. demand response event method for managing security according to claim 1, it is characterized in that, the 3rd step specific steps
Including:
3.1) information type and event attribute according to DR events, creates role's set, is designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) the various operations performed according to DR events to data resource, create operational set, are designated as O;
3.4) operation is assigned, responsibility separation is specified and avoids conflict for control, set up a series of constraintss;
3.5) the role-security relations of distribution and DR event role's relations of distribution are set up;
3.6) mapping of role and executable role are set up using the method for SVMs.
6. demand response event method for managing security according to claim 5, it is characterized in that, described SVMs
Method refers to:Using other validated user data as normal data, its characteristic vector is extracted, appropriate parameter and core by choosing
It is trained function pair, obtains master pattern, and this data is obtained into its executable role by master pattern computing.
7. demand response event method for managing security according to claim 6, it is characterized in that, extract characteristic vector and refer to
Two aspect content below:Event information type, including Spot Price, load are cut down or transfer amount, event attribute, including title,
Time, participant or execution priority.
8. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, initialization
Process specific steps include:
4.1) system manager's generation one private key a_mk and public key a_pk, public key a_pk are stored in cipher key store;
4.2) system manager generates the ID of all DR events participants, is designated as ID_U, forms participant ID set, generates role
ID, is designated as ID_R, forms role ID set;
4.3) the initial key role_k of each role is generated with private key a_mk and ID_R, is stored in cipher key store;
4.4) each DR events participant generates respective private key u_mk and public key u_pk, all public key u_pk are stored in key
In storehouse, private key is present in the local system of each DR events participant.
9. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, DR events
Information Encryption Algorithm is using the SM1 block ciphers of national Password Management department examination & approval, and block length and key length are all
128 bits, algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
10. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, Jiao Semi
Key AES, using the SM2 block ciphers of national Password Management department examination & approval, is the asymmetric calculation based on ECC algorithm
Method.
11. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, using Kazakhstan
Uncommon chain method updates role key, and the SM3 cryptographic Hash algorithms that hash algorithm is examined using national Password Management department, Hash Value is long
Spend for 256 bits, it is ensured that one-time pad.
12. demand response event method for managing security according to claim 1, it is characterized in that, the 5th step, packet
Include the DR event informations after being encrypted with role key and with the role key after DR event participant's public key encryptions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410563905.XA CN104378356B (en) | 2014-10-22 | 2014-10-22 | The demand response event method for managing security and system of based role |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410563905.XA CN104378356B (en) | 2014-10-22 | 2014-10-22 | The demand response event method for managing security and system of based role |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104378356A CN104378356A (en) | 2015-02-25 |
CN104378356B true CN104378356B (en) | 2017-09-29 |
Family
ID=52557013
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410563905.XA Active CN104378356B (en) | 2014-10-22 | 2014-10-22 | The demand response event method for managing security and system of based role |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104378356B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106888199B (en) * | 2015-12-16 | 2021-03-02 | 国家电网公司 | Role-driven demand response secure access method in smart grid |
CN105592090A (en) * | 2015-12-28 | 2016-05-18 | 上海交通大学 | Event-based demand response dynamic security service method |
CN105631309B (en) * | 2015-12-29 | 2019-04-09 | 深圳市科漫达智能管理科技有限公司 | A kind of event tests power method and tests power system |
CN109272286B (en) * | 2018-08-30 | 2022-11-15 | 中国传媒大学 | SaaS (software as a service) multi-tenant cloud movie and television project management method and system with script as core |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103269070A (en) * | 2013-06-05 | 2013-08-28 | 广州中国科学院沈阳自动化研究所分所 | Automatic demand response system and automatic demand response method |
CN103763094A (en) * | 2014-01-03 | 2014-04-30 | 沈阳中科博微自动化技术有限公司 | Intelligent electric meter system safety monitoring information processing method |
-
2014
- 2014-10-22 CN CN201410563905.XA patent/CN104378356B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103269070A (en) * | 2013-06-05 | 2013-08-28 | 广州中国科学院沈阳自动化研究所分所 | Automatic demand response system and automatic demand response method |
CN103763094A (en) * | 2014-01-03 | 2014-04-30 | 沈阳中科博微自动化技术有限公司 | Intelligent electric meter system safety monitoring information processing method |
Non-Patent Citations (3)
Title |
---|
RBAC模型的改进及其在电力ERP权限管理中的应用;庞春江,庞会静;《电力系统自动化》;20080710;第32卷(第13期);第49-52页 * |
基于角色的电力SCADA系统多区域权限访问控制模型设计;尚学伟 等;《电网技术》;20140430;第38卷(第4期);第1122-1126页 * |
智能用电中自动需求响应的特征及研究架构;盛万兴 等;《电力系统自动化》;20131210;第37卷(第23期);第1-7页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104378356A (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109495465B (en) | Privacy set intersection method based on intelligent contracts | |
CN109729168A (en) | A kind of data share exchange system and method based on block chain | |
CN113127916A (en) | Data set processing method, data processing device and storage medium | |
CN104378356B (en) | The demand response event method for managing security and system of based role | |
CN108418784A (en) | A kind of distributed cross-domain authorization and access control method based on properties secret | |
Zhang et al. | A reliable data-transmission mechanism using blockchain in edge computing scenarios | |
Cai et al. | A blockchain smart contract based on light-weighted quantum blind signature | |
CN108462696B (en) | Decentralized block chain intelligent identity authentication system | |
CN111181719B (en) | Hierarchical access control method and system based on attribute encryption in cloud environment | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN103220141A (en) | Sensitive data protecting method and system based on group key strategy | |
Zhang et al. | Blockchain-based secure equipment diagnosis mechanism of smart grid | |
CN109981663A (en) | A kind of privacy group chat method, equipment and storage medium | |
CN113704210A (en) | Data sharing method and electronic equipment | |
CN109492438A (en) | Distributed computing system based on TrustZone | |
CN108600174A (en) | A kind of access control mechanisms and its implementation of big merger network | |
CN104158655A (en) | POS master key generation and distribution management system and control method | |
CN106100834A (en) | The generation in a kind of algorithm secret key storehouse and update method | |
CN104125230A (en) | Short message authentication service system and authentication method | |
CN107302524A (en) | A kind of ciphertext data-sharing systems under cloud computing environment | |
Zhao et al. | Fuzzy identity-based dynamic auditing of big data on cloud storage | |
CN108737444A (en) | Micro services authorization management method and device applied to intelligent robot | |
CN109903046A (en) | User data management and device based on block chain | |
CN110519222A (en) | Outer net access identity authentication method and system based on disposable asymmetric key pair and key card | |
CN106487505A (en) | Key management, acquisition methods and relevant apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |