CN104378356B - The demand response event method for managing security and system of based role - Google Patents

The demand response event method for managing security and system of based role Download PDF

Info

Publication number
CN104378356B
CN104378356B CN201410563905.XA CN201410563905A CN104378356B CN 104378356 B CN104378356 B CN 104378356B CN 201410563905 A CN201410563905 A CN 201410563905A CN 104378356 B CN104378356 B CN 104378356B
Authority
CN
China
Prior art keywords
event
role
events
key
demand response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410563905.XA
Other languages
Chinese (zh)
Other versions
CN104378356A (en
Inventor
李建华
郭龙华
伍军
夏正敏
林超
杨大路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Shanghai Jiaotong University
Original Assignee
SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd, Shanghai Jiaotong University filed Critical SHANGHAI PENGYUE JINGHONG INFORMATION TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201410563905.XA priority Critical patent/CN104378356B/en
Publication of CN104378356A publication Critical patent/CN104378356A/en
Application granted granted Critical
Publication of CN104378356B publication Critical patent/CN104378356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of demand response of based role (Demand Response, abbreviation DR) event method for managing security and system, including:Safety analysis is carried out to supply side and electricity consumption side, the result of analysis is regard as one of foundation of intelligent decision of demand response event;Using DR events as logical subscriber, safety verification is carried out to the role of DR events using the method for SVMs (Support Vector Machine, abbreviation SVM), based role carries out safety management to DR event informations;It is encrypted using the Role Information of DR events, it is ensured that information carries out safe transmission in the public network.Event information is decrypted electricity consumption side DR event participants;Using electricity consumption side DR events participant's safety analysis result as one of reference frame, DR event intelligent decisions are carried out to electricity consumption side, and perform;The result performed will be fed back, and update historical behavior storehouse.

Description

The demand response event method for managing security and system of based role
Technical field
The present invention relates to network security and intelligent grid field, the demand response event safety of specifically a kind of based role Management method and system.
Technical background
Intelligent grid is as a dependence messaging platforms and the electric energy exchange network of intelligent control platform, with information Change, automation, it is interactive the features such as, played an important role to realizing that energy-saving and emission-reduction, electric power resource are distributed rationally.Demand response (Demand Response, abbreviation DR) technology is one of core technology in intelligent grid, by taking effective excitation to arrange Apply, guiding power consumer optimization power mode improves terminal power consumption efficiency, realizes effective control of power system load, produces Good economic benefit and social benefit.In recent years, with the proposition and development of automatic demand response concept, this demand is rung The new model answered further enhancing the participation initiative of user, improve level of response.DR events are used as automatic demand response In Utilities Electric Co. and power consumer between information transmission carrier, have very important status in the entire system.
DR events are due to the particularity of its status, once being attacked and being distorted by criminal, or are forged issue, it will Normal operation and power consumer to Utilities Electric Co. it is normal using bringing grave danger, these are threatened to national security and public Safety belt carrys out new challenge.Simultaneously as the species such as involved department, equipment, user is various in power system, validated user is got over Power operation, maloperation event happen occasionally.So, in automatic demand response, how effectively to manage DR events and it is carried out Safe and reliable transmission, is one of urgent problem to be solved in the automatic demand response safe practice of intelligent grid.
1) found through being retrieved to existing literature, Chinese Patent Application No. 201280040033.8, entitled " automation demand Response system ".The demand response event from automation demand response server is received at automation demand response client Information, system determines to want the multiple equipment of controlled building automation system during demand response event.System is many Individual equipment prepares the scheduling scheme of the controlling behavior during demand response event.It is automatic that control message is sent to building by system Change system, the controlling behavior to multiple equipment is performed with the scheduling scheme according to the controlling behavior for demand response event.
The scheme that the patent is provided is, according to DR event informations, to pass through the building automatic demand response system in electricity consumption lateral root System, is scheduled control, with the power consumption of facility during automatically and efficiently reducing various DR events to the equipment in system. But the program is based only on DR event informations and carries out automated decision-making, if it is considered that the safety of DR event informations in itself is asked Topic, also in the presence of many tender spots, the external factor such as DR events are forged or distorted.These external factor can cause automatically Change demand response system and lose original effect.
2) Chinese Patent Application No. 201110349716.9, it is entitled " to be used for the electricity consumption for changing demand response control hierarchy Device and power management apparatus ".By power device using the current power state information sent in real time, controller will current electricity Valency rank compared with desired DR control hierarchies, and determine be increase power device using or consider economize on electricity for the use of, from And it is adaptively adjusted the beginning rank of DR controls.
The scheme that the patent is provided is to install controller in electricity consumption side, and the DR information of Demand-side is transmitted across by communication unit Come, decide whether to respond this DR event by comparing DR control hierarchies.But the program can only be to the DR of electricity consumption side Event carries out decision-making, if it is considered that the safety problem of supply side and communication unit, also has tender spots, such as communication unit quilt Illegal attack etc..These factors can influence the normal operation of electricity consumption side demand response.
The content of the invention
The application purpose is demand response event method for managing security and system there is provided a kind of based role, is used to The safety problem of existing demand response technology is solved, using the method for machine learning, based role carries out effective to DR events Safety management, and devise the safe transmission that a set of effective Information Transmission Model ensures DR event informations.
Technical scheme specific method is as follows:
The present invention carries out safety analysis to supply side and electricity consumption side first, and the intelligence of the result of analysis as DR events is determined One of foundation of plan;Using DR events as logical subscriber, using SVMs (SVM) method, by the way that authority is awarded To role, role is granted to user, and user does not associate directly with authority, realizes the logical separation of user and access rights, Therefore it greatly facilitates rights management, prevents false and malice DR events from causing safety hazard to power system.In information In transmitting procedure, for the demand response of power system, information is encrypted by using role, information is reliably passed It is defeated.
The present invention specifically includes following steps:
The first step:When Utilities Electric Co. wants to initiate a demand response event, supply side and electricity consumption side DR events are joined Safety analysis is carried out with person, safety analysis result is drawn;
Described safety analysis result is drawn based on the historical behavior analysis to DR events promoter and participant, is gone through The time interval that with the behavior occurs for the weight of history behavior the relatively current moment at moment is inversely proportional;
Second step:Using safety analysis result as one of reference frame, DR event intelligent decisions are carried out to supply side, obtained DR event informations;
The supply side DR events intelligent decision is according to the operation shape for being DR participant's status information, Back ground Information and power network Situations such as state, power network emergency, electricity price information, supply side security information, content is that the user involved by DR is selected, Both sides' interaction mechanism is determined, DR targets are set.
3rd step:Using DR events as logical subscriber, the method using SVMs (SVM) is entered to the role of DR events Row safety verification, based role carries out safety management to DR event informations, and specific steps include:Specific steps include:
3.1) information type and event attribute according to DR events, creates role's set, is designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) the various operations performed according to DR events to data resource, create operational set, are designated as O;
3.4) operation is assigned, responsibility separation is specified and avoids conflict for control, set up a series of constraintss;
3.5) the role-security relations of distribution and DR event role's relations of distribution are set up;
3.6) mapping of role and executable role are set up using the method for SVMs (SVM);
Described SVM methods refer to:Using other validated user data as normal data, its characteristic vector is extracted, is passed through The appropriate parameter of selection and kernel function are trained to it, obtain master pattern, this data is obtained by master pattern computing To its executable role.
The characteristic vector refers to following two aspects content:Event information type, including Spot Price, load are cut down or turned Shifting amount etc., event attribute, including title, time, participant, execution priority etc..
4th step:Initialization operation is carried out to safe information transmission unit when transmitting for the first time, the role of DR events is used It is encrypted key, updates role key before transmission every time, it is ensured that information carries out safe transmission in public network.Institute Stating initialization procedure specific steps includes:
4.1) system manager's generation one private key a_mk and public key a_pk, public key a_pk are stored in cipher key store;
4.2) system manager generates the ID of all DR events participants, is designated as ID_U, forms participant ID set, generation Role ID, is designated as ID_R, forms role ID set;
4.3) the initial key role_k of each role is generated with private key a_mk and ID_R, is stored in cipher key store;
4.4) each DR events participant generates respective private key u_mk and public key u_pk, and all public key u_pk are stored in In cipher key store, private key is present in the local system of each DR events participant;
The DR event informations AES refers to the SM1 block ciphers of national Password Management department examination & approval, packet Length and key length are all 128 bits, and algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
The role key AES refers to the SM2 block ciphers of national Password Management department examination & approval, is to be based on The asymmetric arithmetic of ECC algorithm.
The update method of the role key refers to carry out original key computing, hash algorithm use using hash algorithm The SM3 cryptographic Hash algorithms of national Password Management department examination & approval, Hash Value length is 256 bits, it is ensured that one-time pad.
5th step:Electricity consumption side DR event participants are sent information to, event information is decrypted participant;
The transport packet includes the DR event informations after being encrypted with role key and with DR event participant's public key encryptions Role key.
6th step:Using electricity consumption side DR events participant's safety analysis result as one of reference frame, electricity consumption side is carried out DR event intelligent decisions, and perform;
The electricity consumption side DR events intelligent decision according to be DR participant's status information, Back ground Information and DR event informations, Situations such as electricity consumption side security information, content is to determine the participation terminal that electricity consumption side is automated toed respond to.
7th step:The result performed will be fed back, and update historical behavior storehouse.
Brief description of the drawings
Fig. 1 is demand response (DR) safety management system configuration diagram of the present invention.
Fig. 2 is the supply side system construction drawing of the present invention.
Fig. 3 is demand response (DR) safety management system overall flow figure of the present invention.
Fig. 4 is DR events safety management figure of the present invention.
Fig. 5 is safe information transmission initialization flowchart of the present invention.
Embodiment
Here is that embodiments of the invention are elaborated, and the embodiment of the present invention is premised on technical solution of the present invention It is lower to implement, detailed embodiment and specific operating process are given, but protection scope of the present invention is not limited to following reality Apply example.
With reference to the accompanying drawings, the embodiment to the present invention is described in further detail.
Fig. 1 is demand response (DR) safety management system configuration diagram of the present invention.
With reference to Fig. 1, when Utilities Electric Co. needs to initiate DR events, Utilities Electric Co. enters DR events safety by user interface Management system, the DR event informations after generation encryption send electricity consumption side information to by supply side information publishing side by public network Receiving terminal, each DR events participant is responded by DR event management systems, is performed by Electric control terminal, electricity Power terminal includes all electrical equipments, for example, television set, computer, printer, water dispenser etc..DR event implementation persons refer to participate in Each functional department of the electric company of DR events is initiated, DR event participants refer to each power consumer for participating in DR patterns.Power supply The difference of side DR events safety management system and electricity consumption side DR event management systems is that the former has DR event safety managements Unit, is responsible for the initiation to DR events and carries out safety management, prevent dummy node and malicious node from issuing falseness DR event informations.
Fig. 2 is the supply side system construction drawing of the present invention according to embodiment.
Reference picture 2, supply side DR events safety management system is made up of following five units:User interface section, safety Analytic unit, event intelligent decision unit, DR events security managing unit and safe information transmission unit are constituted.
Electricity consumption side DR events safety management system is made up of following four unit:User interface section, safety analysis unit, Event intelligent decision unit, safe information transmission unit are constituted.
User interface section is made up of supply side Subscriber Interface Module SIM and electricity consumption side Subscriber Interface Module SIM, is responsible for system and DR Event implementation person and DR events participant carry out information exchange, and automatic demand response system is played it should be powerful.
Safety analysis unit is made up of historical behavior database module and behavioral data analysis module.In the present invention, it is based on The historical behavior of main body, safety analysis is carried out to supply side DR event publishers and electricity consumption side DR events participant.To truly it use The order that the historical behavior at family occurs according to operation is numbered, and numbering is designated as i, and behavior is divided into correct operation and maloperation, point R is not denoted as itiAnd Fi, R during correct operationi=1, Fi=0, R during faulty operationi=0, Fi=-1, historical behavior is with currently going For numbering interval be designated as Ni, weights Wi=1/Ni, then the safety coefficient of current time userIt is same with this When, access time is extracted in the historical behavior of main body, object is accessed, the characteristic informations such as interval, access times is accessed, by this A little characteristic informations and the feature of main body current behavior carry out matching primitives, draw matching degree.Safety coefficient and matching degree are as entering Two important reference indexs of row safety analysis.Wherein, safety coefficient characterizes user to data processing safety height, matching Degree characterizes user to feature operation security height.
DR event decisions unit is by DR event intelligent decision modules and solution bank module composition.Supply side DR events are intelligently determined Plan module is according to the running status of DR participant's status information, Back ground Information and power network, power network emergency, electricity price information, confession Situations such as electric side security information, carries out intelligent decision to DR events, and the user involved by DR is selected, and determines that both sides interact Mechanism, sets DR targets.Electricity consumption side DR event intelligent decision modules are according to DR participant's status information, Back ground Information and DR events Situations such as information, electricity consumption side security information, carries out intelligent decision to DR events, determines the participation terminal that electricity consumption side is automated toed respond to.
Each Utilities Electric Co. DR events entity includes a series of related event information examples;Utilities Electric Co.'s project All information of (Utility Program) entity description on DR projects, be from the angle of Utilities Electric Co. and participant with one The attribute description project of row is how to manage and perform, and attribute includes title, time, participant, execution priority etc.;Event Information type (Event lnfo Type) entity is a part for Utilities Electric Co.'s project entity, for information type is described in detail, Such as Spot Price, load reduction or transfer amount, attribute includes title, bound, transformation period table etc.;Participant's account (Participant Account) entity then describes all information relevant with participant, and attribute includes participant's title, money Lattice certificate, affiliated colony, participation project etc..
DR events security managing unit is by access control module, machine learning module, event correcting module and role Ku Mo Block is constituted.Access control based roles are carried out to DR events, from two dimensions of event information type and event attribute to DR things Part carries out role and delineation of power, and its function privilege is determined according to DR event informations type entities, true according to DR event attributes Its fixed data permission.
Safe information transmission unit is made up of DR event informations encrypting module, key library module, role key encrypting module, Information transmission to DR event informations in supply side and electricity consumption side carries out security hardening.Cipher key store is responsible for encryption key distribution and renewal, Role key is encrypted role key marked price module, and DR event informations are encrypted DR event informations encrypting module Processing.
Fig. 3 is demand response (DR) safety management system overall flow figure of the present invention.
Reference picture 3, when Utilities Electric Co. is according to the progress situation need such as operation of power networks state, power network emergency, electricity price information It is first current to Utilities Electric Co. to prevent dummy node and malicious node from issuing deceptive information when issuing DR event informations 100 Information security situation carries out analysis 101, then discriminates whether to meet essential safety requirements 102, if do not met, and generation alarm is simultaneously It is required that its amendment 103.The DR events intelligent decision unit of supply side will be carried out according to safety analysis result and current electric grid state Intelligent decision 104.The DR event informations of generation, the DR events safety management 105 of based role is carried out to it.After the completion of management, Judge whether to need amendment 106, if desired, then return re-start safety management 105, as need not if use Role Information pair Operation 107 is encrypted in DR events, and sends it to DR events participant 108.
DR event participants are received after DR event encryptions information 109, advanced row event information decryption oprerations 110.It is anti- Only electricity consumption side dummy node and malicious node, information security situation first current to DR event participants carry out analysis 111, then Discriminate whether to meet essential safety requirements 112, if do not met, generation alerts and requires its amendment 113.The DR events of electricity consumption side Intelligent decision unit will carry out intelligent decision 114 according to safety analysis result and DR event informations and self-demand, and perform The decision-making 115.The result performed will be fed back, and update historical behavior storehouse 116.
Fig. 4 is DR events safety management figure of the present invention.
Reference picture 4, DR events are used as logical subscriber.The collective of the group access authority of character representation one.DR events are believed according to it Cease type and event attribute divides role.Authority refers to DR events and certain operation is performed in shielded system and data resource Authorize.Operation refers to the various operations that DR events are performed to data resource in demand response, such as reading and writing, increase, modification, deletion. One session is mapping of the DR event to multiple roles.When DR events have activated the role that partly or entirely he is awarded When, he just establishes session.Session is a dynamic concept.Constraint is a series of constraintss on whole model, is used Controlling to assign operation, specifying responsibility separation and avoiding conflict etc..The role-security relations of distribution be built upon role set with Many-to-many relationship between set of access rights, is that each role of system creation distributes multigroup access rights.DR events role point A kind of many-to-one relationship between DR event sets and role's set is built upon with relation, is each DR events distribution of system and its The corresponding role of job duty, i.e., one DR event can only possess a role, but a role can distribute to it is multiple DR events.
The present invention carries out safety verification using the method for SVMs (SVM) to the role of DR events.It is suitable by choosing When parameter and kernel function, extract event information type and event attribute characteristic value and be used as index, including following two aspects content: Event information type includes Spot Price, load reduction or transfer amount etc., and event attribute includes title, time, participant, execution Priority etc..Other validated user data under the role are trained as normal data using SVMs (SVM), Obtain master pattern.No weight is assigned to different information, system accuracy is got a promotion.For passing through safety verification User assign correspondence role, can just obtain role for need to not carrying out secondary identity authentication by the user of safety verification awards Power.After the progress of valid operation each time, this data is updated into master pattern database, makes the error rate of safety verification Constantly reduction.
Event information safe transmission unit supply side includes DR event informations encrypting module, role key encrypting module and close Key storehouse, electricity consumption side includes DR event informations deciphering module and role key deciphering module.In information ciphering process of the present invention, DR things The SM1 block ciphers that part Information Encryption Algorithm is examined using national Password Management department, system manager has highest weight Limit, is responsible for the key of all users and role, and Role Management person is responsible for the role of distribution user, and demand response takes automatically Business device has system manager's authority.
Fig. 5 is the safe information transmission initialization flowchart of the present invention according to embodiment.
In initialization procedure, it comprises the following steps that shown:
Step 200, system manager generate a private key a_mk and public key a_pk, and public key a_pk is stored in cipher key store;
Step 201, system manager generate the ID of all DR events participants, are designated as ID_U, form participant ID set, Role ID is generated, ID_R, formation role ID set is designated as;
Step 202, the initial key role_k for generating with private key a_mk and ID_R each role, are stored in cipher key store;
Step 203, each DR events participant generate respective private key u_mk and public key u_pk, and all public key u_pk are deposited Storage is in cipher key store, and private key is present in the local system of each DR events participant;
The message transmitting procedure of the present invention is as described below:
Step 300, system generate DR event informations waiting for transmission;
Step 301, system are updated using hash chain method to role key role_k, generate the role key of this time;
Initialization procedure of the embodiment of the present invention, the initial key role_k of each role is generated with private key a_mk and ID_R, It is stored in cipher key store, later in each information transfer, role key used is updated using hash chain method, will be upper Secondary role key is transferred again to hash function and obtains its cryptographic Hash, as this role key, uses the role after renewal DR event informations are encrypted key.The SM3 cryptographic Hash algorithms that hash algorithm is examined using national Password Management department, it is miscellaneous Value length of gathering is 256 bits, it is ensured that one-time pad, it is ensured that safe information transmission.
Step 302, with the public key u_pk of DR event participants role key is encrypted, generates Role Information ciphertext;
In the embodiment of the present invention, the SM2 block ciphers that AES is examined using national Password Management department, are bases In the asymmetric arithmetic of ECC algorithm.
Step 303 expression carries out symmetric cryptography to DR event informations with the role key of generation, generates event information ciphertext;
In the embodiment of the present invention, the SM1 block ciphers that AES is examined using national Password Management department, packet Length and key length are all 128 bits, and algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
Step 304, Role Information ciphertext and event information ciphertext are sent to target DR event participants;
In the embodiment of the present invention, cipher-text information can be connect by public network transmissions to the information of target DR event participants Receiving end, to reduce communications cost.
Step 305, targeted customer decrypt Role Information ciphertext with private key for user u_mk, obtain role key;
Step 306, with role key DR event informations are decrypted, information transfer terminates.

Claims (12)

1. the demand response event method for managing security of a kind of based role, it is characterised in that this method comprises the following steps:
The first step:Safety analysis is carried out to supply side demand response DR events participant and electricity consumption side DR events participant, drawn Safety analysis result;
Second step:Using safety analysis result as reference frame, DR event intelligent decisions are carried out to supply side, DR events letter is obtained Breath;
3rd step:Using DR events as logical subscriber, safety is carried out to the role of DR events using the method for SVMs and tested Card, based role carries out safety management to DR event informations;
4th step:Initialization operation is carried out when transmitting for the first time to safe information transmission unit, every time equal more new role before transmission Key, the role key of DR events is encrypted to DR event informations, and the public key of DR event participants is encrypted to role key;
5th step:Electricity consumption side DR event participants are sent information to, event information is decrypted participant;
6th step:Using electricity consumption side DR events participant's safety analysis result as reference frame, DR event intelligence is carried out to electricity consumption side Energy decision-making, and perform;
7th step:The result performed will be fed back, and update historical behavior storehouse.
2. the demand response event method for managing security of based role according to claim 1, it is characterized in that, supply side and The safety analysis of electricity consumption side is relevant with the historical behavior of DR events promoter and participant, and weight and the behavior of historical behavior are sent out The time interval at raw relatively current moment at moment is inversely proportional.
3. demand response event method for managing security according to claim 1, it is characterized in that, the second step, supply side DR event intelligent decision modules according to the running status of DR participant's status information, Back ground Information and power network, power network emergency, Electricity price information, supply side security information situation carry out intelligent decision to DR events, and the user involved by DR is selected, it is determined that Both sides' interaction mechanism, sets DR targets.
4. demand response event method for managing security according to claim 1, it is characterized in that, the 6th step, electricity consumption side DR event intelligent decision modules are according to DR participant's status information, Back ground Information and DR event informations, electricity consumption side security information feelings Condition carries out intelligent decision to DR events, determines the participation terminal that electricity consumption side is automated toed respond to.
5. demand response event method for managing security according to claim 1, it is characterized in that, the 3rd step specific steps Including:
3.1) information type and event attribute according to DR events, creates role's set, is designated as R;
3.2) authority is divided into data permission and function privilege, creates authority set, be designated as P;
3.3) the various operations performed according to DR events to data resource, create operational set, are designated as O;
3.4) operation is assigned, responsibility separation is specified and avoids conflict for control, set up a series of constraintss;
3.5) the role-security relations of distribution and DR event role's relations of distribution are set up;
3.6) mapping of role and executable role are set up using the method for SVMs.
6. demand response event method for managing security according to claim 5, it is characterized in that, described SVMs Method refers to:Using other validated user data as normal data, its characteristic vector is extracted, appropriate parameter and core by choosing It is trained function pair, obtains master pattern, and this data is obtained into its executable role by master pattern computing.
7. demand response event method for managing security according to claim 6, it is characterized in that, extract characteristic vector and refer to Two aspect content below:Event information type, including Spot Price, load are cut down or transfer amount, event attribute, including title, Time, participant or execution priority.
8. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, initialization Process specific steps include:
4.1) system manager's generation one private key a_mk and public key a_pk, public key a_pk are stored in cipher key store;
4.2) system manager generates the ID of all DR events participants, is designated as ID_U, forms participant ID set, generates role ID, is designated as ID_R, forms role ID set;
4.3) the initial key role_k of each role is generated with private key a_mk and ID_R, is stored in cipher key store;
4.4) each DR events participant generates respective private key u_mk and public key u_pk, all public key u_pk are stored in key In storehouse, private key is present in the local system of each DR events participant.
9. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, DR events Information Encryption Algorithm is using the SM1 block ciphers of national Password Management department examination & approval, and block length and key length are all 128 bits, algorithm security encryption strength and related software and hardware realize that performance is suitable with AES.
10. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, Jiao Semi Key AES, using the SM2 block ciphers of national Password Management department examination & approval, is the asymmetric calculation based on ECC algorithm Method.
11. demand response event method for managing security according to claim 1, it is characterized in that, the 4th step, using Kazakhstan Uncommon chain method updates role key, and the SM3 cryptographic Hash algorithms that hash algorithm is examined using national Password Management department, Hash Value is long Spend for 256 bits, it is ensured that one-time pad.
12. demand response event method for managing security according to claim 1, it is characterized in that, the 5th step, packet Include the DR event informations after being encrypted with role key and with the role key after DR event participant's public key encryptions.
CN201410563905.XA 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role Active CN104378356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410563905.XA CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410563905.XA CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Publications (2)

Publication Number Publication Date
CN104378356A CN104378356A (en) 2015-02-25
CN104378356B true CN104378356B (en) 2017-09-29

Family

ID=52557013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410563905.XA Active CN104378356B (en) 2014-10-22 2014-10-22 The demand response event method for managing security and system of based role

Country Status (1)

Country Link
CN (1) CN104378356B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888199B (en) * 2015-12-16 2021-03-02 国家电网公司 Role-driven demand response secure access method in smart grid
CN105592090A (en) * 2015-12-28 2016-05-18 上海交通大学 Event-based demand response dynamic security service method
CN105631309B (en) * 2015-12-29 2019-04-09 深圳市科漫达智能管理科技有限公司 A kind of event tests power method and tests power system
CN109272286B (en) * 2018-08-30 2022-11-15 中国传媒大学 SaaS (software as a service) multi-tenant cloud movie and television project management method and system with script as core

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269070A (en) * 2013-06-05 2013-08-28 广州中国科学院沈阳自动化研究所分所 Automatic demand response system and automatic demand response method
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103269070A (en) * 2013-06-05 2013-08-28 广州中国科学院沈阳自动化研究所分所 Automatic demand response system and automatic demand response method
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
RBAC模型的改进及其在电力ERP权限管理中的应用;庞春江,庞会静;《电力系统自动化》;20080710;第32卷(第13期);第49-52页 *
基于角色的电力SCADA系统多区域权限访问控制模型设计;尚学伟 等;《电网技术》;20140430;第38卷(第4期);第1122-1126页 *
智能用电中自动需求响应的特征及研究架构;盛万兴 等;《电力系统自动化》;20131210;第37卷(第23期);第1-7页 *

Also Published As

Publication number Publication date
CN104378356A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
CN109495465B (en) Privacy set intersection method based on intelligent contracts
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN113127916A (en) Data set processing method, data processing device and storage medium
CN104378356B (en) The demand response event method for managing security and system of based role
CN108418784A (en) A kind of distributed cross-domain authorization and access control method based on properties secret
Zhang et al. A reliable data-transmission mechanism using blockchain in edge computing scenarios
Cai et al. A blockchain smart contract based on light-weighted quantum blind signature
CN108462696B (en) Decentralized block chain intelligent identity authentication system
CN111181719B (en) Hierarchical access control method and system based on attribute encryption in cloud environment
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN103220141A (en) Sensitive data protecting method and system based on group key strategy
Zhang et al. Blockchain-based secure equipment diagnosis mechanism of smart grid
CN109981663A (en) A kind of privacy group chat method, equipment and storage medium
CN113704210A (en) Data sharing method and electronic equipment
CN109492438A (en) Distributed computing system based on TrustZone
CN108600174A (en) A kind of access control mechanisms and its implementation of big merger network
CN104158655A (en) POS master key generation and distribution management system and control method
CN106100834A (en) The generation in a kind of algorithm secret key storehouse and update method
CN104125230A (en) Short message authentication service system and authentication method
CN107302524A (en) A kind of ciphertext data-sharing systems under cloud computing environment
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
CN108737444A (en) Micro services authorization management method and device applied to intelligent robot
CN109903046A (en) User data management and device based on block chain
CN110519222A (en) Outer net access identity authentication method and system based on disposable asymmetric key pair and key card
CN106487505A (en) Key management, acquisition methods and relevant apparatus and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant