CN107465688B - Method for identifying network application permission of state monitoring and evaluating system - Google Patents

Method for identifying network application permission of state monitoring and evaluating system Download PDF

Info

Publication number
CN107465688B
CN107465688B CN201710786323.1A CN201710786323A CN107465688B CN 107465688 B CN107465688 B CN 107465688B CN 201710786323 A CN201710786323 A CN 201710786323A CN 107465688 B CN107465688 B CN 107465688B
Authority
CN
China
Prior art keywords
authority
data
user
state monitoring
evaluating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710786323.1A
Other languages
Chinese (zh)
Other versions
CN107465688A (en
Inventor
张炜
邬蓉蓉
黎新
颜海俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of Guangxi Power Grid Co Ltd
Original Assignee
Electric Power Research Institute of Guangxi Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of Guangxi Power Grid Co Ltd filed Critical Electric Power Research Institute of Guangxi Power Grid Co Ltd
Priority to CN201710786323.1A priority Critical patent/CN107465688B/en
Publication of CN107465688A publication Critical patent/CN107465688A/en
Application granted granted Critical
Publication of CN107465688B publication Critical patent/CN107465688B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the technical field of research and application of power transformer equipment state monitoring and fault diagnosis in the power industry, and particularly relates to a method for identifying network application permission of a state monitoring and evaluating system. The invention can effectively guarantee the network security of the state monitoring and evaluating system, prevent the attack and infringement of hackers, malicious codes and the like, and prevent the breakdown and paralysis of the state monitoring and evaluating system and the electric equipment accidents or electric safety accidents caused by the breakdown and paralysis of the state monitoring and evaluating system.

Description

Method for identifying network application permission of state monitoring and evaluating system
Technical Field
The invention belongs to the technical field of research and application of power transformer equipment state monitoring and fault diagnosis in the power industry, and particularly relates to a method for identifying network application permission of a state monitoring and evaluating system.
Background
With the progress of the domestic and foreign online monitoring technology, more and more power transmission and transformation equipment state monitoring and evaluation systems based on power data networks (power dispatching data networks and power comprehensive data networks) are put into operation, can be used for timely grasping the operation state of power transmission and transformation equipment, and have obtained a plurality of successful monitoring and early warning cases in the industry.
With the construction of the state monitoring and evaluation system of the power transmission and transformation equipment of the system, the state monitoring and evaluation system of the power transmission and transformation equipment based on the network and the information system becomes a key infrastructure and even a nerve center of the whole economic society, is damaged by attack and generates a major security incident, so that the breakdown of infrastructures such as energy, traffic, communication, finance and the like is caused, catastrophic consequences are caused, and the national economic safety and public benefits are seriously damaged. Internationally, the concern of network attacks has gradually shifted towards traditional industrial control systems, where network security events are frequent, such as: in 2015, the Ukrainian national power grid is invaded by organized malicious codes, and viruses infect a power monitoring system, so that a large-area power failure occurs for 3 hours.
At the moment, the overall objective of the safety protection of the power transmission and transformation equipment state monitoring and evaluation system is to protect an important system from being damaged by hackers, viruses, malicious codes and the like under a uniform safety strategy, particularly to resist malicious attacks initiated by threat sources with abundant resources from an external organized group, reduce damage caused by serious natural disasters, quickly recover main functions after the system is damaged, prevent a primary system accident or a large-area power failure accident of electric power caused by a safety event of the state monitoring and evaluation system, and ensure safe and stable operation of a power grid.
Network attack means are constantly changed, and organized and conspirant attack behaviors are difficult to resist by only deploying security equipment, security software and a small amount of part-time personnel. In addition, after the multidimensional data fusion technology based on the Hadoop platform and distributed data processing is widely applied, the power transmission and transformation equipment state monitoring and evaluation system provides the capabilities of mass data storage, calculation and access, and gradually becomes a large data processing platform widely applied by numerous users of power enterprises. However, the state monitoring and evaluating system only focuses on basic functions such as acquisition, processing, storage, transmission, display, etc., so that the problem of insufficient data authority management and control is increasingly prominent, and the access authority of different users and the range of processing equipment can not be effectively isolated, and the authority management and control means is not suitable for the existing network security requirements.
In view of this, it is urgently needed to realize the discrimination and identification method of the access right and the data right of the state monitoring and evaluation system, realize effective isolation of data among different users, and guarantee network security and controllability of the state monitoring and evaluation system on the premise of guaranteeing the basic functions of the state monitoring and evaluation system of the power transmission and transformation equipment.
Disclosure of Invention
The invention aims to solve the problems in the prior art, provides an identification method of network application authority of a state monitoring and evaluation system, and provides a method for identifying identifier logic combination of user access authority, data authority and equipment authority by using a digital certificate technology of a power monitoring system, so as to timely and completely issue equipment state information to various power production personnel and provide state evaluation and risk evaluation processing services, wherein in order to realize the purpose, the technical scheme adopted by the invention is as follows:
a method for identifying network application permission of a state monitoring and evaluating system comprises the following steps:
(1) the access authority logic information of the user identifier is placed in a login connection authentication script of a security control layer of the state monitoring and evaluation system;
(2) the data authority logic information of the user identifier is placed in a data processing authentication script of a safety control layer of the state monitoring and evaluating system;
(3) the distributed file information authority, the data warehouse authority and the database authority in the data authority logic information are placed in calling and reading bottom layer codes in the data processing authentication script;
(4) the equipment authority logic information of the user identifier is placed in a jurisdiction authentication script of a security control layer of the state monitoring and evaluation system;
(5) the access authority logic information, the data authority logic information and the equipment authority logic information of the user identifier are packaged into a user identifier logic combination system through a digital certificate technology of the power monitoring system, and the identity identification information of the user is simultaneously detected according to an identifier logic operation parallel processing algorithm;
(6) and meanwhile, after the identity identification information of the user is checked, corresponding network application authority is given.
Further, before the step (1), the method further comprises: and deploying a safety control layer server in the state monitoring and evaluating system, and deploying access authority, data authority and equipment authority for screening and configuring users by using a digital certificate technology of the power monitoring system.
Further, the identification information in the step (5) includes an attribution authority identification, a user attribution department identification, and a user work attribute identification.
Further, the step (6) is to register the network application authority of the user, allocate the network application authority of the user, issue the network application authority of the user, and verify the network application authority of the user in sequence, so that the user successfully logs in, connects with the state monitoring and evaluating system, and applies the corresponding network application authority.
The invention has the beneficial effects that:
(1) successfully screening an identifier logic combination system of user access authority, data authority and equipment authority of the state monitoring and evaluating system based on a digital certificate technology of the power monitoring system, so that the network security of the state monitoring and evaluating system can be effectively guaranteed, attacks and infringements of hackers, malicious codes and the like are prevented, and the breakdown and paralysis of the state monitoring and evaluating system and power equipment accidents or power safety accidents caused by the breakdown and paralysis of the state monitoring and evaluating system are prevented;
(2) the identity of the access user is authenticated based on the identifier logic combination system, the hidden danger that a malicious user and an unauthenticated user acquire key data through a state monitoring and evaluating system is effectively avoided, and the purposes of forced access control and forced execution control of security authorization are successfully achieved;
(3) the permission of a data control assembly is distributed based on an identifier logic combination system, the data permission control problem in the network application of a state monitoring and evaluation system is effectively controlled, and the centralized management conditions of data permissions such as HDFS, Hive, HBase and the like are greatly improved;
(4) the method has the advantages that the method is initiated and based on an identifier logic combination system, the associated equipment of the access user and the client is distributed, the malicious behaviors which pretend to serve as a certain user and the client to look up the equipment state and execute the treatment measure are effectively controlled, and the control capability of system authorization and the defense capability of identity information safety are obviously improved;
(5) the concurrent processing mechanism of the network application authorities such as the access authority of different users, the data authority, the equipment authority and the like is realized firstly, the unfavorable situation that network blockage is generated when the multi-user concurrent access state monitoring and evaluation system is used is overcome, and the complex flow that the queue type access is required in the traditional mode is effectively avoided.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
For a better understanding of the present invention, reference is made to the following detailed description taken in conjunction with the accompanying drawings in which:
as shown in fig. 1, a method for identifying network application permission of a state monitoring and evaluating system includes the following steps:
1. a safety control layer server is deployed in a state monitoring and evaluating system, and access authority, data authority and equipment authority for screening and configuring users are deployed by utilizing a digital certificate technology of a power monitoring system; the access authority logic information of the user identifier is placed in a login connection authentication script of a security control layer of the state monitoring and evaluation system;
2. the data authority logic information of the user identifier is placed in a data processing authentication script of a safety control layer of the state monitoring and evaluating system;
3. the distributed file information authority, the data warehouse authority and the database authority in the data authority logic information are placed in calling and reading bottom layer codes in the data processing authentication script;
4. the equipment authority logic information of the user identifier is placed in a jurisdiction authentication script of a security control layer of the state monitoring and evaluation system;
5. the access authority logic information, the data authority logic information and the equipment authority logic information of the user identifier are packaged into a user identifier logic combination system through a digital certificate technology of the power monitoring system, and the identity identification information of the user is simultaneously detected according to an identifier logic operation parallel processing algorithm; the identity identification information comprises an attribution authority identity identification, a user attribution department identification and a user work attribute identification; the identifier logical operation parallel processing algorithm comprises the following specific steps:
(1) the access authority of the user is identified based on the access authority logic information of the user identifier, a security control layer server of the state monitoring and evaluation system reads an attribution authority identity identification bit of a user requesting identity authentication of a client, network attack can be avoided or malicious session can be established, the client is prevented from being disguised as a data node (Datanode) and a tracking task processor (Tasktracker) and is used for receiving tasks issued by a task execution processor (Jobtracker) and a naming node (Namenode);
the attribution authority identification position of the user comprises 12 types of identities of online monitoring pre-subsystems, namely a terminal device, other transverse interconnection information systems, a production command decision-making person, a provincial power grid production equipment management part, a system operation part, a safety supervision part, a power transformation management station and a power transmission management station of a power supply office, a test class, a maintenance patrol class, a power transformation maintenance class, a power transmission maintenance class, a communication class and an automation class of the power supply office, an electric power science research institute, an operator, an engineer, a super manager, a guest and the like.
The on-line monitoring front-end subsystem comprises 3 types of hosts of an in-substation equipment monitoring system, a transmission line monitoring system and an environment monitoring system, namely an IED intelligent assembly.
The other transverse interconnection and intercommunication information systems comprise 9 types of system user interaction platform servers such as an asset management system, a marketing management system, a financial management and control system, a human resource management system, a cooperative office system, a comprehensive management system, a decision support system, a knowledge management system and a mass quasi-real-time data platform.
(2) Identifying the data authority of the user based on the data authority logic information of the user identifier, and ensuring the access authentication security of the user in the power data network based on the access authority logic information of the user identifier; a security control layer server of the state monitoring and evaluation system reads an attribution authority data application identification bit of a user requesting identity authentication client, then respectively controls distributed file information authority, data warehouse authority and database authority based on data authority logic information, and effectively isolates data in the state monitoring and evaluation system and the attribution authority identification bit aiming at different users; for example, a system super manager has all data authorities, and a test class of a power supply office has read and execution authorities of distributed file information; the rights contents of the different control components are given in table 1:
Figure 77201DEST_PATH_IMAGE001
(3) after the data authority logic information based on the user identification bit ensures that data in the system is monitored and evaluated aiming at different users in effective isolation states, the capacity of looking up and processing different devices is realized respectively according to the identity and the working attribute of the location of the user based on the device authority logic information;
the location identification position of the user comprises 3 types of location identities of the outside/province (region), a power supply bureau to which the monitored equipment belongs, a provincial power grid headquarter and the like.
The user attribution department identification position comprises 5 types of attribution departments, such as non-professional personnel and professional personnel in the field/province (region), a production management department and a production operation and maintenance department of a power supply office to which the monitored equipment belongs, a production management department of the provincial power grid home department and the like.
The working attribute identification bits of the users comprise 6 types of working attributes such as data interaction sources, equipment managers, equipment operation and maintenance personnel, system developers, external visitors and the like. The data interaction source comprises an online monitoring preposed subsystem and other transverse interconnection information systems; the equipment management personnel comprise production command decision personnel, a provincial power grid production equipment management part, a system operation part and a safety supervision part, and a production equipment management part, a system operation part, a safety supervision part, a power transformation management station and a power transmission management station of a power supply bureau; the equipment operation and maintenance personnel comprise a power transformation management station and a power transmission management station of a power supply bureau, a test class, a maintenance patrol class, a power transformation overhaul class, a power transmission overhaul class, a communication class, an automation class and a power science research institute of the power supply bureau; the system operation and maintenance personnel comprise an electric power science research institute and an operator of the system; the system developers comprise a power science research institute, system engineers and a super manager; the alien visitor is a guest.
6. Meanwhile, after the identity identification information of the user is checked, corresponding network application authority is given; specifically, the network application authority of the user is registered, the network application authority of the user is distributed, the network application authority of the user is issued, and the network application authority of the user is verified in sequence, so that the user successfully logs in, is connected with a state monitoring and evaluating system, and applies the corresponding network application authority.
Aiming at the login conditions of different users, the WEB service of the state monitoring and evaluating system adopts a safe WEB network application service supporting HTTPS, and adopts a user identification bit logic combination system of a digital certificate of the power monitoring system to carry out identity authentication and encrypted transmission on the access of a browser client or a server interface; the login conditions of different users comprise access rights, data rights and equipment rights of different users.
With reference to fig. 1, the specific implementation process of the present invention is as follows:
(1) the warning value of hydrogen in the monitoring data of dissolved gas in No. 1 main transformer oil of a 110 kilovolt transformer substation of a power supply office in a certain place is 155 microliter per liter and exceeds the attention value (150 microliter per liter). At this time, a host (IED intelligent component) of the apparatus for monitoring dissolved gas in oil needs to access the state monitoring and evaluation system and write monitoring data. Meanwhile, the relevant affiliation personnel of the No. 1 main transformer need to look up monitoring data and make processing measures.
(2) A host computer (IED intelligent assembly) of the dissolved gas in oil monitoring device initiates a service request to a state monitoring and evaluation system. The state monitoring and evaluating system maintains a mapping relation table of users and applications based on the digital certificate technology of the power monitoring system, the mapping relation table and the digital certificates of the power monitoring system are in a one-to-many relation, and each user can correspond to a plurality of applications.
(3) The state monitoring and evaluating system is used for requesting specific network application corresponding to the dissolved gas monitoring device in the oil through the mapping relation table of the application, and the network application comprises access right and data right. The network application and the user request are in one-to-one mapping relation, and one type of network application corresponds to one type of client user request.
(4) And applying an application service to the component of the state monitoring and evaluation system by the digital certificate of the power monitoring system, finishing accessing a data server of the state monitoring and evaluation system by a host (IED intelligent component) of the dissolved gas monitoring device in oil, and writing monitoring data and alarm information.
(5) When the state monitoring and evaluating system sends a short message of monitoring and warning of dissolved gas in oil of the No. 1 main transformer to equipment operation and maintenance personnel with identities of a power supply office production equipment management part and a power transformation management station, a power supply office test class, an electric power science research institute and the like of a power supply office home location where the No. 1 main transformer is located, the personnel immediately visit the state monitoring and evaluating system, look up monitoring data, evaluate the equipment state by the power transformation management station and make processing measures.
The present invention is not limited to the above-described embodiments, which are merely preferred embodiments of the present invention, and the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (2)

1. A method for identifying network application permission of a state monitoring and evaluating system is characterized by comprising the following steps: the method comprises the following steps:
(1) the access authority logic information of the user identifier is placed in a login connection authentication script of a security control layer of the state monitoring and evaluation system;
(2) the data authority logic information of the user identifier is placed in a data processing authentication script of a safety control layer of the state monitoring and evaluating system;
(3) the distributed file information authority, the data warehouse authority and the database authority in the data authority logic information are placed in calling and reading bottom layer codes in the data processing authentication script;
(4) the equipment authority logic information of the user identifier is placed in a jurisdiction authentication script of a security control layer of the state monitoring and evaluation system;
(5) the access authority logic information, the data authority logic information and the equipment authority logic information of the user identifier are packaged into a user identifier logic combination system through a digital certificate technology of the power monitoring system, and the identity identification information of the user is simultaneously detected according to an identifier logic operation parallel processing algorithm; the identity identification information comprises an attribution authority identity identification, a user attribution department identification and a user work attribute identification;
the identifier logical operation parallel processing algorithm comprises the following specific steps:
1) identifying the access authority of the user based on the access authority logic information of the user identifier, and reading an attribution authority identity identification bit of a user requesting identity authentication client by a security control layer server of the state monitoring and evaluating system;
2) the method comprises the steps that data authority of a user is identified based on data authority logic information of a user identifier, when access authority logic information based on the user identifier ensures that access authentication of the user in a power data network is safe, a security control layer server of the state monitoring and evaluating system reads an attribution authority data application identification bit of a user requesting an identity authentication client side, then distributed file information authority, data warehouse authority and database authority are controlled respectively based on the data authority logic information, and data in the state monitoring and evaluating system are effectively isolated for different users;
3) after the data authority logic information based on the user identifier ensures that data in the state monitoring and evaluation system is effectively isolated for different users, the capacity of looking up and processing different devices is realized respectively according to the identity and the working attribute of the location of the user based on the device authority logic information;
(6) meanwhile, after the identity identification information of the user is checked, corresponding network application authority is given, specifically, the network application authority of the user is registered, distributed, issued and verified in sequence, so that the user successfully logs in, is connected with a state monitoring and evaluating system and applies the corresponding network application authority; aiming at the login conditions of different users, the WEB service of the state monitoring and evaluating system adopts a safe WEB network application service supporting HTTPS, and adopts a user identifier logic combination system of a digital certificate of the power monitoring system to carry out identity authentication and encryption transmission on the access of a browser client or a server interface; the login conditions of different users comprise access rights, data rights and equipment rights of different users.
2. The method for identifying the network application authority of the state monitoring and evaluating system according to claim 1, wherein the method comprises the following steps: before the step (1), the method further comprises the following steps: and deploying a safety control layer server in the state monitoring and evaluating system, and deploying access authority, data authority and equipment authority for screening and configuring users by using a digital certificate technology of the power monitoring system.
CN201710786323.1A 2017-09-04 2017-09-04 Method for identifying network application permission of state monitoring and evaluating system Active CN107465688B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710786323.1A CN107465688B (en) 2017-09-04 2017-09-04 Method for identifying network application permission of state monitoring and evaluating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710786323.1A CN107465688B (en) 2017-09-04 2017-09-04 Method for identifying network application permission of state monitoring and evaluating system

Publications (2)

Publication Number Publication Date
CN107465688A CN107465688A (en) 2017-12-12
CN107465688B true CN107465688B (en) 2020-09-11

Family

ID=60551918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710786323.1A Active CN107465688B (en) 2017-09-04 2017-09-04 Method for identifying network application permission of state monitoring and evaluating system

Country Status (1)

Country Link
CN (1) CN107465688B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108090373A (en) * 2017-12-26 2018-05-29 赤脊山科技(广州)有限公司 A kind of data processing and exploitation total management system
CN109471884A (en) * 2018-09-12 2019-03-15 国网浙江省电力有限公司嘉兴供电公司 The relevant multi-source heterogeneous data processing method of distributed new

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556634A (en) * 2008-04-11 2009-10-14 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102571380A (en) * 2010-12-16 2012-07-11 北京博阳世通信息技术有限公司 Multi-instance GIS platform unified user management method and system
CN104717223A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Data access method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7519813B1 (en) * 2004-08-02 2009-04-14 Network Appliance, Inc. System and method for a sidecar authentication mechanism
CN102149079B (en) * 2010-02-08 2014-01-29 中国移动通信集团公司 Method, device and system for obtaining user identity identifier
CN102571874B (en) * 2010-12-31 2014-08-13 上海可鲁系统软件有限公司 On-line audit method and device in distributed system
CN103078855B (en) * 2012-12-29 2016-07-06 四川长虹电器股份有限公司 A kind of realize equipment access method, Apparatus and system
US9401915B2 (en) * 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556634A (en) * 2008-04-11 2009-10-14 鸿富锦精密工业(深圳)有限公司 Method and system for managing and controlling using authority of external apparatus
CN102571380A (en) * 2010-12-16 2012-07-11 北京博阳世通信息技术有限公司 Multi-instance GIS platform unified user management method and system
CN104717223A (en) * 2015-03-26 2015-06-17 小米科技有限责任公司 Data access method and device

Also Published As

Publication number Publication date
CN107465688A (en) 2017-12-12

Similar Documents

Publication Publication Date Title
CN105430000A (en) Cloud computing security management system
CN106992984A (en) A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN106657011A (en) Business server authorized secure access method
Jha Cybersecurity and confidentiality in smart grid for enhancing sustainability and reliability
Rosic et al. Role-based access control model supporting regional division in smart grid system
CN106603488A (en) Safety system based on power grid statistical data searching method
CN111914234A (en) Data security management method applied to operation and maintenance auditing system
CN107465688B (en) Method for identifying network application permission of state monitoring and evaluating system
Liang et al. Information security monitoring and management method based on big data in the internet of things environment
Wang et al. Secure access method of power internet of things based on zero trust architecture
Gao et al. Research on zero-trust based network security protection for power internet of things
Rahim et al. Cybersecurity vulnerabilities in smart grids with solar photovoltaic: a threat modelling and risk assessment approach
Zhang et al. Design and implementation of IEC61850 communication security protection scheme for smart substation based on bilinear function
Alkaeed et al. Distributed framework via block-chain smart contracts for smart grid systems against cyber-attacks
Yang et al. Research on network security protection technology of energy industry based on blockchain
CN113347202A (en) Account identification management system of centralized account management and control platform
Huang et al. Technology architecture of smart grid information security defense system
Lu et al. Research and Construction of Dynamic Awareness Security Protection Model Based on Security Policy
Wu et al. Cloud platform security protection framework technology
Ye et al. A practical solution to the information security risk evaluation problems in power systems
Yuan et al. A fine-grained access control method based on role permission management
Yingkai et al. Application of Data Encryption Technology in Electric Power Informationization
Li et al. Analysis of the application of IT information platform interconnection in charging infrastructure
Hu et al. Construction of interactive service software based on internet security
Zhan et al. Analysis of Power Grid Security Access Protection Based on Internet Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant