CN109302373A - A kind of method and device for the access of new energy power station communication security - Google Patents

A kind of method and device for the access of new energy power station communication security Download PDF

Info

Publication number
CN109302373A
CN109302373A CN201710611064.9A CN201710611064A CN109302373A CN 109302373 A CN109302373 A CN 109302373A CN 201710611064 A CN201710611064 A CN 201710611064A CN 109302373 A CN109302373 A CN 109302373A
Authority
CN
China
Prior art keywords
access
data point
permission
module
role
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710611064.9A
Other languages
Chinese (zh)
Inventor
黄毕尧
李建岐
白杰
刘韵
穆润根
任建伟
冯永权
朱道华
刘国军
卢利锋
朱朝阳
景栋盛
王震宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Global Energy Interconnection Research Institute, State Grid Jibei Electric Power Co Ltd, Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd, Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710611064.9A priority Critical patent/CN109302373A/en
Publication of CN109302373A publication Critical patent/CN109302373A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention provides a kind of safety method and device suitable for new energy power station communication access, comprising: based on the data point in the role and all kinds of built-in terminals in external system, establishes authority distribution table;According to the permission in authority distribution table, to data point access control.The present invention is based on the safety access methods of Role Dilemma and new energy power station monitoring system layer architecture, and existing electric power monitoring system security mechanism is further extended to inside power station, so that the information communication security for improving new energy power station is horizontal.

Description

A kind of method and device for the access of new energy power station communication security
Technical field
The present invention relates to energy information technical fields, and in particular to a kind of side for the access of new energy power station communication security Method and device.
Background technique
New energy greatly develop be the sustainable development of socio-economy objective requirement, to promote production of energy, consumption Revolution and promotion Ecological Civilization Construction are of great significance.
With the continuous improvement of photovoltaic power generation ratio in non-renewable energy consumption, it is safely operated more and more important.Therefore, Electric system accesses in terms of power grid and relevant secondary protection that higher requirements are also raised to new energy.The power communication of safety Mesh mark is to prevent power telecom network obstruction, interrupt, paralyse or illegally controlled, and prevents from transmitting in power telecom network, store, place The loss of data of reason is revealed or is tampered, it is ensured that the stable operation of power telecom network avoids power grid accident.New energy category In novel communication network service object, it is related to a variety of communication technologys and communication protocols from fieldbus to remote wide area network View, communication network are related to various terminals and operation entity access, and it is high that potential Security Vulnerability leaks wide and risk cruelly.
It is heavy on an equal basis according to the security protection of " Bucket Principle " new energy access communication network, power distribution communication net and backbone communications It wants, but since the development of new energy access communications also belongs to starting stage, the product kind of new energy access device and related management main website Class and production firm are various, and technological disparity is big, the reasons such as communication mode multiplicity, cause the access of new energy in security protection with All there is larger gap in the level that major network reaches.
The photovoltaic plant of new energy power station and wind power plant are except access power station computer monitoring system and power grid in the prior art Dispatching control center, and being used to outside improving information safety using longitudinal encryption device connection, interior system of stand and with outside other The information exchange of system does not account for information security issue still.
Summary of the invention
In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a kind of method of new energy power station communication security access And device.
A kind of method for the access of new energy power station communication security is comprising steps of based on the role in external system and respectively Data point in class built-in terminal establishes authority distribution table;According to the permission in authority distribution table, data point is accessed and is controlled System.
Data point in built-in terminal, comprising: the identity code of built-in terminal, all kinds of embedded monitoring terminal equipment Corresponding sequence number and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Based on the data point in the role and all kinds of built-in terminals in external system, authority distribution table is established, comprising: be Data point in all kinds of built-in terminals of role access in external system distributes permission;By the role in external system, number Authority distribution table is written in the permission of strong point and data point;Permission includes: to check permission, modification authority, increase permission and deletion Permission.
According to the permission in authority distribution table, access control data point, comprising: it is close to carry out state to the communication instruction of permission SM2 algorithm for encryption;Data point in the built-in terminal of role access in external system whether there is in authority distribution table Determined, if it is present allow to access, otherwise denied access.
The permission of access control data point, further includes: mark the read access time of simultaneously storing data point progress access control.
This method further include: the access time and period of data point are set, if the read access time of data point is less than setting Access time then alerts.
A kind of device for the access of new energy power station communication security, comprising: authority distribution table establishes module, for being based on The data point in role and all kinds of built-in terminals in external system, establishes authority distribution table;Access control module is used for root According to the permission in authority distribution table, access control data point.
Authority distribution table establishes the data point in module in all kinds of built-in terminals, including;The identity generation of built-in terminal Code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Authority distribution table establishes module, comprising: authority distribution module, for for all kinds of of the role access in external system Data point in built-in terminal distributes permission;Authority distribution table writing module, for by the role in external system, data point And the authority distribution table is written in the permission of data point;Permission includes: to check permission, modification authority, increase permission and deletion Permission.
Communications access module, for the data point in the built-in terminal to role access in external system whether there is in Determined in authority distribution table, if it is present allow to access, otherwise denied access;Access control module, comprising: encryption Transmission module carries out the close SM2 algorithm for encryption of state for the communication instruction to permission;Communications access module, for external system Data point in the built-in terminal of middle role access whether there is to be determined in authority distribution table, if it is present permitting Perhaps it accesses, otherwise denied access.
Communications access module further include: remote communication module and Local Communication Module;Remote communication module includes: second to connect Mouth 12, third interface 13 and the 4th interface 14;Second interface 12 is used for the after-sale service system of access device manufacturer;Third interface 13 for accessing power grid regulation central computer system through substation computer system;4th interface 14 is for accessing in power plant's O&M Feel concerned about system;Local Communication Module includes: the first interface 11 being connected with built-in terminal.
The device further include: label memory module and alarm module;Memory module is marked, for marking simultaneously storing data point Access the read access time of control;Alarm module, for setting the access time and period of data point, if the reading of data point Time is less than the access time of setting, then alerts.
Compared with the immediate prior art, technical solution provided by the invention is had the advantages that
1. the present invention is based on the safety access methods of Role Dilemma and new energy power station monitoring system layer architecture, existing Electric power monitoring system security mechanism further extends to inside power station, to improve the information communication security water of new energy power station It is flat;
2. safety access device of the invention has 4 class communication interfaces, and its function is changed to station communication gateway, every class Communication interface contains different security mechanisms, and effectively realizing both can quickly carry out real-time intelligent protection, can also remove virus and Low consumed function drops in garbage files etc.;
3. the device that the present invention establishes not only has carried out three-dimensional, depth and dynamic protection to network, but also collects abnormal row It for event-monitoring, detection, killing virus, blocks defensive attack and multiple-protection in one, realizes real time intelligent control, detection The system and device that analysis and Prevention-Security virus and attack are integrated.
Detailed description of the invention
Fig. 1 is the method design flow diagram of the embodiment of the present invention;
Fig. 2 is application system schematic diagram of the invention;
Fig. 3 is safe interface schematic diagram of the invention;
Fig. 4 is the schematic illustration of apparatus of the present invention.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
As shown in Figure 1, safety access method provided by the invention the following steps are included:
Step 1: all kinds of embedded monitoring terminal registrations generate unique identity code in the Resources list;
All kinds of embedded monitoring terminal registrations, generate unique identity code, as long as that is, each equipment object in the Resources list It is different to manage object, then needs to configure unique identity code.
Station built-in type terminal is generated when being registered for the first time by built-in terminal has unique identity code in access device, right RFID mark of the identity code, plant equipment sequence number and equipment etc. establishes mapping relations, and carries out to mapping database standby Part, the address of the status code and access device is bound, and power station device object list capable of making remote access is generated.
Embedded monitoring terminal includes: the gird-connected inverter of photovoltaic plant, the controller of fan of wind power plant and wind speed, wind To, sun solar radiation, all kinds of temperature sensors etc., these monitor terminals and access device communication, communication mode includes light Fiber communication, power line carrier communication, wireless communication and cable communication etc..
Step 2: construction is towards embedded monitoring terminal the Resources list, to the authority distribution of external system building based role Table;
Construction is towards embedded monitoring terminal the Resources list, and resource includes two parts of object and attribute, and wherein object refers to Whether resource name, attribute include the data point that object has and can be operated by external system.Such as: object G1 includes data point G11, G12, G1m, each role and when read the operation such as data to each data point need to be associated and recognize with object G1 in advance Card, and at least need to realize and obtain G1 unique identity code.
The operation that external system can carry out includes: to read data, modification data, increase data and delete data.
External system is logically divided into 4 class systems, it may be assumed that the power grid regulation central computer system of grid company, new energy Source power station remote operational system, the after-sale service system and substation computer system of equipment company.
As shown in Fig. 2, the system that can be applied the invention to from a safety viewpoint is divided into master station computer system, substation meter Calculation machine system, embedded monitoring terminal and physical facility equipment.
Wherein, master station computer system includes 3 class roles in external system: the power grid regulation center calculation of grid company Machine system, new energy power station novel maintenance system and equipment company's after-sale service system.
Substation station computer system includes: Automatic Generation Control, automatism voltage control, equipment condition monitoring and power generation prediction Etc. systems.
Embedded monitoring terminal includes: fan monitoring terminal, inverter, status monitoring terminal, weather monitoring terminal and temperature Degree monitoring terminal etc..
Physical equipment facility includes: blower, photovoltaic module, electric power primary equipment (transformer, breaker, reactive compensation etc. Equipment) and other live electric power facilities such as cable, cable termination, switchgear.
Based role accesses control to station built-in type terminal, and obtained corresponding relationship is as shown in the table:
Step 3: being accessed control according to the authority distribution of based role;
Central processor CPU controls Local Communication Module and remote communication module and visits the hardware of secure accessing control module It asks, access control is accessed based on data point of the permission in authority distribution table to object in role, and data point is stored in peace In full access control module.
External system access access device, which needs to be no more than, regularly updates an access password for 1 day, and is calculated using the close SM2 of state Method carries out encrypted transmission to permissions data.
Communication security access controller as shown in Figure 3, i.e., access device of the invention, including 4 class interfaces: with interior office of standing The interface 11 of domain Network Communication, the interface 13 communicated with substation computer system, the interface communicated with new energy power station novel maintenance 14, the interface 12 communicated with device manufacturer.
Local area network communication interface 11, i.e. first interface in standing mainly pass through optical fiber, power line carrier, wireless, cable etc. Various ways are communicated with interior various embedded monitoring terminals of standing, and communication can encrypt.If using station communication terminal and power train It is communicated between system dispatching control center, it is necessary to use fiber optic communication.
Device manufacturer's communication interface 12, i.e. second interface are communication security access controller and the communication of equipment manufacturer, master If requiring transmission device state of health data according to producer, producer's lean equipment management is supported, promotes power station operational safety Property and the service life, the interface support public network communication, can pass through the skill upgradings such as HTTPS, SSL, IPsec safety;
Substation computer system communication interface 13, i.e. third interface are communication security access controller and substation computer System communication, according to electric power monitoring system security protection specification, system security partitioning is divided into production control great Qu and management information Great Qu;The security strategy that the interface can support different subregions different.
New energy power station novel maintenance interface 14, i.e. the 4th interface are that communication security access controller and power station manufacturer are logical Letter is convenient for power station remote O&M;The interface supports public network communication, can pass through the skill upgradings such as HTTPS, SSL, IPsec safety.
Step 4: record access data flow token simultaneously stores.
After marking and storing all access record progress times, data point access time and period are set, such as certain The read access time of a data cannot be less than 5 minutes etc., otherwise alarm prompt Power Plant Monitoring operations staff.
Communication security access controller schematic illustration as shown in Figure 4, local (in standing) communication interface modules communicate skill Art, including wireless communication, fiber optic communication and carrier communication etc., and configure the modulation /demodulation module of relevant art system, corresponding diagram 3 Middle interface 11, interface 12, interface 13, interface 14 in remote communication module corresponding diagram 3.
Central processor CPU is developed using Industry Control embedded module;Secure accessing control module set is at of the invention Cut-in method simultaneously constantly refreshes the database being locally stored by flash memory.
Based on the same inventive concept, the present invention also provides it is a kind of for new energy power station communication security access device, It is illustrated below.
Device provided by the invention includes: that authority distribution table establishes module, for based on the role in external system and respectively Data point in class built-in terminal establishes authority distribution table;Access control module, for according to the power in authority distribution table Limit, access control data point.
Authority distribution table establishes the data point in module in all kinds of built-in terminals, including;The identity generation of built-in terminal Code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Authority distribution table establishes module, comprising: authority distribution module, for for all kinds of of the role access in external system Data point in built-in terminal distributes permission;Authority distribution table writing module, for by the role in external system, data point And authority distribution table is written in the permission of data point;Permission includes: to check permission, modification authority, increase permission and delete permission.
Communications access module, for the data point in the built-in terminal to role access in external system whether there is in Determined in authority distribution table, if it is present allow to access, otherwise denied access;
Encrypted transmission carries out the close SM2 algorithm for encryption of state for the communication instruction to permission;Access control module, comprising: logical Believe access modules, whether there is for the data point in the built-in terminal to role access in external system in authority distribution table In determined, if it is present allow to access, otherwise denied access;And regularly update the access of external system access object Password.
Communications access module further include: remote communication module and Local Communication Module;Remote communication module includes: second to connect Mouth 12, third interface 13 and the 4th interface 14;The after-sale service system of the access device manufacturer of second interface 12;Third interface 13 For accessing power grid regulation central computer system through substation computer system;4th interface 14 is for accessing power plant's Operation and Maintenance Center System;Local Communication Module includes: the first interface 11 being connected with built-in terminal.
The device further include: label memory module and alarm module;Memory module is marked, for marking simultaneously storing data point Access the read access time of control;Alarm module, for setting the access time and period of data point, if the reading of data point Time is less than the access time of setting, then alerts.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices.
Finally it should be noted that: the above embodiments are merely illustrative of the technical scheme of the present invention and are not intended to be limiting thereof, institute The those of ordinary skill in category field can still modify to a specific embodiment of the invention referring to above-described embodiment or Equivalent replacement, these are applying for this pending hair without departing from any modification of spirit and scope of the invention or equivalent replacement Within bright claims.

Claims (14)

1. a kind of method for the access of new energy power station communication security, which is characterized in that comprising steps of
Based on the data point in the role and all kinds of built-in terminals in external system, authority distribution table is established;
And according to the permission in the authority distribution table, access control to the data point.
2. the method according to claim 1, wherein the data point in all kinds of built-in terminals, comprising: institute State the identity code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark of built-in terminal.
3. the method according to claim 1, wherein the role of the external system includes: the electricity of grid company Net regulation central computer system, power plant's Operation and Maintenance Center system of genco, the after-sale service system of equipment company and substation Computer system.
4. the method according to claim 1, wherein the role based in external system and all kinds of embedded Data point in terminal establishes authority distribution table, comprising:
Permission is distributed for the data point in all kinds of built-in terminals of the role access in the external system;
By the permission write-in authority distribution table of role, the data point and the data point in the external system;
The permission includes: to check permission, modification authority, increase permission and delete permission.
5. according to claim 1 to method either described in 4, which is characterized in that the power according in the authority distribution table Limit accesses control to the data point, comprising:
The close SM2 algorithm for encryption of state is carried out to the communication instruction of the permission;
Data point in the built-in terminal of role access in the external system whether there is in the authority distribution Determined in table, if it is present allow to access, otherwise denied access.
6. the method according to claim 1, wherein described access control to the data point, further includes: It marks and stores the data point and access the read access time of control.
7. according to the method described in claim 6, it is characterized by further comprising: setting the access time and week of the data point Phase alerts if the read access time of the data point is less than the access time of setting.
8. a kind of device for the access of new energy power station communication security characterized by comprising
Authority distribution table establishes module, for building based on the data point in the role and all kinds of built-in terminals in external system Write limits allocation table;
Access control module, for according to the permission in the authority distribution table, data point described in access control.
9. device according to claim 8, which is characterized in that the authority distribution table establishes all kinds of embedded ends in module Data point in end, including;
The identity code of the built-in terminal, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark Know.
10. device according to claim 8, which is characterized in that the role of the external system includes: the electricity of grid company Net regulation central computer system, power plant's Operation and Maintenance Center system of genco, the after-sale service system of equipment company and substation Computer system.
11. device according to claim 8, which is characterized in that the authority distribution table establishes module, comprising:
Authority distribution module, for the data point in all kinds of built-in terminals for the role access in the external system Distribute permission;
Authority distribution table writing module, for by the role in the external system, the data point and the data point The authority distribution table is written in permission;
The permission includes: to check permission, modification authority, increase permission and delete permission.
12. according to any device described in claim 8-11, which is characterized in that the access control module, comprising:
Encrypted transmission module carries out the close SM2 algorithm for encryption of state for the communication instruction to the permission;
Whether communications access module deposits for the data point in the built-in terminal to role access in the external system It is to be determined in the authority distribution table, if it is present allow to access, otherwise denied access.
13. device according to claim 12, which is characterized in that the communications access module further include: telecommunication mould Block and Local Communication Module;
The remote communication module includes: second interface (12), third interface (13) and the 4th interface (14);
The second interface (12) is used to access the after-sale service system of the device manufacturer;
The third interface (13) is used to access the power grid regulation central computer system through the substation computer system;
4th interface (14) is for accessing power plant's Operation and Maintenance Center system;
The Local Communication Module includes: for accessing the connected first interface (11) of the built-in terminal.
14. device according to claim 8, which is characterized in that described device further include: label memory module and alarm mould Block;
The label memory module accesses the read access time of control for marking and storing the data point;
The alarm module, for setting the access time and period of the data point, if the read access time of the data point is small In the access time of setting, then alert.
CN201710611064.9A 2017-07-25 2017-07-25 A kind of method and device for the access of new energy power station communication security Pending CN109302373A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710611064.9A CN109302373A (en) 2017-07-25 2017-07-25 A kind of method and device for the access of new energy power station communication security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710611064.9A CN109302373A (en) 2017-07-25 2017-07-25 A kind of method and device for the access of new energy power station communication security

Publications (1)

Publication Number Publication Date
CN109302373A true CN109302373A (en) 2019-02-01

Family

ID=65167898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710611064.9A Pending CN109302373A (en) 2017-07-25 2017-07-25 A kind of method and device for the access of new energy power station communication security

Country Status (1)

Country Link
CN (1) CN109302373A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112365190A (en) * 2019-11-26 2021-02-12 国网江苏省电力有限公司南通供电分公司 Working method of cross-regional clean energy Internet system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960252A (en) * 2006-06-30 2007-05-09 南京联创科技股份有限公司 Multidimension object access control method based on roles
US20120266209A1 (en) * 2012-06-11 2012-10-18 David Jeffrey Gooding Method of Secure Electric Power Grid Operations Using Common Cyber Security Services
CN102904892A (en) * 2012-10-17 2013-01-30 浪潮(北京)电子信息产业有限公司 Security model and security strategy of cloud computing data center operating system
CN106532951A (en) * 2016-12-05 2017-03-22 国网湖北省电力公司咸宁供电公司 Transformer substation monitoring system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960252A (en) * 2006-06-30 2007-05-09 南京联创科技股份有限公司 Multidimension object access control method based on roles
US20120266209A1 (en) * 2012-06-11 2012-10-18 David Jeffrey Gooding Method of Secure Electric Power Grid Operations Using Common Cyber Security Services
CN102904892A (en) * 2012-10-17 2013-01-30 浪潮(北京)电子信息产业有限公司 Security model and security strategy of cloud computing data center operating system
CN106532951A (en) * 2016-12-05 2017-03-22 国网湖北省电力公司咸宁供电公司 Transformer substation monitoring system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112365190A (en) * 2019-11-26 2021-02-12 国网江苏省电力有限公司南通供电分公司 Working method of cross-regional clean energy Internet system
CN112365190B (en) * 2019-11-26 2021-09-10 国网江苏省电力有限公司南通供电分公司 Working method of cross-regional clean energy Internet system

Similar Documents

Publication Publication Date Title
CN104168268B (en) A kind of power network object access control apparatus that can realize grid model data security configuration and access
CN102938098A (en) Power grid operation manner expert system
CN106557316A (en) Based on 61850 site protective relaying device menu modeling method
CN110401528B (en) Key management method for field bus channel encryption equipment
CN109302373A (en) A kind of method and device for the access of new energy power station communication security
CN114281790A (en) Multi-type load resource aggregator access system and method
CN111212105A (en) Remote safe transmission method and system for wind and light storage data
ES2435476T3 (en) Measurement infrastructure smart cards
CN102915409B (en) A kind of software being applied to electric energy meter is put on record and comparison instrument and its implementation
CN103854145A (en) Verification rule base based production energy data processing system
US20220337599A1 (en) Systems and techniques for smart demand side response using data plane architecture
Pindoriya et al. Infrastructure security for smart electric grids: A survey
KR20130067093A (en) Smart meter for protection of privacy and method for controlling memory tereof
CN105447653A (en) Model-based power business information resource coding method
Kamphuis et al. DREAM: An ICT architecture framework for heterarchical coordination in power systems
Onawola et al. A Conceptual Model for Mitigating Security Vulnerabilities in IoT-Based Smart Grid Electric Energy Distribution Systems
CN111105310A (en) Distributed power generation transaction system and method
Kleineidam et al. The Cellular Approach-Security of Micro Smart Grids
Wang et al. Three‐stage robust voltage/var optimal control of wind farms at multiple time scales
Gui et al. Economic dispatch for wind farm using model predictive control method
US20230216601A1 (en) Systems and methods for coarse wavelength division multiplexing premise level data communication
CN207083107U (en) Integrated security manages interchanger
Jiang The Appliance of BOP Auxiliary System Centralized Control Network in Nuclear Power Plant
CN207427190U (en) The discrete safety management interchanger of power supply
Shan et al. Siting and sizing of distributed generation and electric vehicle charging station under active management mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190201