CN109302373A - A kind of method and device for the access of new energy power station communication security - Google Patents
A kind of method and device for the access of new energy power station communication security Download PDFInfo
- Publication number
- CN109302373A CN109302373A CN201710611064.9A CN201710611064A CN109302373A CN 109302373 A CN109302373 A CN 109302373A CN 201710611064 A CN201710611064 A CN 201710611064A CN 109302373 A CN109302373 A CN 109302373A
- Authority
- CN
- China
- Prior art keywords
- access
- data point
- permission
- module
- role
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 77
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000009826 distribution Methods 0.000 claims abstract description 46
- 238000012544 monitoring process Methods 0.000 claims abstract description 26
- 238000012986 modification Methods 0.000 claims description 7
- 230000004048 modification Effects 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004422 calculation algorithm Methods 0.000 claims description 5
- 230000005611 electricity Effects 0.000 claims 2
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 6
- 241000700605 Viruses Species 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000010248 power generation Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 206010003830 Automatism Diseases 0.000 description 1
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The present invention provides a kind of safety method and device suitable for new energy power station communication access, comprising: based on the data point in the role and all kinds of built-in terminals in external system, establishes authority distribution table;According to the permission in authority distribution table, to data point access control.The present invention is based on the safety access methods of Role Dilemma and new energy power station monitoring system layer architecture, and existing electric power monitoring system security mechanism is further extended to inside power station, so that the information communication security for improving new energy power station is horizontal.
Description
Technical field
The present invention relates to energy information technical fields, and in particular to a kind of side for the access of new energy power station communication security
Method and device.
Background technique
New energy greatly develop be the sustainable development of socio-economy objective requirement, to promote production of energy, consumption
Revolution and promotion Ecological Civilization Construction are of great significance.
With the continuous improvement of photovoltaic power generation ratio in non-renewable energy consumption, it is safely operated more and more important.Therefore,
Electric system accesses in terms of power grid and relevant secondary protection that higher requirements are also raised to new energy.The power communication of safety
Mesh mark is to prevent power telecom network obstruction, interrupt, paralyse or illegally controlled, and prevents from transmitting in power telecom network, store, place
The loss of data of reason is revealed or is tampered, it is ensured that the stable operation of power telecom network avoids power grid accident.New energy category
In novel communication network service object, it is related to a variety of communication technologys and communication protocols from fieldbus to remote wide area network
View, communication network are related to various terminals and operation entity access, and it is high that potential Security Vulnerability leaks wide and risk cruelly.
It is heavy on an equal basis according to the security protection of " Bucket Principle " new energy access communication network, power distribution communication net and backbone communications
It wants, but since the development of new energy access communications also belongs to starting stage, the product kind of new energy access device and related management main website
Class and production firm are various, and technological disparity is big, the reasons such as communication mode multiplicity, cause the access of new energy in security protection with
All there is larger gap in the level that major network reaches.
The photovoltaic plant of new energy power station and wind power plant are except access power station computer monitoring system and power grid in the prior art
Dispatching control center, and being used to outside improving information safety using longitudinal encryption device connection, interior system of stand and with outside other
The information exchange of system does not account for information security issue still.
Summary of the invention
In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a kind of method of new energy power station communication security access
And device.
A kind of method for the access of new energy power station communication security is comprising steps of based on the role in external system and respectively
Data point in class built-in terminal establishes authority distribution table;According to the permission in authority distribution table, data point is accessed and is controlled
System.
Data point in built-in terminal, comprising: the identity code of built-in terminal, all kinds of embedded monitoring terminal equipment
Corresponding sequence number and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco
Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Based on the data point in the role and all kinds of built-in terminals in external system, authority distribution table is established, comprising: be
Data point in all kinds of built-in terminals of role access in external system distributes permission;By the role in external system, number
Authority distribution table is written in the permission of strong point and data point;Permission includes: to check permission, modification authority, increase permission and deletion
Permission.
According to the permission in authority distribution table, access control data point, comprising: it is close to carry out state to the communication instruction of permission
SM2 algorithm for encryption;Data point in the built-in terminal of role access in external system whether there is in authority distribution table
Determined, if it is present allow to access, otherwise denied access.
The permission of access control data point, further includes: mark the read access time of simultaneously storing data point progress access control.
This method further include: the access time and period of data point are set, if the read access time of data point is less than setting
Access time then alerts.
A kind of device for the access of new energy power station communication security, comprising: authority distribution table establishes module, for being based on
The data point in role and all kinds of built-in terminals in external system, establishes authority distribution table;Access control module is used for root
According to the permission in authority distribution table, access control data point.
Authority distribution table establishes the data point in module in all kinds of built-in terminals, including;The identity generation of built-in terminal
Code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco
Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Authority distribution table establishes module, comprising: authority distribution module, for for all kinds of of the role access in external system
Data point in built-in terminal distributes permission;Authority distribution table writing module, for by the role in external system, data point
And the authority distribution table is written in the permission of data point;Permission includes: to check permission, modification authority, increase permission and deletion
Permission.
Communications access module, for the data point in the built-in terminal to role access in external system whether there is in
Determined in authority distribution table, if it is present allow to access, otherwise denied access;Access control module, comprising: encryption
Transmission module carries out the close SM2 algorithm for encryption of state for the communication instruction to permission;Communications access module, for external system
Data point in the built-in terminal of middle role access whether there is to be determined in authority distribution table, if it is present permitting
Perhaps it accesses, otherwise denied access.
Communications access module further include: remote communication module and Local Communication Module;Remote communication module includes: second to connect
Mouth 12, third interface 13 and the 4th interface 14;Second interface 12 is used for the after-sale service system of access device manufacturer;Third interface
13 for accessing power grid regulation central computer system through substation computer system;4th interface 14 is for accessing in power plant's O&M
Feel concerned about system;Local Communication Module includes: the first interface 11 being connected with built-in terminal.
The device further include: label memory module and alarm module;Memory module is marked, for marking simultaneously storing data point
Access the read access time of control;Alarm module, for setting the access time and period of data point, if the reading of data point
Time is less than the access time of setting, then alerts.
Compared with the immediate prior art, technical solution provided by the invention is had the advantages that
1. the present invention is based on the safety access methods of Role Dilemma and new energy power station monitoring system layer architecture, existing
Electric power monitoring system security mechanism further extends to inside power station, to improve the information communication security water of new energy power station
It is flat;
2. safety access device of the invention has 4 class communication interfaces, and its function is changed to station communication gateway, every class
Communication interface contains different security mechanisms, and effectively realizing both can quickly carry out real-time intelligent protection, can also remove virus and
Low consumed function drops in garbage files etc.;
3. the device that the present invention establishes not only has carried out three-dimensional, depth and dynamic protection to network, but also collects abnormal row
It for event-monitoring, detection, killing virus, blocks defensive attack and multiple-protection in one, realizes real time intelligent control, detection
The system and device that analysis and Prevention-Security virus and attack are integrated.
Detailed description of the invention
Fig. 1 is the method design flow diagram of the embodiment of the present invention;
Fig. 2 is application system schematic diagram of the invention;
Fig. 3 is safe interface schematic diagram of the invention;
Fig. 4 is the schematic illustration of apparatus of the present invention.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
As shown in Figure 1, safety access method provided by the invention the following steps are included:
Step 1: all kinds of embedded monitoring terminal registrations generate unique identity code in the Resources list;
All kinds of embedded monitoring terminal registrations, generate unique identity code, as long as that is, each equipment object in the Resources list
It is different to manage object, then needs to configure unique identity code.
Station built-in type terminal is generated when being registered for the first time by built-in terminal has unique identity code in access device, right
RFID mark of the identity code, plant equipment sequence number and equipment etc. establishes mapping relations, and carries out to mapping database standby
Part, the address of the status code and access device is bound, and power station device object list capable of making remote access is generated.
Embedded monitoring terminal includes: the gird-connected inverter of photovoltaic plant, the controller of fan of wind power plant and wind speed, wind
To, sun solar radiation, all kinds of temperature sensors etc., these monitor terminals and access device communication, communication mode includes light
Fiber communication, power line carrier communication, wireless communication and cable communication etc..
Step 2: construction is towards embedded monitoring terminal the Resources list, to the authority distribution of external system building based role
Table;
Construction is towards embedded monitoring terminal the Resources list, and resource includes two parts of object and attribute, and wherein object refers to
Whether resource name, attribute include the data point that object has and can be operated by external system.Such as: object G1 includes data point
G11, G12, G1m, each role and when read the operation such as data to each data point need to be associated and recognize with object G1 in advance
Card, and at least need to realize and obtain G1 unique identity code.
The operation that external system can carry out includes: to read data, modification data, increase data and delete data.
External system is logically divided into 4 class systems, it may be assumed that the power grid regulation central computer system of grid company, new energy
Source power station remote operational system, the after-sale service system and substation computer system of equipment company.
As shown in Fig. 2, the system that can be applied the invention to from a safety viewpoint is divided into master station computer system, substation meter
Calculation machine system, embedded monitoring terminal and physical facility equipment.
Wherein, master station computer system includes 3 class roles in external system: the power grid regulation center calculation of grid company
Machine system, new energy power station novel maintenance system and equipment company's after-sale service system.
Substation station computer system includes: Automatic Generation Control, automatism voltage control, equipment condition monitoring and power generation prediction
Etc. systems.
Embedded monitoring terminal includes: fan monitoring terminal, inverter, status monitoring terminal, weather monitoring terminal and temperature
Degree monitoring terminal etc..
Physical equipment facility includes: blower, photovoltaic module, electric power primary equipment (transformer, breaker, reactive compensation etc.
Equipment) and other live electric power facilities such as cable, cable termination, switchgear.
Based role accesses control to station built-in type terminal, and obtained corresponding relationship is as shown in the table:
Step 3: being accessed control according to the authority distribution of based role;
Central processor CPU controls Local Communication Module and remote communication module and visits the hardware of secure accessing control module
It asks, access control is accessed based on data point of the permission in authority distribution table to object in role, and data point is stored in peace
In full access control module.
External system access access device, which needs to be no more than, regularly updates an access password for 1 day, and is calculated using the close SM2 of state
Method carries out encrypted transmission to permissions data.
Communication security access controller as shown in Figure 3, i.e., access device of the invention, including 4 class interfaces: with interior office of standing
The interface 11 of domain Network Communication, the interface 13 communicated with substation computer system, the interface communicated with new energy power station novel maintenance
14, the interface 12 communicated with device manufacturer.
Local area network communication interface 11, i.e. first interface in standing mainly pass through optical fiber, power line carrier, wireless, cable etc.
Various ways are communicated with interior various embedded monitoring terminals of standing, and communication can encrypt.If using station communication terminal and power train
It is communicated between system dispatching control center, it is necessary to use fiber optic communication.
Device manufacturer's communication interface 12, i.e. second interface are communication security access controller and the communication of equipment manufacturer, master
If requiring transmission device state of health data according to producer, producer's lean equipment management is supported, promotes power station operational safety
Property and the service life, the interface support public network communication, can pass through the skill upgradings such as HTTPS, SSL, IPsec safety;
Substation computer system communication interface 13, i.e. third interface are communication security access controller and substation computer
System communication, according to electric power monitoring system security protection specification, system security partitioning is divided into production control great Qu and management information
Great Qu;The security strategy that the interface can support different subregions different.
New energy power station novel maintenance interface 14, i.e. the 4th interface are that communication security access controller and power station manufacturer are logical
Letter is convenient for power station remote O&M;The interface supports public network communication, can pass through the skill upgradings such as HTTPS, SSL, IPsec safety.
Step 4: record access data flow token simultaneously stores.
After marking and storing all access record progress times, data point access time and period are set, such as certain
The read access time of a data cannot be less than 5 minutes etc., otherwise alarm prompt Power Plant Monitoring operations staff.
Communication security access controller schematic illustration as shown in Figure 4, local (in standing) communication interface modules communicate skill
Art, including wireless communication, fiber optic communication and carrier communication etc., and configure the modulation /demodulation module of relevant art system, corresponding diagram 3
Middle interface 11, interface 12, interface 13, interface 14 in remote communication module corresponding diagram 3.
Central processor CPU is developed using Industry Control embedded module;Secure accessing control module set is at of the invention
Cut-in method simultaneously constantly refreshes the database being locally stored by flash memory.
Based on the same inventive concept, the present invention also provides it is a kind of for new energy power station communication security access device,
It is illustrated below.
Device provided by the invention includes: that authority distribution table establishes module, for based on the role in external system and respectively
Data point in class built-in terminal establishes authority distribution table;Access control module, for according to the power in authority distribution table
Limit, access control data point.
Authority distribution table establishes the data point in module in all kinds of built-in terminals, including;The identity generation of built-in terminal
Code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark.
The role of external system includes: the power grid regulation central computer system of grid company, power plant's fortune of genco
Fibrillar center's system, the after-sale service system and substation computer system of equipment company.
Authority distribution table establishes module, comprising: authority distribution module, for for all kinds of of the role access in external system
Data point in built-in terminal distributes permission;Authority distribution table writing module, for by the role in external system, data point
And authority distribution table is written in the permission of data point;Permission includes: to check permission, modification authority, increase permission and delete permission.
Communications access module, for the data point in the built-in terminal to role access in external system whether there is in
Determined in authority distribution table, if it is present allow to access, otherwise denied access;
Encrypted transmission carries out the close SM2 algorithm for encryption of state for the communication instruction to permission;Access control module, comprising: logical
Believe access modules, whether there is for the data point in the built-in terminal to role access in external system in authority distribution table
In determined, if it is present allow to access, otherwise denied access;And regularly update the access of external system access object
Password.
Communications access module further include: remote communication module and Local Communication Module;Remote communication module includes: second to connect
Mouth 12, third interface 13 and the 4th interface 14;The after-sale service system of the access device manufacturer of second interface 12;Third interface 13
For accessing power grid regulation central computer system through substation computer system;4th interface 14 is for accessing power plant's Operation and Maintenance Center
System;Local Communication Module includes: the first interface 11 being connected with built-in terminal.
The device further include: label memory module and alarm module;Memory module is marked, for marking simultaneously storing data point
Access the read access time of control;Alarm module, for setting the access time and period of data point, if the reading of data point
Time is less than the access time of setting, then alerts.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices.
Finally it should be noted that: the above embodiments are merely illustrative of the technical scheme of the present invention and are not intended to be limiting thereof, institute
The those of ordinary skill in category field can still modify to a specific embodiment of the invention referring to above-described embodiment or
Equivalent replacement, these are applying for this pending hair without departing from any modification of spirit and scope of the invention or equivalent replacement
Within bright claims.
Claims (14)
1. a kind of method for the access of new energy power station communication security, which is characterized in that comprising steps of
Based on the data point in the role and all kinds of built-in terminals in external system, authority distribution table is established;
And according to the permission in the authority distribution table, access control to the data point.
2. the method according to claim 1, wherein the data point in all kinds of built-in terminals, comprising: institute
State the identity code, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark of built-in terminal.
3. the method according to claim 1, wherein the role of the external system includes: the electricity of grid company
Net regulation central computer system, power plant's Operation and Maintenance Center system of genco, the after-sale service system of equipment company and substation
Computer system.
4. the method according to claim 1, wherein the role based in external system and all kinds of embedded
Data point in terminal establishes authority distribution table, comprising:
Permission is distributed for the data point in all kinds of built-in terminals of the role access in the external system;
By the permission write-in authority distribution table of role, the data point and the data point in the external system;
The permission includes: to check permission, modification authority, increase permission and delete permission.
5. according to claim 1 to method either described in 4, which is characterized in that the power according in the authority distribution table
Limit accesses control to the data point, comprising:
The close SM2 algorithm for encryption of state is carried out to the communication instruction of the permission;
Data point in the built-in terminal of role access in the external system whether there is in the authority distribution
Determined in table, if it is present allow to access, otherwise denied access.
6. the method according to claim 1, wherein described access control to the data point, further includes:
It marks and stores the data point and access the read access time of control.
7. according to the method described in claim 6, it is characterized by further comprising: setting the access time and week of the data point
Phase alerts if the read access time of the data point is less than the access time of setting.
8. a kind of device for the access of new energy power station communication security characterized by comprising
Authority distribution table establishes module, for building based on the data point in the role and all kinds of built-in terminals in external system
Write limits allocation table;
Access control module, for according to the permission in the authority distribution table, data point described in access control.
9. device according to claim 8, which is characterized in that the authority distribution table establishes all kinds of embedded ends in module
Data point in end, including;
The identity code of the built-in terminal, the corresponding sequence number of all kinds of embedded monitoring terminal equipment and RFID mark
Know.
10. device according to claim 8, which is characterized in that the role of the external system includes: the electricity of grid company
Net regulation central computer system, power plant's Operation and Maintenance Center system of genco, the after-sale service system of equipment company and substation
Computer system.
11. device according to claim 8, which is characterized in that the authority distribution table establishes module, comprising:
Authority distribution module, for the data point in all kinds of built-in terminals for the role access in the external system
Distribute permission;
Authority distribution table writing module, for by the role in the external system, the data point and the data point
The authority distribution table is written in permission;
The permission includes: to check permission, modification authority, increase permission and delete permission.
12. according to any device described in claim 8-11, which is characterized in that the access control module, comprising:
Encrypted transmission module carries out the close SM2 algorithm for encryption of state for the communication instruction to the permission;
Whether communications access module deposits for the data point in the built-in terminal to role access in the external system
It is to be determined in the authority distribution table, if it is present allow to access, otherwise denied access.
13. device according to claim 12, which is characterized in that the communications access module further include: telecommunication mould
Block and Local Communication Module;
The remote communication module includes: second interface (12), third interface (13) and the 4th interface (14);
The second interface (12) is used to access the after-sale service system of the device manufacturer;
The third interface (13) is used to access the power grid regulation central computer system through the substation computer system;
4th interface (14) is for accessing power plant's Operation and Maintenance Center system;
The Local Communication Module includes: for accessing the connected first interface (11) of the built-in terminal.
14. device according to claim 8, which is characterized in that described device further include: label memory module and alarm mould
Block;
The label memory module accesses the read access time of control for marking and storing the data point;
The alarm module, for setting the access time and period of the data point, if the read access time of the data point is small
In the access time of setting, then alert.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710611064.9A CN109302373A (en) | 2017-07-25 | 2017-07-25 | A kind of method and device for the access of new energy power station communication security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710611064.9A CN109302373A (en) | 2017-07-25 | 2017-07-25 | A kind of method and device for the access of new energy power station communication security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109302373A true CN109302373A (en) | 2019-02-01 |
Family
ID=65167898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710611064.9A Pending CN109302373A (en) | 2017-07-25 | 2017-07-25 | A kind of method and device for the access of new energy power station communication security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109302373A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112365190A (en) * | 2019-11-26 | 2021-02-12 | 国网江苏省电力有限公司南通供电分公司 | Working method of cross-regional clean energy Internet system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960252A (en) * | 2006-06-30 | 2007-05-09 | 南京联创科技股份有限公司 | Multidimension object access control method based on roles |
US20120266209A1 (en) * | 2012-06-11 | 2012-10-18 | David Jeffrey Gooding | Method of Secure Electric Power Grid Operations Using Common Cyber Security Services |
CN102904892A (en) * | 2012-10-17 | 2013-01-30 | 浪潮(北京)电子信息产业有限公司 | Security model and security strategy of cloud computing data center operating system |
CN106532951A (en) * | 2016-12-05 | 2017-03-22 | 国网湖北省电力公司咸宁供电公司 | Transformer substation monitoring system |
-
2017
- 2017-07-25 CN CN201710611064.9A patent/CN109302373A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960252A (en) * | 2006-06-30 | 2007-05-09 | 南京联创科技股份有限公司 | Multidimension object access control method based on roles |
US20120266209A1 (en) * | 2012-06-11 | 2012-10-18 | David Jeffrey Gooding | Method of Secure Electric Power Grid Operations Using Common Cyber Security Services |
CN102904892A (en) * | 2012-10-17 | 2013-01-30 | 浪潮(北京)电子信息产业有限公司 | Security model and security strategy of cloud computing data center operating system |
CN106532951A (en) * | 2016-12-05 | 2017-03-22 | 国网湖北省电力公司咸宁供电公司 | Transformer substation monitoring system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112365190A (en) * | 2019-11-26 | 2021-02-12 | 国网江苏省电力有限公司南通供电分公司 | Working method of cross-regional clean energy Internet system |
CN112365190B (en) * | 2019-11-26 | 2021-09-10 | 国网江苏省电力有限公司南通供电分公司 | Working method of cross-regional clean energy Internet system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104168268B (en) | A kind of power network object access control apparatus that can realize grid model data security configuration and access | |
CN102938098A (en) | Power grid operation manner expert system | |
CN106557316A (en) | Based on 61850 site protective relaying device menu modeling method | |
CN110401528B (en) | Key management method for field bus channel encryption equipment | |
CN109302373A (en) | A kind of method and device for the access of new energy power station communication security | |
CN114281790A (en) | Multi-type load resource aggregator access system and method | |
CN111212105A (en) | Remote safe transmission method and system for wind and light storage data | |
ES2435476T3 (en) | Measurement infrastructure smart cards | |
CN102915409B (en) | A kind of software being applied to electric energy meter is put on record and comparison instrument and its implementation | |
CN103854145A (en) | Verification rule base based production energy data processing system | |
US20220337599A1 (en) | Systems and techniques for smart demand side response using data plane architecture | |
Pindoriya et al. | Infrastructure security for smart electric grids: A survey | |
KR20130067093A (en) | Smart meter for protection of privacy and method for controlling memory tereof | |
CN105447653A (en) | Model-based power business information resource coding method | |
Kamphuis et al. | DREAM: An ICT architecture framework for heterarchical coordination in power systems | |
Onawola et al. | A Conceptual Model for Mitigating Security Vulnerabilities in IoT-Based Smart Grid Electric Energy Distribution Systems | |
CN111105310A (en) | Distributed power generation transaction system and method | |
Kleineidam et al. | The Cellular Approach-Security of Micro Smart Grids | |
Wang et al. | Three‐stage robust voltage/var optimal control of wind farms at multiple time scales | |
Gui et al. | Economic dispatch for wind farm using model predictive control method | |
US20230216601A1 (en) | Systems and methods for coarse wavelength division multiplexing premise level data communication | |
CN207083107U (en) | Integrated security manages interchanger | |
Jiang | The Appliance of BOP Auxiliary System Centralized Control Network in Nuclear Power Plant | |
CN207427190U (en) | The discrete safety management interchanger of power supply | |
Shan et al. | Siting and sizing of distributed generation and electric vehicle charging station under active management mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190201 |