CN109872017A - It is a kind of based on the information attack of penalty method to the appraisal procedure of effect on power system - Google Patents
It is a kind of based on the information attack of penalty method to the appraisal procedure of effect on power system Download PDFInfo
- Publication number
- CN109872017A CN109872017A CN201711262840.5A CN201711262840A CN109872017A CN 109872017 A CN109872017 A CN 109872017A CN 201711262840 A CN201711262840 A CN 201711262840A CN 109872017 A CN109872017 A CN 109872017A
- Authority
- CN
- China
- Prior art keywords
- information
- attack
- power system
- flow
- road
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013507 mapping Methods 0.000 claims description 32
- 230000008859 change Effects 0.000 claims description 15
- 230000035945 sensitivity Effects 0.000 claims description 11
- 230000005283 ground state Effects 0.000 claims description 8
- 239000011159 matrix material Substances 0.000 claims description 3
- 238000011156 evaluation Methods 0.000 abstract description 9
- 230000008878 coupling Effects 0.000 abstract description 5
- 238000010168 coupling process Methods 0.000 abstract description 5
- 238000005859 coupling reaction Methods 0.000 abstract description 5
- 238000002347 injection Methods 0.000 abstract 1
- 239000007924 injection Substances 0.000 abstract 1
- 238000005259 measurement Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of based on the information attack of penalty method to the appraisal procedure of effect on power system, the technical program comprehensively considers information-physical coupling characteristic of electric system, the assessment of information attack is realized using information flow network, the present invention is based on the theories of penalty method, power flow equation can not be solved again and realize information attack to the rapid evaluation of effect on power system, be suitably employed in large-scale electrical power system in the security evaluation of each nodal information injection attacks.
Description
Technical Field
The invention relates to the technical field of power system security evaluation, in particular to a compensation method-based evaluation method for influence of information attack on a power system.
Background
At present, the information physical strong coupling characteristic of the power system is more and more obvious, the power system is more and more dependent on the information system, and the vulnerability of the power information system is more and more paid attention. The initial design goal of the information system is to support the safe and reliable operation of the power system, so it is also the current key issue to analyze how the information system will affect the power system. In addition, the information security problem of the information system is increasingly emphasized, and the influence of the power system caused by the attack on the information system is analyzed. The massive information comprises measurement, sensing and control, and the measurement, sensing and control are difficult to realize after being analyzed one by one and then load flow calculation is carried out.
Disclosure of Invention
In order to overcome the defects, the invention provides an evaluation method for the influence of information attack on a power system based on a compensation method.
In order to solve the technical problems, the invention adopts the technical scheme that:
a method for evaluating the influence of information attack on a power system based on a compensation method comprises the following specific steps:
s1, establishing a contribution model of an information flow channel to node information, and calculating how the information of an information flow channel starting point affects certain node information based on the contribution model of the information flow channel to the node information;
s2, based on the step S1, representing the contribution of the plurality of information flow channels to the node information, namely the information flow network mapping as the contribution of the information input node to the output node;
s3, calculating the deviation value of the input information after the information attack;
s4, calculating the deviation value of the output information after the information attack;
s5, calculating a control variable variation of the power system;
s6, calculating the influence of the control variable variation on the power flow of the power system based on the sensitivity;
and S7, solving the trend after the information attack based on a compensation method.
In the scheme, firstly, a contribution model of the information flow path to the node information is established, and how the information of the information flow path starting point affects certain node information can be calculated based on the contribution model of the information flow path to the node information; then, representing the contribution of the plurality of information flow paths to the node information, namely the information flow network mapping as the contribution of the information input node to the output node; secondly, calculating the deviation amount of input information after information attack; calculating the information deviation amount after the information attack again; further calculating a control variable change amount of the power system; then, calculating the influence of the control variable change quantity on the power flow of the power system based on the sensitivity; finally, solving the power flow after the information attack based on a compensation method, and superposing the power flow change amount after the information attack and the ground state power flow for quickly evaluating the influence of the information attack on the power system; the technical scheme comprehensively considers the information-physical coupling characteristics of the power system and utilizes the information flow network to realize the evaluation of the information attack.
Preferably, the step S2 is as follows: the information flow network mapping comprises branch information flow mapping and information flow mapping of directed roads;
the input-output relationship of the information branch mapped by the branch information flow is represented by the following formula:
wherein ,is the input information of the information branch,for the output information of the information branch, EbMapping relation of input and output functions of the information branch;
the information flow mappings of the directed roads form directed radial information flow network mappings; the method comprises the following steps of splitting a radial information flow network into a plurality of directed roads, respectively calculating information flow mapping of each directed road, wherein the contribution of a directed road rho to terminal point information is shown as the following formula:
where, road ρ ═ bρ,1,…,bρ,kI is more than or equal to 1 and more than or equal to k-1 for any meaning, and the branch b is satisfiedρ,iThe output node of (b) is a branchρ,i+1Defining a branch bρ,1Is injected with information ofThe information is input information of a road rho, and a branch in the road b is defined at the same timeρ,kOutput information ofThis information is the output information of the road ρ, Eρ,1…Eρ,kRespectively representing mapping operators of each branch;
wherein the calculated information flow mapping is calculated:
wherein ,Eρ=Eρ,k·(...·(Eρ,1·())),
Solving an information network output node:
and calculating the contribution value of each road by combining the contribution of each directed road to the output node, wherein the contribution value is shown as the following formula:
wherein yjA value representing an information network output node j (a control command in the power system), path.j represents a road set of the information network output node j, and rho ∈ path.j represents a road rho in the road set of the information network output node j;
calculating the contribution of the root node information to the output nodes of the information network, as shown in the following formula:
preferably, the step S3 is as follows:
calculating the deviation amount of the input information after the information attack, as shown in formula (6)
wherein The information deviation amount is input for the road p after the information attack,as informationInput information of the post-attack road ρ.
Preferably, the step S4 is as follows:
calculating the deviation amount of output information after information attack, as shown in formula (7):
wherein ΔyjFor the information deviation amount of the information network output node after the information attack,the information deviation amount is input for the road ρ after the information attack.
Preferably, the step S5 is as follows:
calculating the control variable variation of the power system, wherein when the power system has no control fault, the control variable is the same as the information deviation amount of the information network output node, and the following formula is shown:
Δuj=Δyj(3)
wherein ΔujThe method is used for controlling the variable quantity of the node j after the information attack.
Preferably, the step S6 is as follows:
calculating the influence of the control variable change quantity on the power flow of the power system based on the sensitivity, as shown in the following formula:
Δf=Sj·Δuj;
wherein, Delta f is the power flow change quantity after information attack, SjIs a sensitivity matrix of the control node j to the power system state variables.
Preferably, the step S7 is as follows:
solving the power flow after the information attack based on a compensation method, and superposing the power flow change amount after the information attack and the ground state power flow, wherein the formula is shown as follows:
f'=f+Δf (4)
wherein f' is the trend after information attack, and f is the ground state trend; and solving the result to obtain the trend after the information attack.
Compared with the prior art, the invention has the beneficial effects that: the technical scheme comprehensively considers the information-physical coupling characteristics of the power system and utilizes the information flow network to realize the evaluation of the information attack.
Drawings
Fig. 1 is a schematic flow chart of a method for evaluating the influence of information attack on a power system based on a compensation method.
Detailed Description
The drawings are for illustrative purposes only and are not to be construed as limiting the patent; for the purpose of better illustrating the embodiments, certain features of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted. The technical solution of the present invention is further described below with reference to the accompanying drawings and examples.
A method for evaluating the influence of information attack on a power system based on a compensation method comprises the following specific steps:
s1, establishing a contribution model of an information flow channel to node information, and calculating how the information of an information flow channel starting point affects certain node information based on the contribution model of the information flow channel to the node information;
s2, based on the step S1, representing the contribution of the plurality of information flow channels to the node information, namely the information flow network mapping as the contribution of the information input node to the output node;
s3, calculating the deviation value of the input information after the information attack;
s4, calculating the deviation value of the output information after the information attack;
s5, calculating a control variable variation of the power system;
s6, calculating the influence of the control variable variation on the power flow of the power system based on the sensitivity;
and S7, solving the trend after the information attack based on a compensation method.
In this embodiment, step S2 is specifically as follows: the information flow network mapping comprises branch information flow mapping and information flow mapping of directed roads;
the input-output relationship of the information branch mapped by the branch information flow is represented by the following formula:
wherein ,is the input information of the information branch,for the output information of the information branch, EbMapping relation of input and output functions of the information branch;
the information flow mappings of the directed roads form directed radial information flow network mappings; the method comprises the following steps of splitting a radial information flow network into a plurality of directed roads, respectively calculating information flow mapping of each directed road, wherein the contribution of a directed road rho to terminal point information is shown as the following formula:
where, road ρ ═ bρ,1,…,bρ,kI is more than or equal to 1 and more than or equal to k-1 for any meaning, and the branch b is satisfiedρ,iThe output node of (b) is a branchρ,i+1Defining a branch bρ,1Is injected with information ofThe information is input information of a road rho, and a branch in the road b is defined at the same timeρ,kOutput information ofThis information is the output information of the road ρ, Eρ,1…Eρ,kRespectively representing mapping operators of each branch;
wherein the calculated information flow mapping is calculated:
wherein ,Eρ=Eρ,k·(...·(Eρ,1·())),
Solving an information network output node:
and calculating the contribution value of each road by combining the contribution of each directed road to the output node, wherein the contribution value is shown as the following formula:
wherein yjRepresenting the value of the information network output node j (in the power system)The middle is a control instruction), path.j represents a road set of the information network output node j, and rho belongs to the road set of the information network output node j;
calculating the contribution of the root node information to the output nodes of the information network, as shown in the following formula:
in this embodiment, step S3 is specifically as follows:
calculating the deviation amount of the input information after the information attack, as shown in formula (6)
wherein The information deviation amount is input for the road p after the information attack,is the input information of the road rho after the information attack.
In this embodiment, step S4 is specifically as follows:
calculating the deviation amount of output information after information attack, as shown in formula (7):
wherein ΔyjFor the information deviation amount of the information network output node after the information attack,the information deviation amount is input for the road ρ after the information attack.
In this embodiment, step S5 is specifically as follows:
calculating the control variable variation of the power system, wherein when the power system has no control fault, the control variable is the same as the information deviation amount of the information network output node, and the following formula is shown:
Δuj=Δyj(5)
wherein ΔujThe method is used for controlling the variable quantity of the node j after the information attack.
In this embodiment, step S6 is specifically as follows:
calculating the influence of the control variable change quantity on the power flow of the power system based on the sensitivity, as shown in the following formula:
Δf=Sj·Δuj;
wherein, Delta f is the power flow change quantity after information attack, SjIs a sensitivity matrix of the control node j to the power system state variables.
In this embodiment, step S7 is specifically as follows:
solving the power flow after the information attack based on a compensation method, and superposing the power flow change amount after the information attack and the ground state power flow, wherein the formula is shown as follows:
f'=f+Δf (6)
wherein f' is the trend after information attack, and f is the ground state trend; and solving the result to obtain the trend after the information attack.
In the scheme, firstly, a contribution model of the information flow path to the node information is established, and how the information of the information flow path starting point affects certain node information can be calculated based on the contribution model of the information flow path to the node information; then, representing the contribution of the plurality of information flow paths to the node information, namely the information flow network mapping as the contribution of the information input node to the output node; secondly, calculating the deviation amount of input information after information attack; calculating the information deviation amount after the information attack again; further calculating a control variable change amount of the power system; then, calculating the influence of the control variable change quantity on the power flow of the power system based on the sensitivity; finally, solving the power flow after the information attack based on a compensation method, and superposing the power flow change amount after the information attack and the ground state power flow for quickly evaluating the influence of the information attack on the power system; the technical scheme comprehensively considers the information-physical coupling characteristics of the power system and utilizes the information flow network to realize the evaluation of the information attack.
It should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.
Claims (7)
1. A method for evaluating the influence of information attack on a power system based on a compensation method is characterized by comprising the following steps: the method comprises the following specific steps:
s1, establishing a contribution model of an information flow channel to node information, and calculating how the information of an information flow channel starting point affects certain node information based on the contribution model of the information flow channel to the node information;
s2, based on the step S1, representing the contribution of the plurality of information flow channels to the node information, namely the information flow network mapping as the contribution of the information input node to the output node;
s3, calculating the deviation value of the input information after the information attack;
s4, calculating the deviation value of the output information after the information attack;
s5, calculating a control variable variation of the power system;
s6, calculating the influence of the control variable variation on the power flow of the power system based on the sensitivity;
and S7, solving the trend after the information attack based on a compensation method.
2. The method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S2 is specifically as follows: the information flow network mapping comprises branch information flow mapping and information flow mapping of directed roads;
the input-output relationship of the information branch mapped by the branch information flow is represented by the following formula:
wherein ,is the input information of the information branch,for the output information of the information branch, EbMapping relation of input and output functions of the information branch;
the information flow mappings of the directed roads form directed radial information flow network mappings; the method comprises the following steps of splitting a radial information flow network into a plurality of directed roads, respectively calculating information flow mapping of each directed road, wherein the contribution of a directed road rho to terminal point information is shown as the following formula:
where, road ρ ═ bρ,1,…,bρ,kI is more than or equal to 1 and more than or equal to k-1 for any meaning, and the branch b is satisfiedρ,iThe output node of (b) is a branchρ,i+1Defining a branch bρ,1Is injected with information ofThe information is input information of a road rho, and a branch in the road b is defined at the same timeρ,kOutput information ofThis information is the output information of the road ρ, Eρ,1…Eρ,kRespectively representing mapping operators of each branch;
wherein the calculated information flow mapping is calculated:
wherein ,Eρ=Eρ,k·(...·(Eρ,1·())),
Solving an information network output node:
and calculating the contribution value of each road by combining the contribution of each directed road to the output node, wherein the contribution value is shown as the following formula:
wherein yjA value representing an information network output node j (a control command in the power system), path.j represents a road set of the information network output node j, and rho ∈ path.j represents a road rho in the road set of the information network output node j;
calculating the contribution of the root node information to the output nodes of the information network, as shown in the following formula:
3. the method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S3 is specifically as follows:
calculating the deviation amount of the input information after the information attack, as shown in formula (6)
wherein The information deviation amount is input for the road p after the information attack,is the input information of the road rho after the information attack.
4. The method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S4 is specifically as follows:
calculating the deviation amount of output information after information attack, as shown in formula (7):
wherein △yjFor the information deviation amount of the information network output node after the information attack,the information deviation amount is input for the road ρ after the information attack.
5. The method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S5 is specifically as follows:
calculating the control variable variation of the power system, wherein when the power system has no control fault, the control variable is the same as the information deviation amount of the information network output node, and the following formula is shown:
△uj=△yj(1)
wherein △ujThe method is used for controlling the variable quantity of the node j after the information attack.
6. The method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S6 is specifically as follows:
calculating the influence of the control variable change quantity on the power flow of the power system based on the sensitivity, as shown in the following formula:
△f=Sj·△uj;
wherein △ f is the change of power flow after information attack, SjIs a sensitivity matrix of the control node j to the power system state variables.
7. The method for evaluating the influence of information attack on the power system based on the compensation method according to claim 1, wherein: the step S7 is specifically as follows:
solving the power flow after the information attack based on a compensation method, and superposing the power flow change amount after the information attack and the ground state power flow, wherein the formula is shown as follows:
f'=f+△f (2)
wherein f' is the trend after information attack, and f is the ground state trend; and solving the result to obtain the trend after the information attack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262840.5A CN109872017B (en) | 2017-12-04 | 2017-12-04 | Compensation method-based method for evaluating influence of information attack on power system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262840.5A CN109872017B (en) | 2017-12-04 | 2017-12-04 | Compensation method-based method for evaluating influence of information attack on power system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109872017A true CN109872017A (en) | 2019-06-11 |
CN109872017B CN109872017B (en) | 2023-05-09 |
Family
ID=66915859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711262840.5A Active CN109872017B (en) | 2017-12-04 | 2017-12-04 | Compensation method-based method for evaluating influence of information attack on power system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109872017B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376506A (en) * | 2014-11-17 | 2015-02-25 | 三峡大学 | Electric power system risk assessment method based on deterministic analysis |
CN105048461A (en) * | 2015-08-25 | 2015-11-11 | 西安交通大学 | Attack and defense exercise method for direct-current optimal power flow calculation data integrity of power system |
CN106713354A (en) * | 2017-01-23 | 2017-05-24 | 全球能源互联网研究院 | Method for evaluating vulnerability node of electric cyber-physical system based on undetectable information attack pre-warning technology |
US20180048669A1 (en) * | 2016-08-12 | 2018-02-15 | Tata Consultancy Services Limited | Comprehensive risk assessment in a heterogeneous dynamic network |
-
2017
- 2017-12-04 CN CN201711262840.5A patent/CN109872017B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104376506A (en) * | 2014-11-17 | 2015-02-25 | 三峡大学 | Electric power system risk assessment method based on deterministic analysis |
CN105048461A (en) * | 2015-08-25 | 2015-11-11 | 西安交通大学 | Attack and defense exercise method for direct-current optimal power flow calculation data integrity of power system |
US20180048669A1 (en) * | 2016-08-12 | 2018-02-15 | Tata Consultancy Services Limited | Comprehensive risk assessment in a heterogeneous dynamic network |
CN106713354A (en) * | 2017-01-23 | 2017-05-24 | 全球能源互联网研究院 | Method for evaluating vulnerability node of electric cyber-physical system based on undetectable information attack pre-warning technology |
Non-Patent Citations (4)
Title |
---|
丰皓等: "计及抗干扰能力和影响力的节点综合脆弱性评估方法", 《电力系统及其自动化学报》 * |
张殷等: "考虑信息物理交互的电力信息耦合网络脆弱性分析与改善策略研究", 《电网技术》 * |
王虹富等: "基于虚拟中点功率的潮流估算模型", 《中国电机工程学报》 * |
郭庆来等: "电力系统信息物理融合建模与综合安全评估:驱动力与研究构想", 《中国电机工程学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN109872017B (en) | 2023-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Financially motivated FDI on SCED in real-time electricity markets: Attacks and mitigation | |
Lu et al. | Wide‐area power system stabiliser based on model‐free adaptive control | |
Yang et al. | PMU-based voltage stability prediction using least square support vector machine with online learning | |
Su et al. | Observer-based detection and reconstruction of dynamic load altering attack in smart grid | |
CN101425681B (en) | Relay protection on-line check method for electric grid system | |
Peng et al. | Reliability analysis in interdependent smart grid systems | |
Genge et al. | A framework for designing resilient distributed intrusion detection systems for critical infrastructures | |
CN110399671B (en) | Setting calculation method and device for relay protection device of power grid and terminal | |
Xu et al. | Resilience enhancement of renewable cyber–physical power system against malware attacks | |
Chromik et al. | An integrated testbed for locally monitoring SCADA systems in smart grids | |
Tian et al. | On improved delay-dependent robust H∞ control for systems with interval time-varying delay | |
Jahromi et al. | Measurement-based modelling of composite load using genetic algorithm | |
Cárdenas et al. | Security and privacy in the smart grid | |
CN104037759B (en) | Electric power system injects the robust least-square estimation method of transfer distribution factor | |
Prasad | Counteractive control against cyber‐attack uncertainties on frequency regulation in the power system | |
CN103778341A (en) | Method for estimating probabilistic load flow of harmonic pollution user | |
Sun et al. | Quantifying the robustness of network controllability | |
CN114938287A (en) | Method and device for detecting abnormal behavior of power network with service features fused | |
Al-Gburi et al. | Dynamic security assessment for power system under cyber-attack | |
Zhu et al. | Efficient identification of critical load model parameters affecting transient stability | |
CN106532712A (en) | Rectangular coordinate Newton method load flow calculation method for small-impedance-branch-containing power grid based on compensation method | |
Castillo et al. | Cyber-physical emulation and optimization of worst-case cyber attacks on the power grid | |
WO2018188393A1 (en) | Linearized determination method and system for power flow of flexible direct-current power grid, and computer storage medium | |
CN109872017A (en) | It is a kind of based on the information attack of penalty method to the appraisal procedure of effect on power system | |
Fu et al. | A review of cybersecurity in grid-connected power electronics converters: Vulnerabilities, countermeasures, and testbeds |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230925 Address after: 510000 No. 75, Meihua Road, Yuexiu District, Guangzhou City, Guangdong Province (office building only) Patentee after: ELECTRICAL POWER DISPATCHING & CONTROL CENTER OF GUANGDONG POWER GRID Co.,Ltd. Address before: No.75, Meihua Road, Yuexiu District, Guangzhou, Guangdong 510000 Patentee before: ELECTRICAL POWER DISPATCHING & CONTROL CENTER OF GUANGDONG POWER GRID Co.,Ltd. Patentee before: TSINGHUA University |
|
TR01 | Transfer of patent right |