CN114372595B - Automatic inspection system and method for power grid dispatching control running state - Google Patents

Automatic inspection system and method for power grid dispatching control running state Download PDF

Info

Publication number
CN114372595B
CN114372595B CN202111562484.5A CN202111562484A CN114372595B CN 114372595 B CN114372595 B CN 114372595B CN 202111562484 A CN202111562484 A CN 202111562484A CN 114372595 B CN114372595 B CN 114372595B
Authority
CN
China
Prior art keywords
data
service
point
layer
vertical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111562484.5A
Other languages
Chinese (zh)
Other versions
CN114372595A (en
Inventor
吕洋
徐春雷
孙世明
赵奇
张琦兵
潘琪
马明明
丁宏恩
俞瑜
唐聪
孟雨庭
王永
王若晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Jiangsu Electric Power Co Ltd
NR Engineering Co Ltd
Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Jiangsu Electric Power Co Ltd
NR Engineering Co Ltd
Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Jiangsu Electric Power Co Ltd, NR Engineering Co Ltd, Suzhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Jiangsu Electric Power Co Ltd
Priority to CN202111562484.5A priority Critical patent/CN114372595B/en
Publication of CN114372595A publication Critical patent/CN114372595A/en
Application granted granted Critical
Publication of CN114372595B publication Critical patent/CN114372595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/35Utilities, e.g. electricity, gas or water
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/30Information sensed or collected by the things relating to resources, e.g. consumed power
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/20Analytics; Diagnosis
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/40Maintenance of things
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00004Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the power network being locally controlled
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/128Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

An automatic inspection method and system for power grid dispatching control running state comprises a control layer, a service layer, an object layer and a base layer; the control layer comprises a vertical encryption user management and authentication system, a vertical encryption equipment communication and rule system, a vertical data analysis system and a vertical data acquisition system; the service layer provides method service for the system of the control layer; the service layer provides identity authentication and user management service for the vertical encryption user management and authentication system; the object layer provides a medium for storing the storage result of the service layer; the base layer provides upper layer data application functions. The invention changes the traditional manual inspection work, takes informatization as a basis and automatically inspects the mode, and improves the whole technical content and the precision inspection work of the power grid; the vertical encryption method effectively encrypts a large amount of stored information, and improves confidentiality during power grid dispatching control operation.

Description

Automatic inspection system and method for power grid dispatching control running state
Technical Field
The invention belongs to the field of power system dispatching control, and particularly relates to an automatic power grid dispatching control running state inspection system and method.
Background
With the rapid development of science and technology and socioeconomic, electricity has become a necessary development of basic society. As the demand for electricity is increasingly high due to social dependence, the capacity of electricity is correspondingly increased. Generally, the entire social power system is charged with vital responsibilities for power production, transmission, and distribution. In order to realize safe and stable power supply and high-quality service, and avoid serious safety accidents, higher requirements and electric power safety production standards are put forward for an electric power system. If the power system has potential safety hazards in production and transmission, normal operation of the whole society can be seriously damaged. The power system in the operation period firstly needs to stably provide safe and high-quality power supply for the end user, promotes the society to rapidly develop economy and realizes economic benefit. The scale and complexity of the development of the power system in the current environment are higher and higher, the quantity of basic hardware and the quantity of infrastructure are rapidly increased, and in addition, the requirement of a safe power grid is also higher and higher, so that an effective and efficient power grid dispatching automatic inspection system is urgently needed.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide an automatic power grid dispatching control running state inspection system and method.
The invention adopts the following technical scheme:
an automatic inspection system for power grid dispatching control running state comprises a control layer, a service layer, an object layer and a base layer; the control layer comprises a vertical encryption user management and authentication system, a vertical encryption equipment communication and rule system, a vertical data analysis system and a vertical data acquisition system;
the service layer provides method service for the system of the control layer; the service layer provides identity authentication and user management service for the vertical encryption user management and authentication system, provides rule management service and command method service for the vertical encryption equipment communication and rule system, provides data analysis method service for the vertical data analysis system, and provides data collection method service for the vertical data acquisition system;
the object layer provides a medium for storing a storage result of the service layer, and comprises a user database, a vertical encryption rule and a data acquisition analysis database which are used for storing data acquired and calculated by the service layer;
the base layer provides upper layer data application functions including user authentication, user management, IP detection, outlier automatic inspection, report viewing, data comparison, and test analysis.
In the service layer, the identity authentication service uses an OAuth authentication method;
the user management service divides the user into a power grid dispatcher and a system administrator;
the rule management service and the command management service are respectively used for making management rules of the power equipment and commands used when different tasks are executed;
the data collection method service collects real-time parameters of the operation of the power system through Remote Terminal (RTU) equipment;
the data analysis method service performs comparison analysis on the data acquired by the data collection method service, and performs vertical encryption on the calculated data.
The real-time parameters of the operation of the power system comprise parameters of generator output, bus voltage, power flow in the system, whether load and reactive load exist or not, line current and electroplating quantity.
The vertical encryption method comprises the following steps:
firstly, randomly selecting an elliptic curve ECP, randomly selecting a point on the elliptic curve ECP as a base point A, and enabling the order n of the base point A to be a prime number larger than 10000; then randomly selecting an integer m as a private key s, calculating a public key K=mA, and disclosing three constant items of an elliptic curve ECP, a base point A and the public key K;
when a message is received, the message content is converted into a point M on the elliptic curve ECP, a random number r is selected and the ciphertext mw is calculated,
the calculation method comprises the following steps:
mw={rA,M+rR}
where R is any point on the elliptic curve ECP, R cannot be 0.
In the vertical encryption method, the method for decrypting the ciphertext mw comprises the following steps:
mw+rR-M+rsA
the method for converting the message content into a point M on the elliptic curve ECP comprises the following steps:
assuming that the selected elliptic curve ECC is in a field of k bits and the message content length to be converted is k-1-g, the following calculation is performed:
s1: calculate x=m||0 g The method comprises the steps of carrying out a first treatment on the surface of the m represents an ascii code corresponding to each character of the information content to be converted;
s2: calculate x' =x from the calculation result of S1 3 +ax+b mod q; wherein (a, b) is a random point on ECC, and the corresponding odd prime number in the prime domain is q;
s3: if x' is the quadratic residue of x, calculateThe corresponding point M is (x, y); otherwise, repeating steps S2 and S3 after adding 1 to the g bit of x until a corresponding point is found.
The automatic abnormal point checking method comprises the following steps:
for each type of data, firstly, calculating Euclidean distance between every two data points in the data, finding the longest Euclidean distance and defining a cut-off distance d c A defined cut-off distance d c Up to one third of the longest Euclidean distance;
for any data point i, calculate its relative density p i
Wherein d ij Represents the Euclidean distance between any data point i to any data point j of the same class, K represents a sign function, when (d ij -d c ) When < 0, lambda (d) ij -d c ) 1, otherwise 0;
relative density p of each data point of the class i After sorting, the minimum Euclidean distance from each data point to each data point is calculated, wherein the minimum Euclidean distance is greater than the relative density data point of each data point to the data point:
where jj represents any one of the data points having a relative density greater than the relative density of data point i, p jj Represents the relative density, d, of the data point jj i,jj Representing the Euclidean distance from data point i to data point jj.
In the method of automatic inspection of an outlier,
if the Euclidean distance between one data point and the other data points that are greater than the first threshold is greater than the cutoff distance, and the relative density rank of the data point is less than the second threshold and greater than the minimum Euclidean distance of all data points that are less than the relative density of the data point, then the data point is an outlier.
The detection analysis and data comparison of the base layer finish the command issued by the service layer data analysis method, and the provided data are compared and analyzed in a preset mode, wherein the calculation comprises the calculation of the median and the standard deviation.
The invention also discloses a power grid dispatching control running state automatic inspection method based on the power grid dispatching control running state automatic inspection system, which comprises the following steps:
step 1, authenticating the identity of a user, if the user is a power grid dispatcher, entering step 2, if the user is a system administrator, otherwise, ending the method;
step 2, collecting real-time parameters of the operation of the power system;
real-time parameters are collected through Remote Terminal (RTU) equipment, and include parameters of generator output, bus voltage, power flow in the system, load and reactive load, line current and electroplating amount;
step 3, comparing the collected real-time operation parameters of the power system;
step 4, storing the analysis result and the acquired data after vertical encryption;
step 5, when fault detection is needed, extracting stored data, decrypting the data, and then detecting abnormal points;
and 6, feeding back the abnormal points to the user, and finishing the inspection of the power grid dispatching control running state.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention mainly designs an automatic power grid dispatching inspection overall topological graph, and the system is of a four-layer structure of a control layer, a service layer, an object layer and a base layer, so that the traditional manual inspection work is changed, an informatization-based automatic inspection mode is adopted, and the overall technical content and the precision inspection work of the power grid are improved;
2. the vertical encryption method can effectively encrypt a large amount of stored information, and greatly improves confidentiality during power grid dispatching control operation.
Drawings
FIG. 1 is a block diagram of a power grid dispatching patrol system;
fig. 2 is an overall topology of an automatic patrol for power grid dispatching.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical solutions of the present invention and are not intended to limit the scope of protection of the present application.
The invention discloses an automatic inspection system for power grid dispatching control running state, which comprises a control layer, a service layer, an object layer and a base layer, wherein the control layer is used for controlling the power grid dispatching control running state; a specific grid dispatching automatic patrol general topology is shown in fig. 2.
The control layer comprises a vertical encryption user management and authentication system, a vertical encryption equipment communication and rule system, a vertical data analysis system and a vertical data acquisition system; the user can control these systems through the control layer; specifically, the power grid dispatcher can control the vertical encryption equipment communication and rule system, the vertical data analysis system and the vertical data acquisition system, and the system administrator can control the vertical encryption user management and authentication system;
the vertical encryption user management and authentication system provides a user input information interface;
the vertical encryption device communication and rule system provides a user communication rule setting interface;
the vertical data analysis system provides a user data comparison interface;
the vertical data acquisition system provides a user data acquisition interface;
the control layer provides a device security baseline management function and a network active detection function for the user and refuses unsafe login requests and viruses;
the service layer provides method service for the system of the control layer; specifically, the service layer provides identity authentication and user management service for the vertical encryption user management and authentication system, provides rule management service and command method service for the vertical encryption equipment communication and rule system, provides data analysis method service for the vertical data analysis system, and also provides data collection method service for the vertical data acquisition system;
the object layer provides a medium for storing the storage result of the service layer; specifically, the object layer comprises a user database, a vertical encryption rule and a data acquisition analysis database; the user database is used for storing data obtained by service layer identity authentication and user management service calculation, and the vertical encryption rule and data acquisition analysis database is used for storing data obtained by service layer other service calculation;
the base layer provides an upper layer data application function; specifically, the functions that can be realized after the base layer reads the data in the object layer database include user verification, user management, IP detection, automatic check of outliers, report viewing, data comparison, and test analysis.
In this embodiment, the OAuth authentication method is used for the identity authentication service of the service layer;
the user management service divides the user into a power grid dispatcher and a system administrator;
the rule management service and the command management service are respectively used for making management rules of the power equipment and commands used when different tasks are executed;
the data collection method is used for collecting real-time parameters of the operation of the power system through Remote Terminal (RTU) equipment, and mainly comprises parameters of generator output, bus voltage, power flow in the system, load and reactive load, line current and electroplating quantity;
the data analysis method service compares the data acquired by the data collection method service and checks whether the parameters are in a preset reasonable range; specifically, the method further carries out vertical encryption on the calculated data, and the encryption method is as follows:
firstly, randomly selecting an elliptic curve ECC, randomly selecting a point on the elliptic curve ECC as a base point A, and enabling the order n of the base point A to be a prime number larger than 10000; then randomly selecting an integer m as a private key s, calculating a public key k=ma, and disclosing three constant terms of the elliptic curve ECC, a base point a and the public key K.
When receiving a message, converting the content of the message into a point M on an elliptic curve ECC, wherein the specific conversion method comprises the following steps:
assuming that the selected elliptic curve ECC is in a field of k bits and the message content length to be converted is k-1-g, the following calculation is performed:
s1: calculate x=m||0 g The method comprises the steps of carrying out a first treatment on the surface of the m represents an ascii code corresponding to each character of the information content to be converted;
s2: calculate x' =x from the calculation result of S1 3 +ax+b mod q; wherein (a, b) is a random point on ECC, and the corresponding odd prime number in the prime domain is q;
s3: if x' is the quadratic residue of x, calculateThe corresponding point M is (x, y); otherwise, repeating the steps S2 and S3 after adding 1 to the g bit of x until a corresponding point is found;
the random number r is selected and the ciphertext mw is calculated, and the calculation method is as follows: mw= { rA, m+rr }
Wherein R is any point on an elliptic curve ECP, and R cannot be 0;
the method for decrypting the ciphertext mw comprises the following steps:
mw+rR-M+rsA
the outlier automatic check of the base layer searches for outlier data points stored in the vertical encryption rules and data wipe analysis database, and for each type of data, the outlier automatic check searches for outlier data points by:
for each type of data, firstly, calculating Euclidean distance between every two data points in the data, finding the longest Euclidean distance and defining a cut-off distance d c A defined cut-off distance d c Up to one third of the longest Euclidean distance;
for any data point i, calculate its relative density p i
Wherein d ij Represents the Euclidean distance between any data point i to any data point j of the same class, EP represents a sign function, when (d ij -d c ) When < 0, lambda (d) ij -d c ) 1, otherwise 0;
relative density p of each data point of the class i After sorting, the minimum Euclidean distance from each data point to each data point is calculated, wherein the minimum Euclidean distance is greater than the relative density data point of each data point to the data point:
where jj represents any one of the data points having a relative density greater than the relative density of data point i, p jj Represents the relative density, d, of the data point jj i,jj Representing the Euclidean distance from data point i to data point jj.
If the Euclidean distance between one data point and the other data points that are greater than the first threshold is greater than the cutoff distance, and the relative density rank of the data point is less than the second threshold and greater than the minimum Euclidean distance of all data points that are less than the relative density of the data point, then the data point is an outlier.
The detection analysis and data comparison of the base layer finish the command issued by the service layer data analysis method, and the provided data are compared and analyzed in a preset mode, wherein the calculation comprises the calculation of the median and the standard deviation.
The invention also discloses a power grid dispatching control running state automatic inspection method based on the power grid dispatching control running state automatic inspection system, and fig. 1 is a structure diagram of the power grid dispatching inspection system, and comprises the following steps:
step 1, authenticating the identity of a user, entering step 2 if the user is a power grid dispatcher, and ending the method if the user is a system administrator;
in the invention, the task of a system administrator is to regulate and control the automatic inspection system of the power grid dispatching control running state and manage personnel, which is not the content of the main protection of the invention;
step 2, collecting real-time parameters of the operation of the power system;
real-time parameters are collected through Remote Terminal (RTU) equipment, and include parameters of generator output, bus voltage, power flow in the system, load and reactive load, line current and electroplating amount;
step 3, comparing the collected real-time operation parameters of the power system;
step 4, storing the analysis result and the acquired data after vertical encryption;
step 5, when fault detection is needed, extracting stored data, decrypting the data, and then detecting abnormal points;
and 6, feeding back the abnormal points to the user, and finishing the inspection of the power grid dispatching control running state.
While the applicant has described and illustrated the embodiments of the present invention in detail with reference to the drawings, it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not to limit the scope of the present invention, but any improvements or modifications based on the spirit of the present invention should fall within the scope of the present invention.

Claims (7)

1. The utility model provides an automatic inspection system of electric wire netting dispatch control running state, includes control layer, service layer, object layer and basic layer, its characterized in that:
the control layer comprises a vertical encryption user management and authentication system, a vertical encryption equipment communication and rule system, a vertical data analysis system and a vertical data acquisition system;
the service layer provides method service for the system of the control layer; the service layer provides identity authentication and user management service for the vertical encryption user management and authentication system, provides rule management service and command method service for the vertical encryption equipment communication and rule system, provides data analysis method service for the vertical data analysis system, and provides data collection method service for the vertical data acquisition system;
in the service layer, an OAuth authentication method is used by the identity authentication service;
the user management service divides the user into a power grid dispatcher and a system administrator;
the rule management service and the command management service are respectively used for making management rules of the power equipment and commands used when different tasks are executed;
the data collection method is used for collecting real-time parameters of the operation of the power system through remote terminal RTU equipment;
the data analysis method service performs comparison analysis on the data acquired by the data collection method service, and performs vertical encryption on the calculated data;
the vertical encryption method comprises the following steps:
firstly, randomly selecting an elliptic curve ECP, randomly selecting a point on the elliptic curve ECP as a base point A, and enabling the order n of the base point A to be a prime number larger than 10000; then randomly selecting an integer m as a private key s, calculating a public key K=mA, and disclosing three constant items of an elliptic curve ECP, a base point A and the public key K;
when receiving a message, converting the message content into a point M on an elliptic curve ECP, selecting a random number r and calculating a ciphertext mw, wherein the calculation method comprises the following steps:
assuming that the selected elliptic curve ECC is in a field of k bits and the message content length to be converted is k-1-g, the following calculation is performed:
s1: calculate x=m||0 g The method comprises the steps of carrying out a first treatment on the surface of the m represents an ascii code corresponding to each character of the information content to be converted;
s2: calculate x' =x from the calculation result of S1 3 +ax+b mod q; wherein (a, b) is a random point on ECC, and the corresponding odd prime number in the prime domain is q;
s3: if x' is the quadratic residue of x, calculateThe corresponding point M is (x, y); otherwise, repeating the steps S2 and S3 after adding 1 to the g bit of x until a corresponding point is found;
mw={rA,M+rR}
wherein R is any point on an elliptic curve ECP, and R cannot be 0; the object layer provides a medium for storing a storage result of the service layer, and comprises a user database, a vertical encryption rule and a data acquisition analysis database which are used for storing data acquired and calculated by the service layer;
the base layer provides upper layer data application functions including user authentication, user management, IP detection, outlier automatic inspection, report viewing, data comparison, and test analysis.
2. The grid dispatching control operational status automatic inspection system of claim 1, wherein:
the real-time parameters of the operation of the power system comprise parameters of generator output, bus voltage, power flow in the system, whether load and reactive load exist or not, line current and electroplating quantity.
3. The grid dispatching control operational status automatic inspection system of claim 2, wherein:
in the vertical encryption method, the method for decrypting the ciphertext mw comprises the following steps:
mw+rR-M+rsA。
4. the grid dispatching control operational status automatic inspection system of claim 1, wherein:
the method for automatically checking the abnormal points comprises the following steps:
for each type of data, firstly, calculating Euclidean distance between every two data points in the data, finding the longest Euclidean distance and defining a cut-off distance d c A defined cut-off distance d c Up to one third of the longest Euclidean distance;
for any data point i, calculate its relative density p i
Wherein d ij Represents the Euclidean distance between any data point i to any data point j of the same class, K represents a sign function, when (d ij -d c ) When < 0, lambda (d) ij -d c ) 1, otherwise 0;
relative density p of each data point of the class i After sorting, the minimum Euclidean distance from each data point to each data point is calculated, wherein the minimum Euclidean distance is greater than the relative density data point of each data point to the data point:
where jj represents any one of the data points having a relative density greater than the relative density of data point i, p jj Represents the relative density, d, of the data point jj i,jj Representing the Euclidean distance from data point i to data point jj.
5. The grid dispatching control operational status automatic inspection system of claim 1, wherein:
in the method of automatic inspection of the abnormal point,
if the Euclidean distance between one data point and the other data points that are greater than the first threshold is greater than the cutoff distance, and the relative density rank of the data point is less than the second threshold and greater than the minimum Euclidean distance of all data points that are less than the relative density of the data point, then the data point is an outlier.
6. The grid dispatching control operational status automatic inspection system of claim 1, wherein:
and the detection analysis and data comparison of the base layer finish the command issued by the service layer data analysis method, and the provided data are compared and analyzed in a preset mode, wherein the analysis comprises calculation of median and standard deviation.
7. The power grid dispatching control running state automatic inspection method based on the power grid dispatching control running state automatic inspection system according to any one of claims 1 to 6, characterized in that the power grid dispatching control running state automatic inspection method comprises the following steps:
step 1, authenticating the identity of a user, if the user is a power grid dispatcher, entering step 2, if the user is a system administrator, otherwise, ending the method;
step 2, collecting real-time parameters of the operation of the power system;
real-time parameters are collected through remote terminal RTU equipment, and include parameters of generator output, bus voltage, power flow in a system, whether load and reactive load exist, line current and electroplating quantity;
step 3, comparing the collected real-time operation parameters of the power system;
step 4, storing the analysis result and the acquired data after vertical encryption;
step 5, when fault detection is needed, extracting stored data, decrypting the data, and then detecting abnormal points;
and 6, feeding back the abnormal points to the user, and finishing the inspection of the power grid dispatching control running state.
CN202111562484.5A 2021-12-20 2021-12-20 Automatic inspection system and method for power grid dispatching control running state Active CN114372595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111562484.5A CN114372595B (en) 2021-12-20 2021-12-20 Automatic inspection system and method for power grid dispatching control running state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111562484.5A CN114372595B (en) 2021-12-20 2021-12-20 Automatic inspection system and method for power grid dispatching control running state

Publications (2)

Publication Number Publication Date
CN114372595A CN114372595A (en) 2022-04-19
CN114372595B true CN114372595B (en) 2024-03-15

Family

ID=81141106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111562484.5A Active CN114372595B (en) 2021-12-20 2021-12-20 Automatic inspection system and method for power grid dispatching control running state

Country Status (1)

Country Link
CN (1) CN114372595B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103563325A (en) * 2011-01-27 2014-02-05 安全第一公司 Systems and methods for securing data
CN104348254A (en) * 2014-11-04 2015-02-11 国电南瑞科技股份有限公司 Transformer substation monitoring system framework facing services
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network
CN110994790A (en) * 2019-12-04 2020-04-10 南京南瑞继保电气有限公司 Enterprise power grid dispatching knowledge decision analysis system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103563325A (en) * 2011-01-27 2014-02-05 安全第一公司 Systems and methods for securing data
CN104348254A (en) * 2014-11-04 2015-02-11 国电南瑞科技股份有限公司 Transformer substation monitoring system framework facing services
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network
CN110994790A (en) * 2019-12-04 2020-04-10 南京南瑞继保电气有限公司 Enterprise power grid dispatching knowledge decision analysis system

Also Published As

Publication number Publication date
CN114372595A (en) 2022-04-19

Similar Documents

Publication Publication Date Title
CN108564471B (en) Energy Internet safety intelligent transaction system based on block chain technology and method thereof
CN101807818B (en) Device access authentication method of distribution network automated communication system based on ID
Xiang et al. Optimal sizing of energy storage system in active distribution networks using Fourier–Legendre series based state of energy function
CN101753312A (en) Security certification method and security certification device for power grid equipment and negative control terminal
CN102946603B (en) Based on the unified identity authentication method of social characteristic in power cloud system
CN110650116B (en) Multi-type multi-dimensional data aggregation method for security smart power grid
CN109309688B (en) New energy power station operation control method based on cloud monitoring and data encryption transmission
CN110321381A (en) Power information equipment management system
CN112924921A (en) Credible collection mechanism of smart electric meter quality data based on block chain
CN114347835B (en) Charging pile abnormal parameter detection method and system based on block chain
CN114372595B (en) Automatic inspection system and method for power grid dispatching control running state
CN106204329A (en) A kind of intelligent grid load management system
CN107465688B (en) Method for identifying network application permission of state monitoring and evaluating system
CN216391430U (en) Power distribution automation terminal access control system with quantum encryption function
WO2021227373A1 (en) Node selection method and system under inter-province transaction agent mode, and storage medium
CN111818051B (en) Distribution network encryption system and method based on low energy consumption
Eldegwi et al. Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring
CN114501432A (en) Electric power data security encryption module based on LoRa wireless communication technology
CN106934538A (en) A kind of electric network data fusion method compared based on data blood relationship and gene
CN106888199B (en) Role-driven demand response secure access method in smart grid
CN110188971A (en) Electric Power Network Planning project aid decision-making system
CN113572140B (en) Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism
CN114389839B (en) PMS data transmission system and method based on 5G network module
Wu et al. Distribution network resilience enhancement strategy considering spatial‐temporal migration of flexible resources on supply and demand sides
CN112235100B (en) Electric energy meter soft encryption authentication method and remote authentication system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240205

Address after: 215004 No. 555 Labor Road, Gusu District, Suzhou City, Jiangsu Province

Applicant after: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd. SUZHOU BRANCH

Country or region after: China

Applicant after: NR ENGINEERING Co.,Ltd.

Applicant after: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd.

Address before: 215004 No. 555 Labor Road, Gusu District, Suzhou City, Jiangsu Province

Applicant before: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd. SUZHOU BRANCH

Country or region before: China

Applicant before: NARI TECHNOLOGY Co.,Ltd.

Applicant before: NR ENGINEERING Co.,Ltd.

Applicant before: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant