CN115348295A - Data sharing method and device for offshore wind power equipment - Google Patents

Data sharing method and device for offshore wind power equipment Download PDF

Info

Publication number
CN115348295A
CN115348295A CN202211035649.8A CN202211035649A CN115348295A CN 115348295 A CN115348295 A CN 115348295A CN 202211035649 A CN202211035649 A CN 202211035649A CN 115348295 A CN115348295 A CN 115348295A
Authority
CN
China
Prior art keywords
data
importance
sharing
type
importance degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211035649.8A
Other languages
Chinese (zh)
Inventor
李婉
尹峥
庄宇飞
王晨
张露露
王斌
康晓非
王乐陶
王乾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Three Gorges Corp
Original Assignee
China Three Gorges Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Three Gorges Corp filed Critical China Three Gorges Corp
Priority to CN202211035649.8A priority Critical patent/CN115348295A/en
Publication of CN115348295A publication Critical patent/CN115348295A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Abstract

The invention discloses a method and a device for sharing data of offshore wind power equipment. The data sharing method for the offshore wind power equipment comprises the following steps: acquiring data from each device in the offshore wind power platform, and grading the importance degree of the data; carrying out data marking and encryption processing according to different importance degree grading and sharing requirements; after the importance degree of the data is graded, the shared area construction and encryption processing are carried out on the data needing to be shared. According to the invention, for important data such as power generation related data and equipment internal parameters of the offshore wind power equipment in the operation process, the data only related to the interaction part is stored in the sharing area, and the interaction operation is carried out in the sharing area, so that the interaction speed can be increased on the basis of ensuring the safety of the important data.

Description

Data sharing method and device for offshore wind power equipment
Technical Field
The invention relates to the field of intelligent power equipment safety management, in particular to a method and a device for sharing data of offshore wind power equipment.
Background
The offshore wind farm operation and maintenance management method is single, and the intelligent management of operation and maintenance resources such as operation and maintenance personnel, operation and maintenance ships, equipment, spare parts and the like is lacked, at present, the operation and maintenance work of the offshore wind farm is mainly managed by adopting a manual method, along with the continuous accumulation of the operation time of wind power equipment and the continuous increase of the number of fans put into operation, the operation and maintenance data volume of the offshore wind farm is continuously increased, and the operation and maintenance data volume comprises a plurality of important data, the data face security risks such as stealing in network transmission, and the operation and maintenance management workload is doubled. The traditional safe operation and maintenance mode and the risk management efficiency of the offshore wind power plant are low, the operation and maintenance cost is high, and the healthy development of the offshore wind power industry is severely restricted.
Disclosure of Invention
In view of the above problems, the present invention has been made to provide a technical solution to overcome the above problems. Accordingly, in one aspect of the present invention, a data sharing method for an offshore wind power plant is provided, the method comprising:
(1) Acquiring data from each device in the offshore wind power platform, and grading the importance degree of the data;
(2) Carrying out data marking and encryption processing according to different importance degree grading and sharing requirements;
(3) After the importance degree of the obtained data is graded, the shared area construction and encryption processing are carried out on the data needing to be shared.
Optionally, the importance level rating is based on the content of the data itself, the data source and the data target, specifically: firstly, acquiring the content of data, the type of data source equipment and the type of data target equipment; secondly, calculating the importance index of the data based on the importance degree values of the four types, namely the type of the data source equipment, the type of the data target equipment, the type of the parameters and the quantity of the parameters; and finally, obtaining importance degree grading according to the importance degree index I of the data.
Optionally, the importance index of the data itself is specifically:
I=a*P+b*R+c*T+d*Q
a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, Q is the importance degree value of the parameter quantity, and the value range of each value is 0-100.
Optionally, the step (2) specifically includes: since the higher the importance level is, the more important the data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low, or no interaction or sharing is required, the storage process is not encrypted.
Optionally, the step (3) specifically includes: firstly, establishing a sharing area according to the requests of two sharing parties, wherein the sharing area is established in a storage unit and is accessed by the two sharing parties; and secondly, distributing a public key to the sharing parties according to the sharing area identification, wherein the public key is used for accessing the data of the sharing area.
On the other hand, the invention also provides a data sharing device for the offshore wind power equipment, which comprises:
the data grading module is used for acquiring data from each device in the offshore wind power platform and grading the importance degree of the data;
the data marking and encrypting module is used for marking and encrypting data according to different importance degree grades and sharing requirements;
and the shared area construction module is used for constructing and encrypting the shared area aiming at the data to be shared after the importance degree of the data is graded.
Optionally, the data classification module includes:
the acquisition submodule is used for acquiring the content of the data, the type of data source equipment and the type of data target equipment;
the calculation submodule is used for calculating the importance index of the data based on the importance numerical values of the four types, namely the data source equipment type, the data target equipment type, the parameter type and the parameter quantity;
and the grading submodule is used for obtaining the importance grade according to the importance index of the data.
Optionally, the importance index of the data in the calculation sub-module is specifically:
I=a*P+b*R+c*T+d*Q
i is an importance index of the data; a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, Q is the importance degree value of the parameter quantity, and the value range of each value is 0-100.
Optionally, the data mark encryption module is specifically configured to: since the higher the level of importance is, the more important the description data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low or no interaction or sharing is required, the storage process is not encrypted.
Optionally, the shared area constructing module includes:
the establishing submodule is used for establishing a sharing area according to the requests of the sharing parties, the sharing area is established in the storage unit, and meanwhile, the sharing parties access the sharing area;
and the distribution submodule is used for distributing a public key to the sharing parties according to the sharing area identification, and the public key is used for accessing the data of the sharing area.
Due to the adoption of the technical scheme, the invention can achieve the following beneficial effects: for important data such as power generation related data and equipment internal parameters of the offshore wind power equipment in the operation process, the data only related to the interaction part is stored in the shared area, and interaction operation is carried out in the shared area, so that the interaction speed can be increased on the basis of ensuring the safety of the important data.
Drawings
Various additional advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings.
In the drawings:
FIG. 1 is a flow chart of an offshore wind power plant data sharing method of the present invention;
FIG. 2 is a block diagram of the data sharing device of the offshore wind power equipment.
These drawings and the description are not intended to limit the scope of the inventive concept in any way, but rather to illustrate it by those skilled in the art with reference to specific embodiments.
Detailed Description
Reference now will be made in detail to embodiments of the present application, one or more examples of which are illustrated in the drawings. Each example is provided by way of explanation of the application, not limitation of the application. In fact, it will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the scope or spirit of the application. For example, features illustrated or described as part of one embodiment can be used with another embodiment to yield a still further embodiment. Thus, it is intended that the present application cover such modifications and variations as come within the scope of the appended claims and their equivalents. As used in this specification, the terms "first," "second," and the like may be used interchangeably to distinguish one element from another and are not intended to indicate the position or importance of each element. As used in the specification, the terms "a," "an," "the," and "said" are intended to mean that there are one or more of the elements, unless the context clearly indicates otherwise. The terms "comprising," "including," and "having" are intended to be inclusive and mean that there may be additional elements other than the listed elements. Wherein like numerals indicate like elements throughout, the invention is further explained below in conjunction with the detailed description.
The invention discloses a data sharing method for offshore wind power equipment, which specifically comprises the following steps of S101 to S103 as shown in FIG. 1:
in step S101, data is acquired from each device in the offshore wind power platform, and importance levels of the data are classified. The importance ratings include high, medium and low.
The importance degree grading is graded according to the content of the data, the data source and the data target, and specifically:
first, the data content itself, the data source device type, and the data destination device type are obtained.
The data content comprises parameter types and parameter quantities, wherein the parameter types comprise equipment internal parameters, environment parameters, user accounts, power supply parameters, power generation parameters and the like, the parameter quantities are specific quantities of each type of parameter, the data source equipment types comprise offshore wind power platform internal equipment such as power generation equipment, monitoring equipment, inspection equipment, power transformation equipment and the like, and the data target equipment types comprise external equipment in remote communication with the offshore wind power platform equipment such as remote management equipment, power supply stations, remote user equipment and the like.
Secondly, calculating the importance index of the data based on the importance degree values of the four types, namely the type of the data source equipment, the type of the data target equipment, the type of the parameters and the quantity of the parameters.
The parameter types comprise confidential information or equipment internal parameters, even security parameters related to the offshore wind power platform;
the data source equipment type comprises offshore wind power platform core equipment, if the core equipment information is tampered or damaged, the whole platform can not normally operate, and if key data in part of the core equipment is stolen, innovative technology and economic loss can be caused;
the data target equipment type comprises equipment for ensuring power supply safety or property information of part of users; for the core parameter or the important parameter, the parameter level is not influenced no matter how many parameters are, but the higher the number of parameters is, the higher the risk of stealing is.
Therefore, the data source device type, the data destination device type, the parameter type and the parameter quantity are the parameter type, the data source device type, the data destination device type and the parameter quantity in order from high to low according to the importance value. The weighting factors for the data source device type, the data destination device type, the parameter type, and the number of parameters are different.
Therefore, the importance index of the calculation data itself is specifically:
I=a*P+b*R+c*T+d*Q
i is an importance index of the data; a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, Q is the importance degree value of the parameter quantity, and the value range of each value is 0-100.
And finally, obtaining importance degree grading according to the importance degree index I of the data.
The importance index is set to 0-100, and the importance index is set to 0-45 to low, 46-80 to medium, and 81-100 to high.
And determining the importance degree grading of the data according to the specific numerical value of the importance index I.
For example: after the DATA DATA1 is received, the obtained parameter types are internal operation parameters of the core power generation equipment, the number of the parameters is 10, the DATA source equipment type is the core power generation equipment, and the DATA target equipment type is the remote monitoring equipment.
Weighting coefficients a =0.5, b =0.25, c =0.15, d =0.1;
the importance degree value P =100 of the parameter type, the importance degree value R =95 of the data source device type, the importance degree value T =90 of the data destination device type, and the importance degree value Q =85 of the parameter number.
The importance indexes of the data are specifically as follows:
I=0.5*100+0.25*95+0.15*90+0.1*85=95.75
therefore, the degree of importance of the data itself is determined to be ranked high according to the specific numerical value of the importance index 95.75.
And the following steps: after the DATA DATA2 is received, the parameter types are acquired as environmental parameters, the number of the parameters is 7, the DATA source equipment type is routing inspection equipment, and the DATA target equipment type is remote monitoring equipment.
Weighting coefficients a =0.5, b =0.25, c =0.15, d =0.1;
the importance degree value P =25 of the parameter type, the importance degree value R =65 of the data source device type, the importance degree value T =90 of the data target device type, and the importance degree value Q =10 of the parameter number.
The importance indexes of the data are specifically as follows:
I=0.5*25+0.25*65+0.15*90+0.1*10=43.25
therefore, the importance level of the data itself is determined to be ranked low according to the specific numerical value of the importance index 43.25.
In step S102, data marking and encryption processing is performed for different importance levels and sharing requirements.
The method specifically comprises the following steps: since the higher the importance level is, the more important the data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low, or no interaction or sharing is required, the unencrypted storage process may be considered.
When the importance degree of the data is graded to be high and sharing is needed, encrypting by two layers of keys;
when the importance degree of the data is classified into high level and sharing is not needed, a layer of key is encrypted;
when the importance degree of the data is classified into a middle level and the data needs to be shared, encrypting a layer of secret key;
when the importance degree of the data is classified as middle level and the data does not need to be shared, encryption is not needed;
when the importance of the data itself is ranked low and no encryption is required, whether or not sharing is required.
For example, since the DATA1 is classified into high-level DATA, if sharing is required, first, encryption is performed using the first key, and then, when sharing is performed, two-level encryption is performed using the second key; if sharing is not required, only one layer of encryption is performed using key one.
For another example, with the DATA2 described above, since the degree of importance is ranked low, no encryption is required regardless of whether sharing is required.
In addition, if the importance level of DATA3 is classified as middle level and needs to be shared, one layer of encryption is performed by using the first secret key during sharing; and if sharing is not needed, encryption is not needed.
In step S103, after the acquired data is ranked in importance, shared area construction and encryption processing are performed for the data that needs to be shared.
The method specifically comprises the following steps:
firstly, establishing a sharing area according to the requests of two sharing parties, wherein the sharing area is established in a storage unit and is accessed by the two sharing parties;
secondly, distributing public keys to the sharing parties according to the sharing area identification, wherein the public keys are used for accessing the sharing area data;
the data source device sends the data related to sharing to the sharing area in advance, if the importance level of the data is high, the public key is used for carrying out two-layer encryption on the encrypted high-level data; then, the data target device reads and decrypts data in the shared area by using the public key to obtain a layer of encrypted high-level data; if the importance degree level of the data is middle level, the public key is used for carrying out one-layer encryption; then, the data target device reads and decrypts the data in the shared area by using the public key; if the importance level of the data is low, the data target apparatus does not use the public key and performs data reading in the shared area.
The invention also discloses a data sharing device for offshore wind power equipment, which specifically comprises the following components: a data ranking module 1001, a data marker encryption module 1002, and a shared area construction module 1003.
The data grading module 1001 is used for acquiring data from each device in the offshore wind power platform and grading the importance of the data.
The importance ratings include high, medium and low.
In the data grading module 1001, the importance degree grading is graded according to the content of the data itself, the data source and the data target, and specifically includes an acquisition sub-module, a calculation sub-module and a grading sub-module.
And the acquisition sub-module is used for acquiring the content of the data, the type of the data source equipment and the type of the data target equipment.
The data content comprises parameter types and parameter quantities, wherein the parameter types comprise equipment internal parameters, environment parameters, user accounts, power supply parameters, power generation parameters and the like, the parameter quantities are specific quantities of each type of parameter, the data source equipment types comprise offshore wind power platform internal equipment such as power generation equipment, monitoring equipment, inspection equipment, power transformation equipment and the like, and the data target equipment types comprise external equipment in remote communication with the offshore wind power platform equipment such as remote management equipment, power supply stations, remote user equipment and the like.
And the calculating submodule is used for calculating the importance index of the data based on the importance degree values of the four types, namely the data source equipment type, the data target equipment type, the parameter type and the parameter quantity.
The parameter types comprise confidential information or equipment internal parameters, even security parameters related to the offshore wind power platform;
the data source equipment type comprises offshore wind power platform core equipment, if the core equipment information is tampered or damaged, the whole platform can not normally operate, and if key data in part of the core equipment is stolen, innovative technology and economic loss can be caused;
the data target equipment type comprises equipment for ensuring power supply safety or property information of part of users; for the core parameter or the important parameter, the parameter level is not influenced no matter how many parameters are, but the higher the number of parameters is, the higher the risk of stealing the parameter is.
Therefore, the data source device type, the data destination device type, the parameter type and the parameter quantity are the parameter type, the data source device type, the data destination device type and the parameter quantity in order from high to low according to the importance value. The weighting factors for the data source device type, the data destination device type, the parameter type, and the number of parameters are different.
Therefore, the importance index of the calculation data itself is specifically:
I=a*P+b*R+c*T+d*Q
i is an importance index of the data; a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, Q is the importance degree value of the parameter quantity, and the value range of each value is 0-100.
And the grading submodule is used for obtaining the importance grade according to the importance index I of the data.
The importance index is set to 0-100, and the importance index is set to 0-45 to low, 46-80 to medium, and 81-100 to high.
And determining the importance degree grading of the data according to the specific numerical value of the importance index I.
For example: after the DATA DATA1 is received, the parameter types of the DATA DATA1 are acquired as the internal operation parameters of the core power generation equipment, the number of the parameters is 10, the DATA source equipment type is the core power generation equipment, and the DATA target equipment type is the remote monitoring equipment.
Weighting coefficients a =0.5, b =0.25, c =0.15, d =0.1;
the importance degree value P =100 of the parameter type, the importance degree value R =95 of the data source device type, the importance degree value T =90 of the data destination device type, and the importance degree value Q =85 of the parameter number.
The importance indexes of the data are specifically as follows:
I=0.5*100+0.25*95+0.15*90+0.1*85=95.75
therefore, the degree of importance of the data itself is determined to be ranked high according to the specific numerical value of the importance index 95.75.
The following steps are repeated: after the DATA DATA2 is received, the parameter types are acquired as environmental parameters, the number of the parameters is 7, the DATA source equipment type is routing inspection equipment, and the DATA target equipment type is remote monitoring equipment.
Weighting coefficients a =0.5, b =0.25, c =0.15, d =0.1;
the importance degree value P =25 of the parameter type, the importance degree value R =65 of the data source device type, the importance degree value T =90 of the data target device type, and the importance degree value Q =10 of the parameter number.
The importance indexes of the data are specifically as follows:
I=0.5*25+0.25*65+0.15*90+0.1*10=43.25
therefore, the importance level of the data itself is determined to be ranked low according to the specific numerical value of the importance index 43.25.
And the data marking encryption module 1002 is used for carrying out data marking and encryption processing according to different importance degree grading and sharing requirements.
The data mark encryption module 1002 is specifically configured to: since the higher the importance level is, the more important the data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low, or if no interaction or sharing is required, it is considered to perform the storage processing without encryption.
The data mark encryption module 1002 is specifically configured to encrypt the data by two layers of keys when the importance of the data is classified as high-level and the data needs to be shared;
when the importance degree of the data is classified into high level and the sharing is not needed, a layer of secret key is used for encryption;
when the importance degree of the data is classified into a middle level and the data needs to be shared, encrypting a layer of secret key;
when the importance degree of the data is classified into a middle level and the data does not need to be shared, encryption is not needed;
when the importance of the data itself is ranked low and no encryption is required, whether or not sharing is required.
For example, since the DATA1 is classified into high-level DATA, if sharing is required, first, encryption is performed using the first key, and then, when sharing is performed, two-level encryption is performed using the second key; if sharing is not required, only one layer of encryption is performed using the key one.
For another example, with the DATA2 described above, since the degree of importance is ranked low, no encryption is required regardless of whether sharing is required.
In addition, if the importance level of DATA3 is classified as middle level and needs to be shared, one layer of encryption is performed by using the first secret key during sharing; and if sharing is not needed, encryption is not needed.
The shared area constructing module 1003 is configured to perform shared area construction and encryption processing on data that needs to be shared after the obtained data is subjected to importance level classification.
The shared region construction module 1003 includes a construction sub-module and an allocation sub-module.
The establishing submodule is used for establishing a sharing area according to the requests of the sharing parties, the sharing area is established in the storage unit, and meanwhile, the sharing parties access the sharing area;
the distribution submodule is used for distributing a public key to the sharing parties according to the sharing area identification, and the public key is used for accessing the data of the sharing area;
the data source device sends the data related to sharing to the sharing area in advance, if the importance level of the data is high, the public key is used for carrying out two-layer encryption on the encrypted high-level data; then, the data target device reads and decrypts data in the shared area by using the public key to obtain a layer of encrypted high-level data; if the importance degree level of the data is middle level, the public key is used for carrying out one-layer encryption; then, the data target device reads and decrypts the data in the shared area by using the public key; if the importance level of the data is low, the data target device does not use the public key and performs data reading in the shared area.
In one or more exemplary designs, the functions described in the embodiments of the present invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
The preferred embodiments of the present disclosure are described above with reference to the drawings, but the present disclosure is of course not limited to the above examples. Various changes and modifications within the scope of the appended claims may be made by those skilled in the art, and it should be understood that these changes and modifications naturally will fall within the technical scope of the present disclosure.
In this specification, the steps described in the flowcharts include not only the processing performed in time series in order but also the processing performed in parallel or individually without necessarily being performed in time series. Further, even in the steps processed in time series, needless to say, the order can be changed as appropriate.
All of the above description is only an embodiment of the present invention, and the scope of the present invention is not limited thereto. Any changes or substitutions may be readily made by those skilled in the art. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for sharing data of offshore wind power equipment, the method comprising:
acquiring data from each device in the offshore wind power platform, and grading the importance degree of the data;
carrying out data marking and encryption processing according to different importance degree grades and sharing requirements;
and after the importance degree of the data is graded, constructing a shared area and encrypting the data to be shared.
2. The method of claim 1, wherein said ranking of importance is based on the content of the data itself, the source of the data, and the destination of the data, and wherein said ranking of importance of said data comprises:
acquiring the content of data, the type of data source equipment and the type of data target equipment;
calculating the importance index of the data based on the importance degree values of the four types, namely the type of the data source equipment, the type of the data target equipment, the type of the parameters and the quantity of the parameters;
and obtaining the importance degree grading according to the importance degree index of the data.
3. The method according to claim 2, wherein the data importance indicators are specifically:
I=a*P+b*R+c*T+d*Q
i is an importance index of the data; a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, and Q is the importance degree value of the parameter quantity.
4. The method of claim 1, wherein the data tagging and encryption for different importance ratings and sharing requirements comprises:
since the higher the importance level is, the more important the data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low, or no interaction or sharing is required, the storage process is not encrypted.
5. The method of claim 1, wherein after the data is ranked in importance, performing shared area construction and encryption processing on the data to be shared comprises:
establishing a sharing area according to the requests of the sharing parties, wherein the sharing area is established in a storage unit and is accessed by the sharing parties;
and distributing a public key to both sharing parties according to the sharing area identification, wherein the public key is used for accessing the data of the sharing area.
6. An offshore wind power equipment data sharing device, characterized in that the device comprises:
the data grading module is used for acquiring data from each device in the offshore wind power platform and grading the importance degree of the data;
the data marking and encrypting module is used for marking and encrypting data according to different importance degree grades and sharing requirements;
and the shared area construction module is used for constructing and encrypting the shared area aiming at the data needing to be shared after the importance degree of the data is graded.
7. The apparatus of claim 6, wherein the importance ranking is ranked according to the content of the data itself, the source of the data, and the target of the data, and the data ranking module comprises:
the acquisition submodule is used for acquiring the content of the data, the type of data source equipment and the type of data target equipment;
the calculation submodule is used for calculating the importance index of the data based on the importance numerical values of the four types, namely the data source equipment type, the data target equipment type, the parameter type and the parameter quantity;
and the grading submodule is used for obtaining the importance grade according to the importance index of the data.
8. The apparatus according to claim 7, wherein the importance indicators of the data themselves in the calculation sub-module are:
I=a*P+b*R+c*T+d*Q
i is an importance index of the data; a. b, c and d are weighting coefficients, a > b > c > d; p is the importance degree value of the parameter type, R is the importance degree value of the data source equipment type, T is the importance degree value of the data target equipment type, and Q is the importance degree value of the parameter quantity.
9. The apparatus of claim 6, wherein the data tag encryption module is specifically configured to: since the higher the level of importance is, the more important the description data content is, and the greater the risk in the interaction and sharing process is, the encryption processing is required; if the importance level is low or no interaction or sharing is required, the storage process is not encrypted.
10. The apparatus of claim 6, wherein the shared region construction module comprises:
the establishing submodule is used for establishing a sharing area according to the requests of the sharing parties, the sharing area is established in the storage unit, and meanwhile, the sharing parties access the sharing area;
and the distribution submodule is used for distributing a public key to the sharing parties according to the sharing area identification, and the public key is used for accessing the data of the sharing area.
CN202211035649.8A 2022-08-26 2022-08-26 Data sharing method and device for offshore wind power equipment Pending CN115348295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211035649.8A CN115348295A (en) 2022-08-26 2022-08-26 Data sharing method and device for offshore wind power equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211035649.8A CN115348295A (en) 2022-08-26 2022-08-26 Data sharing method and device for offshore wind power equipment

Publications (1)

Publication Number Publication Date
CN115348295A true CN115348295A (en) 2022-11-15

Family

ID=83954547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211035649.8A Pending CN115348295A (en) 2022-08-26 2022-08-26 Data sharing method and device for offshore wind power equipment

Country Status (1)

Country Link
CN (1) CN115348295A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160162693A1 (en) * 2014-12-09 2016-06-09 International Business Machines Corporation Automated management of confidential data in cloud environments
CN111711651A (en) * 2020-04-24 2020-09-25 中国电力科学研究院有限公司 New energy data sharing method and system
US20210390190A1 (en) * 2020-06-16 2021-12-16 The Toronto-Dominion Bank System and method for automatically determining privacy settings for sharing data
CN113890891A (en) * 2021-10-11 2022-01-04 国网电子商务有限公司 Data sharing interaction method and device of energy cloud network
CN114138731A (en) * 2021-12-07 2022-03-04 成都合梦天地信息技术有限公司 Smart city data sharing method and system based on big data
CN114567447A (en) * 2022-04-26 2022-05-31 佳瑛科技有限公司 Data sharing management method and device based on cloud server
CN114911868A (en) * 2022-04-20 2022-08-16 徐奎国 Data information sharing system based on block chain and cloud platform thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160162693A1 (en) * 2014-12-09 2016-06-09 International Business Machines Corporation Automated management of confidential data in cloud environments
CN111711651A (en) * 2020-04-24 2020-09-25 中国电力科学研究院有限公司 New energy data sharing method and system
US20210390190A1 (en) * 2020-06-16 2021-12-16 The Toronto-Dominion Bank System and method for automatically determining privacy settings for sharing data
CN113890891A (en) * 2021-10-11 2022-01-04 国网电子商务有限公司 Data sharing interaction method and device of energy cloud network
CN114138731A (en) * 2021-12-07 2022-03-04 成都合梦天地信息技术有限公司 Smart city data sharing method and system based on big data
CN114911868A (en) * 2022-04-20 2022-08-16 徐奎国 Data information sharing system based on block chain and cloud platform thereof
CN114567447A (en) * 2022-04-26 2022-05-31 佳瑛科技有限公司 Data sharing management method and device based on cloud server

Similar Documents

Publication Publication Date Title
CN108763463B (en) Digital archive system based on block chain
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN111726353A (en) Sensitive data grading protection method and grading protection system based on numerical control system
CN107645403A (en) Terminal rule engine apparatus, terminal rule operation method
CN106919476A (en) Data safety backup method, client and cloud server terminal based on alliance's chain
CN103179126A (en) Access control method and device
CN112532718B (en) Block chain based offshore equipment data sharing system, method and medium
CN109359836A (en) A kind of wisdom building system based on block chain and RFID technique
CN110110528A (en) Safety risk estimating method, device and the equipment of information system
Duggineni Innovative Techniques in Clinical Informatics
CN112149784A (en) Electronic tag optical cable and electronic tag management system
Kiruthika et al. Fusion of IoT, blockchain and artificial intelligence for developing smart cities
CN107633386A (en) Management method, system, equipment and the storage medium of network terminal information
Miller et al. Data Management Life Cycle, Final report
WO2012123970A2 (en) A method of optimizing asset risk controls
CN109903046A (en) User data management and device based on block chain
CN115348295A (en) Data sharing method and device for offshore wind power equipment
CN103577963A (en) Implement system of full life circle reverse logistics system design based on ecological value
Levite et al. Cloud governance challenges: A survey of policy and regulatory issues
CN113051283A (en) Data processing method and device for application market, storage medium and electronic equipment
CN110110499A (en) A kind of big data really weighs method and its system
CN114254373B (en) Encryption transmission method, device and system
Shoemaker Exploring Strategies for Developing a Big Data Cybersecurity Analytics System for Industry 4.0 Cyber-Physical Architectures
CN115481108B (en) Management method and system for same data among different departments
Nogueira et al. E-discovery as a mean to improve information security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination