CN115879437A - Hash algorithm-based configuration file control method and terminal - Google Patents

Hash algorithm-based configuration file control method and terminal Download PDF

Info

Publication number
CN115879437A
CN115879437A CN202211338491.1A CN202211338491A CN115879437A CN 115879437 A CN115879437 A CN 115879437A CN 202211338491 A CN202211338491 A CN 202211338491A CN 115879437 A CN115879437 A CN 115879437A
Authority
CN
China
Prior art keywords
configuration file
ied
hash algorithm
ied instance
sha1 value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211338491.1A
Other languages
Chinese (zh)
Inventor
郭威
宋福海
周成龙
包必顺
翟博龙
林敏辉
郑剑毅
吴桐
陈莹
陈晓林
叶翔
何君
周奕帆
马国亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NR Engineering Co Ltd
State Grid Fujian Electric Power Co Ltd
Xiamen Power Supply Co of State Grid Fujian Electric Power Co Ltd
Original Assignee
NR Engineering Co Ltd
State Grid Fujian Electric Power Co Ltd
Xiamen Power Supply Co of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NR Engineering Co Ltd, State Grid Fujian Electric Power Co Ltd, Xiamen Power Supply Co of State Grid Fujian Electric Power Co Ltd filed Critical NR Engineering Co Ltd
Priority to CN202211338491.1A priority Critical patent/CN115879437A/en
Publication of CN115879437A publication Critical patent/CN115879437A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a configuration file management and control method and a terminal based on a Hash algorithm, wherein after a first IED instance configuration file is exported from a total station system configuration file, hash calculation is carried out on preset contents in the first IED instance configuration file to obtain a first SHA1 value; and periodically uploading a first IED instance configuration file, and comparing a hash calculation result of preset content of the running configuration file with a first SHA1 value and carrying out inconsistent alarm. Therefore, the SHA1 value with the highest safety in the Hash algorithm has a good avalanche effect, and is safer and more reliable compared with the CRC value and the MD5 value; the preset content of the IED instance configuration file is adopted for checking calculation, the traditional full-text checking is not needed, some inconsistent configuration alarms caused by non-critical and non-functional changes can be effectively eliminated, and the practicability of the configuration management result is improved.

Description

Hash algorithm-based configuration file control method and terminal
Technical Field
The invention relates to the technical field of configuration file management and control, in particular to a configuration file management and control method and a terminal based on a Hash algorithm.
Background
With the popularization and application of the intelligent transformer substation in China, compared with the traditional conventional transformer substation, the optical signal of the intelligent transformer substation replaces the electric signal, the information flow direction among the intelligent devices is described in a configuration file form, and new requirements are provided for operation and maintenance work of the transformer substation.
At present, in practical application, the requirements of reconstruction and extension of an intelligent substation and daily operation, maintenance and repair cannot be met due to extensive management of configuration files and disordered versions of the configuration files. The existing configuration management technology is based on a CRC value or an MD5 value, the length of a CRC check bit is generally 16 bits or 32 bits, MD5 is 16 bytes, that is, 128 bits, and the security of the check mode has a great relationship with the algorithm capacity, where the security refers to the capability of error detection, that is, an error of data can be detected through the check bit.
Therefore, the existing configuration management verification has the problems of poor safety and poor practicability.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the configuration file management and control method and the terminal based on the Hash algorithm are provided, and the safety and the practicability of the configuration file management and control can be improved.
In order to solve the technical problems, the invention adopts the technical scheme that:
a configuration file management and control method based on a Hash algorithm comprises the following steps:
deriving a first IED instance configuration file from a total station system configuration file of a transformer substation, and calculating a first SHA1 value of preset content in the first IED instance configuration file based on a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison results are different, performing early warning on inconsistency of the configuration files.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a configuration file management and control terminal based on a hash algorithm comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the following steps:
the method comprises the steps that a first IED instance configuration file is derived from a total station system configuration file of a transformer substation, and a first SHA1 value of preset content in the first IED instance configuration file is calculated on the basis of a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison results are different, performing early warning on inconsistency of the configuration files.
The invention has the beneficial effects that: after a first IED instance configuration file is exported from a total station system configuration file, performing hash calculation on preset contents in the first IED instance configuration file to obtain a first SHA1 value; and periodically uploading a first IED instance configuration file, and comparing a hash calculation result of preset content of the running configuration file with a first SHA1 value and carrying out inconsistent alarm. Therefore, the SHA1 value with the highest safety in the Hash algorithm has a good avalanche effect, and is safer and more reliable compared with a CRC value and an MD5 value; the preset content of the IED instance configuration file is adopted for verification calculation, the traditional full-text verification is not needed, some inconsistent configuration alarms caused by noncritical and nonfunctional changes can be effectively eliminated, and the practicability of the configuration management result is improved.
Drawings
Fig. 1 is a flowchart of a configuration file management and control method based on a hash algorithm according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a configuration file management and control terminal based on a hash algorithm according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating specific steps of a method for managing and controlling a configuration file based on a hash algorithm according to an embodiment of the present invention;
description of reference numerals:
1. a configuration file management and control terminal based on a Hash algorithm; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, an embodiment of the present invention provides a configuration file management and control method based on a hash algorithm, including:
deriving a first IED instance configuration file from a total station system configuration file of a transformer substation, and calculating a first SHA1 value of preset content in the first IED instance configuration file based on a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison result is different, performing early warning on inconsistency of the configuration files.
From the above description, the beneficial effects of the present invention are: after a first IED instance configuration file is exported from a total station system configuration file, performing hash calculation on preset contents in the first IED instance configuration file to obtain a first SHA1 value; and periodically uploading a first IED instance configuration file, and comparing a hash calculation result of preset content of the running configuration file with a first SHA1 value and carrying out inconsistent alarm. Therefore, the SHA1 value with the highest safety in the Hash algorithm has a good avalanche effect, and is safer and more reliable compared with the CRC value and the MD5 value; the preset content of the IED instance configuration file is adopted for verification calculation, the traditional full-text verification is not needed, some inconsistent configuration alarms caused by noncritical and nonfunctional changes can be effectively eliminated, and the practicability of the configuration management result is improved.
Further, the method also comprises the following steps:
if a second IED instance configuration file installed online is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm;
and judging whether the comparison result of the third SHA1 value and the first SHA1 value is the same, and if not, performing early warning of inconsistent configuration files.
According to the description, the IED instance configuration file is installed on line, so that the consistency alarm can be performed on the online installed configuration file, and the practicability of configuration file management and control is improved.
Further, if a second IED instance profile installed online is received, calculating a third SHA1 value of preset content in the second IED instance profile based on a hash algorithm includes:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm, and obtaining the third SHA1 value according to a preset period.
Further, the receiving a second IED instance profile for an online installation includes:
and receiving a second IED instance configuration file installed online, downloading the second IED instance configuration file, and monitoring the second IED instance configuration file.
According to the above description, the SHA1 value parameters of the preset contents in the monitored IED instance configuration file are called periodically, and the accuracy and the effectiveness of the configuration file management and control are ensured.
Further, the preset contents include a Communication section, an IED section, and DataTypeTemplates section.
As can be seen from the above description, the Communication section, the IED section, and the DataTypeTemplates section are all core contents of the configuration file, and hash check is performed on the three fields in the configuration file, so that the misjudgment rate can be reduced.
Referring to fig. 2, another embodiment of the present invention provides a configuration file management and control terminal based on a hash algorithm, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following steps when executing the computer program:
the method comprises the steps that a first IED instance configuration file is derived from a total station system configuration file of a transformer substation, and a first SHA1 value of preset content in the first IED instance configuration file is calculated on the basis of a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison results are different, performing early warning on inconsistency of the configuration files.
As can be seen from the above description, after a first IED instance configuration file is derived from a total station system configuration file, hash calculation is performed on preset contents in the first IED instance configuration file to obtain a first SHA1 value; and periodically uploading a first IED instance configuration file, and comparing a hash calculation result of preset content of the running configuration file with a first SHA1 value and carrying out inconsistent alarm. Therefore, the SHA1 value with the highest safety in the Hash algorithm has a good avalanche effect, and is safer and more reliable compared with a CRC value and an MD5 value; the preset content of the IED instance configuration file is adopted for checking calculation, the traditional full-text checking is not needed, some inconsistent configuration alarms caused by non-critical and non-functional changes can be effectively eliminated, and the practicability of the configuration management result is improved.
Further, still include:
if a second IED instance configuration file installed online is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm;
and judging whether the comparison result of the third SHA1 value and the first SHA1 value is the same, and if not, performing early warning of inconsistent configuration files.
According to the description, the IED instance configuration file is installed on line, so that the consistency alarm can be performed on the online installed configuration file, and the practicability of configuration file management and control is improved.
Further, if a second IED instance profile installed online is received, calculating a third SHA1 value of preset content in the second IED instance profile based on a hash algorithm includes:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm, and obtaining the third SHA1 value according to a preset period.
Further, the receiving a second IED instance profile for an online installation includes:
and receiving a second IED instance configuration file installed online, downloading the second IED instance configuration file, and monitoring the second IED instance configuration file.
According to the above description, the SHA1 value parameters of the preset contents in the monitored IED instance configuration file are called periodically, and the accuracy and the effectiveness of the configuration file management and control are ensured.
Further, the preset contents include a Communication section, an IED section, and DataTypeTemplates section.
As can be seen from the above description, the Communication section, the IED section, and the DataTypeTemplates section are all core contents of the configuration file, and hash check is performed on the three fields in the configuration file, so that the misjudgment rate can be reduced.
The configuration file control method and the terminal based on the hash algorithm are suitable for controlling the configuration description file of the online relay protection device, can improve the safety and the practicability of the control of the configuration file, and are explained through specific implementation modes as follows:
example one
Referring to fig. 1 and 3, a configuration file management and control method based on a hash algorithm includes the steps of:
s1, deriving a first IED instance configuration file (CID) from a total Station Configuration Description (SCD) of a transformer substation, and calculating a first SHA1 value of preset content in the first IED instance configuration file based on a hash algorithm.
In this embodiment, a first device CID file is derived by a configuration file management and control system based on an SCD file filed by a substation, a first SHA1 value of preset content of the file is calculated by using a hash algorithm, and the first SHA1 value is used as a reference value.
SHA1 is a data encryption algorithm whose thinking is to accept a section of plaintext and then convert it into a section of ciphertext in an irreversible manner, where ciphertext is generally smaller than plaintext and can be understood simply as a process of taking a string of input codes, called pre-mapping or information, and converting them into an output sequence, or hash value, with a short length and a fixed number of bits, also called information digest or information authentication code.
In this embodiment, the preset content is core content, and includes a Communication segment, an IED segment, and a DataTypeTemplates segment.
S2, installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison results are different, performing early warning on inconsistency of the configuration files.
In this embodiment, the management system periodically loads the first CID file operated by the device, calculates the second SHA1 value of the core content of the file, and compares the second SHA1 value with the reference value, and if the values are different, an alarm indicating inconsistent configuration is issued.
S3, if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm; and judging whether the comparison result of the third SHA1 value and the first SHA1 value is the same, if not, performing early warning of configuration file inconsistency.
Specifically, if the comparison result between the second SHA1 value and the first SHA1 value is the same, after receiving a second IED instance configuration file installed on line, downloading the second IED instance configuration file, monitoring the second IED instance configuration file, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a hash algorithm, and obtaining the third SHA1 value according to a preset period.
In this embodiment, after receiving a new second CID file, automatically calculating a third SHA1 value of the core content of the file by using a hash algorithm, updating the SHA1 value in the model device parameters, and supporting the management system to call the value in real time, where the management system periodically calls the third SHA1 value to compare with a reference value, and if the values are different, an alarm indicating inconsistent configuration is sent.
Therefore, the SHA1 value with the highest safety in the hash algorithm is adopted in the embodiment, the SHA1 value has the characteristics of non-reversibility and collision prevention, and has a good avalanche effect, and is safer and more reliable compared with a CRC value and an MD5 value; the core content of the CID file is checked and calculated, the traditional full-text check is not performed any more, configuration inconsistency alarms caused by non-key and non-functional changes can be effectively eliminated, and the practicability of configuration management results is improved.
Example two
Referring to fig. 2, a configuration file management and control terminal 1 based on a hash algorithm includes a memory 2, a processor 3, and a computer program stored on the memory 2 and capable of running on the processor 3, where the processor 3 implements each step of a configuration file management and control method based on a hash algorithm when executing the computer program.
In summary, according to the configuration file management and control method and the terminal based on the hash algorithm provided by the present invention, after a first IED instance configuration file is derived from a total station system configuration file, hash calculation is performed on preset contents in the first IED instance configuration file to obtain a first SHA1 value; and periodically uploading a first IED instance configuration file, and comparing a hash calculation result of preset content of the running configuration file with a first SHA1 value and carrying out inconsistent alarm. Therefore, the SHA1 value with the highest safety in the Hash algorithm has a good avalanche effect, and is safer and more reliable compared with the CRC value and the MD5 value; the preset content of the IED instance configuration file is adopted for checking calculation, the traditional full-text checking is not needed, some inconsistent configuration alarms caused by non-critical and non-functional changes can be effectively eliminated, and the practicability of the configuration management result is improved.
The above description is only an embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent modifications made by the present invention and the contents of the accompanying drawings, which are directly or indirectly applied to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A configuration file management and control method based on a Hash algorithm is characterized by comprising the following steps:
deriving a first IED instance configuration file from a total station system configuration file of a transformer substation, and calculating a first SHA1 value of preset content in the first IED instance configuration file based on a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison result is different, performing early warning on inconsistency of the configuration files.
2. The method for managing and controlling the configuration file based on the hash algorithm according to claim 1, further comprising:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm;
and judging whether the comparison result of the third SHA1 value and the first SHA1 value is the same, and if not, performing early warning of inconsistent configuration files.
3. The method according to claim 2, wherein if the second IED instance profile installed online is received, the calculating a third SHA1 value of the preset content in the second IED instance profile based on the hash algorithm comprises:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm, and obtaining the third SHA1 value according to a preset period.
4. A hash algorithm based profile management method according to claim 3, wherein the receiving of the second IED instance profile installed online comprises:
and receiving a second IED instance configuration file installed on line, downloading the second IED instance configuration file, and monitoring the second IED instance configuration file.
5. The hash-based profile management and control method according to any of claims 1 to 4, wherein the preset content includes a Communication segment, an IED segment and a DataTypetemplates segment.
6. A configuration file management and control terminal based on a hash algorithm comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the processor executes the computer program to realize the following steps:
the method comprises the steps that a first IED instance configuration file is derived from a total station system configuration file of a transformer substation, and a first SHA1 value of preset content in the first IED instance configuration file is calculated on the basis of a Hash algorithm;
and installing the first IED instance configuration file according to a preset period, comparing a second SHA1 value of preset content in the first IED instance configuration file with the first SHA1 value in real time, and if the comparison results are different, performing early warning on inconsistency of the configuration files.
7. The hash algorithm-based profile management and control terminal according to claim 6, further comprising:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm;
and judging whether the comparison result of the third SHA1 value and the first SHA1 value is the same, and if not, performing early warning of inconsistent configuration files.
8. A hash-based profile management and control terminal according to claim 7, wherein if the second IED instance profile installed online is received, the hash-based calculation of the third SHA1 value of the default content in the second IED instance profile comprises:
if a second IED instance configuration file installed on line is received, calculating a third SHA1 value of preset content in the second IED instance configuration file based on a Hash algorithm, and obtaining the third SHA1 value according to a preset period.
9. A hash algorithm based profile governance terminal according to claim 8, wherein the receiving of the second IED instance profile installed online comprises:
and receiving a second IED instance configuration file installed on line, downloading the second IED instance configuration file, and monitoring the second IED instance configuration file.
10. A hash algorithm based profile governance terminal according to any one of claims 6 to 9, wherein the preset content comprises a Communication segment, an IED segment and a DataTypeTemplates segment.
CN202211338491.1A 2022-10-28 2022-10-28 Hash algorithm-based configuration file control method and terminal Pending CN115879437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211338491.1A CN115879437A (en) 2022-10-28 2022-10-28 Hash algorithm-based configuration file control method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211338491.1A CN115879437A (en) 2022-10-28 2022-10-28 Hash algorithm-based configuration file control method and terminal

Publications (1)

Publication Number Publication Date
CN115879437A true CN115879437A (en) 2023-03-31

Family

ID=85759131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211338491.1A Pending CN115879437A (en) 2022-10-28 2022-10-28 Hash algorithm-based configuration file control method and terminal

Country Status (1)

Country Link
CN (1) CN115879437A (en)

Similar Documents

Publication Publication Date Title
CN109787356B (en) Transformer substation remote control anti-misoperation method and system based on IEC61850 protocol
CN114123518B (en) Digital intelligent detection method and monitoring system for transformer
US11029344B2 (en) Sensitivity based Thevenin index for voltage stability assessment considering N-1 contingency
CN104618064A (en) Monitoring method and device for static information based on CRC (Cyclic Redundancy Check) inspection
CN115879437A (en) Hash algorithm-based configuration file control method and terminal
CN116980958B (en) Radio equipment electric fault monitoring method and system based on data identification
CN111931012A (en) Data model self-adaption method and device based on fault management subsystem
CN116302755A (en) PSU fault injection test method, system, device and readable storage medium
CN113884943B (en) Leakage fault analysis method, device, equipment and medium
CN110647771B (en) Mysql database storage integrity verification protection method and device
CN112995130B (en) Electric power thing networking data transmission system
CN111146863A (en) Power safety detection method for transformer substation
KR100852718B1 (en) Method for tracing trip-cause in industrial plant
CN112510826B (en) Method for determining configuration change boundary of modification and extension intelligent recorder
KR101943900B1 (en) An integrated management system and method for managing one or more power generation company and determining whether the power generation company is abnormal
CN116742796A (en) Method and system for interaction of main station and sub station of intelligent substation configuration management and control system
CN112180186A (en) Automatic checking method for fixed value of intelligent substation relay protection device
CN117082108B (en) Internet of things communication method for intelligent low-voltage circuit breaker
CN116962072B (en) Automatic operation and maintenance method for secondary safety protection equipment of power dispatching data network
CN113595240B (en) Method, device, equipment and storage medium for detecting electric power data
Yang et al. Smart Substation Performance Evaluation Method Based on Network Traffic
CN116742797A (en) Online configuration information automatic inspection method and storage medium for intelligent substation
CN108170131B (en) Storm fault code analysis method
Chen et al. Reliability analysis of centralized protection system considering the impact of messages under multi-operating states
CN117353420A (en) Mobile power supply abnormality detection control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination