CN117332391A - Power distribution network data asset security access method and system considering authority hierarchical management and control - Google Patents

Power distribution network data asset security access method and system considering authority hierarchical management and control Download PDF

Info

Publication number
CN117332391A
CN117332391A CN202311233561.1A CN202311233561A CN117332391A CN 117332391 A CN117332391 A CN 117332391A CN 202311233561 A CN202311233561 A CN 202311233561A CN 117332391 A CN117332391 A CN 117332391A
Authority
CN
China
Prior art keywords
user
distribution network
data
power distribution
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311233561.1A
Other languages
Chinese (zh)
Inventor
龚钢军
柳旭
邢汇笛
刘礼
翟明岳
陆俊
苏畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China Electric Power University
Original Assignee
North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China Electric Power University filed Critical North China Electric Power University
Priority to CN202311233561.1A priority Critical patent/CN117332391A/en
Publication of CN117332391A publication Critical patent/CN117332391A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a power distribution network data asset security access method and system considering authority hierarchical management and control, which relate to the technical field of power grid data sharing and comprise the following steps: secure encryption of the data asset; by acquiring the legal identity of the user, adopting a deep learning algorithm, and intelligently matching the authority of the user according to the grade and service requirements of the user; providing encrypted data assets for users according to the successfully matched authorities, and decrypting according to a decryption method corresponding to the encryption method of the user identity; the invention adopts the zero knowledge proof algorithm to verify the identity of the user and also protect the personal privacy of the user of the power distribution network; the invention can judge the authority requirement of the user in real time, thereby providing a more intelligent and convenient authority management mode.

Description

Power distribution network data asset security access method and system considering authority hierarchical management and control
Technical Field
The invention relates to the technical field of power grid data sharing, in particular to a power distribution network data asset security access method and system considering authority hierarchical management and control.
Background
Along with the continuous development of novel distribution automation systems, huge value that distribution network digital asset was held is excavated and found gradually, and intelligent integration terminal is arranged at different nodes according to distribution network business difference, and the data resource of gathering is also very abundant, therefore when carrying out data sharing, the security of distribution network data asset access in-process faces huge challenge.
Various data collected by the intelligent fusion terminal are applied to different service scenes, users accessing and using data assets are also various, and legal identity authentication technology is adopted to ensure the identity legitimacy of the accessed users and prevent illegal users from accessing the data assets. Meanwhile, in order to ensure the normal operation of the novel power distribution network system, power distribution network operation and maintenance personnel are required to monitor power distribution network data analysis in real time to avoid risks, but the power distribution network data types are various, and how to quickly locate and match is also a concern.
With the continuous updating of the number of subjects and objects and the business flow in the data access process, the data asset access process is always under the weak trust condition, and in this case, an identity authentication technology adopting zero knowledge proof is developed, and by means of the zero knowledge proof, a user can prove the identity of the user to a verifier without revealing any specific information related to the identity, so that the potential attack risk is reduced.
In recent years, with the rise of machine learning, more and more advanced technologies make the algorithm difficult to deepen by means of machine learning, and acquire optimal parameters to optimize a training model. The main current identity authentication technology mostly depends on intelligent algorithms, but the combination of a user right management and control technology and a deep learning algorithm is less, so that the design of a power distribution network data asset security access technology considering right hierarchical management and control is urgently needed, and the privacy and security of users and power distribution network data assets are protected while the accuracy and timeliness of the user access data are ensured.
Disclosure of Invention
In order to solve the problems, the invention provides a power distribution network data asset security access method considering authority hierarchical management and control, which comprises the following steps:
secure encryption of the data asset;
by acquiring the legal identity of the user, adopting a deep learning algorithm, and intelligently matching the authority of the user according to the grade and service requirements of the user;
and providing the encrypted data asset for the user according to the successfully matched authority, and decrypting according to a decryption method corresponding to the encryption method of the user identity.
Preferably, the data asset is securely encrypted by the Paillier algorithm during the secure encryption of the data asset.
Preferably, in the process of acquiring the legal identity of the user, the user identity is encrypted according to an encryption method of the data asset, and the legal identity of the user is acquired by setting the legal identity of the user, wherein a zero knowledge proof algorithm is adopted to authenticate the user identity of the power distribution network, and the legal identity of the user is acquired.
Preferably, in the process of setting the validity of the user identity, the validity of the user identity is set by distributing user rights and defining user attribute information based on a grading rule of the user, wherein the user attribute information comprises the number of illegal records, the number of data access times, the number of times of accessing sensitive data and the duration of cooperation with the power distribution network.
Preferably, in the process of matching the authority of the user by adopting a deep learning algorithm, scaling the original data by a normalization method, and converting the scaled original data into dimensionless numerical values;
and obtaining the authority requirements of the user by analyzing the access history and the authority level of the user according to the grading rule, the user authority and the user attribute information through a deep learning algorithm.
Preferably, in the process of providing the data asset for the user, an access record library is established, the whole process of accessing the data asset by the user is recorded, and if the user has illegal behaviors when using the data asset, the authority level of the user is timely adjusted according to the access record, so that the legal and safe user is ensured to access the data asset of the power distribution network.
Preferably, during the recording of the user's entire process of accessing the data asset, each record includes the distribution network user identity information, the distribution network user permission level, the type and content of the data asset being accessed, the access duration, and the manager information for managing such data asset, and a different color identification is set for each record according to the user permission level.
The invention discloses a power distribution network data asset security access system considering authority hierarchical management and control, which comprises the following components:
the database module is used for storing data assets of the power distribution network and user identity information of users;
the database logic control module is used for controlling the database module to interact data with other modules of the system so as to realize the logic function of the system;
the data encryption module is used for carrying out safe encryption on the data asset;
the user authority matching module is used for intelligently matching the authority of the user according to the grade and service requirements of the user by acquiring the legal identity of the user and adopting a deep learning algorithm;
and the data decryption module is used for providing encrypted data assets for the user according to the successfully matched authorities and decrypting according to a decryption method corresponding to the encryption method of the user identity.
Preferably, the data encryption module is used for securely encrypting the data asset through the Paillier algorithm.
Preferably, the user right matching module is used for encrypting the user identity according to the encryption method of the data asset, and obtaining the legal identity of the user by setting the legal identity of the user.
The invention discloses the following technical effects:
(1) And encrypting the data asset by using a Paillier algorithm under the condition of weak trust for the access of the data asset of the power distribution network, so as to protect the security and privacy of the data asset. When the user performs identity authentication, the zero knowledge proof algorithm is adopted to verify the identity of the user, and meanwhile, the personal privacy of the user of the power distribution network is also protected.
(2) And establishing a user authority grading system for the secure access of the power distribution network data assets, dividing the users into different levels, wherein each level corresponds to different access authorities and functional ranges, ensuring that the users can only access the required data and operations, and avoiding the data from being accessed by unauthorized users.
(3) And optimizing the user authority control model by adopting a deep learning algorithm, and intelligently matching the authority of the user according to the grade and service requirements of the user. By analyzing the access history and the authority level of the user, the system can judge the authority requirement of the user in real time, thereby providing a more intelligent and convenient authority management mode.
(4) And (3) establishing an access record library, if the user has illegal and illegal behaviors when using the data asset, adjusting the user authority level in time according to the access record, ensuring that only legal and safe users access the data asset of the power distribution network, and ensuring the safety and reliability of the whole process of accessing the data asset.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a general power distribution network data asset security access technique according to the present invention;
FIG. 2 is a flowchart of the overall user authentication according to the present invention;
FIG. 3 is a schematic diagram of a user-level-rights relationship in accordance with the invention;
FIG. 4 is a diagram of a user rights management and control optimization architecture of the power distribution network according to the present invention;
FIG. 5 is a distribution network user level distribution graph according to the present invention;
FIG. 6 is a flow chart of the overall process of data asset access recording according to the present invention.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
As shown in fig. 1-6, the invention discloses a distribution network data asset security access technology considering authority hierarchical management and control, which comprises the following contents: secure encryption of data assets; the user verifies the legitimacy of the user through an identity authentication technology; issuing corresponding rights according to legal identity information administrators; the user accesses the corresponding data asset according to the authority of the user; substituting the result record into the deep neural network makes the later access more accurate and reliable. The whole flow of the technology is shown in figure 1:
step one: data asset security encryption:
along with the continuous update development of a novel power system, the value of the data assets of the power distribution network is continuously mined and found, but in the data asset access control process, the data assets are easy to leak, tamper and other safety problems, so that in order to ensure the safety and reliability of the power distribution network data assets obtained by users, the patent decides to adopt the Paillier algorithm to carry out privacy protection operation on the data assets, and the specific steps are as follows:
1) The public key G and the private key S are generated by a key generation algorithm.
Selecting two largest prime numbers a 1 And a 2 Calculate their product A 1 And least common multiple A 2
A 1 =a 1 *a 2 (1)
A 2 =lcm(a 1 -1,a 2 -1) (2)
A random number s is selected which is chosen,and satisfies the greatest common divisor:
wherein,
the presence is:
obtain the public key as G (A 1 S) with a private key S (A 2 ,u)。
Data asset encryption process:
for arbitrary data informationAny random number->Calculating to obtain ciphertext m':
after the user obtains the data asset, decrypting the obtained data asset:
wherein A is 1 Representing two random prime numbers a 1 ,a 2 Product of (A) 2 Is the least common multiple, a functions and u are part of the composition of the public and private keys, respectively.
Step two: user identity authentication:
because the scales of the power distribution network users and the data assets are continuously enlarged, the data asset business mode is continuously updated, and the data asset access process is always under the weak trust condition, therefore, the zero knowledge proof algorithm is adopted to authenticate the identity of the power distribution network users, and the external users and the internal users of the power distribution station respectively provide corresponding proof information for the power distribution network data asset manager to verify the legitimacy of the identity on the premise of not exposing the identity information of the power distribution station, and the method comprises the following specific implementation steps:
1) The public key G and the private key S are generated by the same Paillier key generation algorithm as the data asset encryption.
2) The distribution network data asset user provides a public key G and a derivable private key S to a data asset manager 2 And u and tag τ (related only to user level) to generate proof p.
Prove(G,A 2 ,u,τ)→p (8)
3) The data asset manager generates verification q through a public key G, a private key S and a tag tau provided by a user to verify a proof p and generate a Boolean function b epsilon {0,1} to determine the identity accuracy of the user, and if the Boolean function b is 1, the user passes identity authentication. The specific flow is shown in fig. 2.
Wherein,is an exclusive nor operation.
Step three: user rights grading:
in order to obtain the data assets to be accessed, after verifying the user identity information, the data asset manager should issue rights according to the user identity, and users with different levels access different data assets according to the rights of the users. The specific process of authority grading is as follows:
in order to make the user ranking more accurate, the user ranking criteria are defined as follows:
the relationship between the user and the rights (roles) is 1:N and N:1.
Each class of users has a different level.
The user with high level includes the rights of the user with low level, that is, the user with high level of operation that can be performed by the user with low level can also perform.
The level of the user may change, including upgrades and downgrades, depending on the user's behavior.
According to the user grading standard, a mapping model of the user-level-authority is established, as shown in fig. 3:
the distribution network User (I, C, R) is determined by three attributes, wherein I is an internal or external User (0 is an external User of the distribution network, 1 is an operation and maintenance person of the distribution network, 2 is a data asset manager of the distribution network), and C is distribution network User attribute information (including the number of times of illegal recording C 1 Number of data accesses C 2 Number of accesses to sensitive data C 3 Duration of collaboration C with a distribution network 4 … …) R is user level information (classified into primary, medium and high level users, the user level being upgraded and downgraded according to user behavior, but most of the time occurs between primary and medium level users)
Each distribution network User ranks R with I and C.
Firstly judging the I value, if I is 2, directly defining the user as a high-grade user, namely R is 3, if I is 1, directly defining the user as a medium-grade user, namely R is 2, and finallyIf I is 0, C { C 1 ,C 2 ,C 3 ,…,C N And judging the user level R epsilon {1,2} of the distribution network.
The levels of the power distribution network users can be divided into three levels:
advanced users: the method is mainly used for power distribution network data asset administrators, and is divided into a master administrator (highest-level user with highest authority), various data asset administrators (different users who are in charge of different types of data and execute data asset access), and the ownership authority comprises: the access authorization can be carried out on the secondary user and the primary user, the data asset can be directly accessed, and the data asset total manager can also manage and control various asset managers.
Medium-level users: there are no illegal access operations, few illegal operations (not affecting the normal operation of the distribution network), enterprises or individuals with high identity trust, and distribution network operation maintenance personnel for protecting the stable operation of the distribution network. The rights possessed by the intermediate level user include: the data asset can be safely accessed through identity authentication, and information with higher privacy degree such as electricity price information can be accessed.
Primary user: there are no illegal access operations, and a small number of illegal operations (some middle-level user illegal operations are degraded to primary users beyond a limit), and the new cooperated enterprises or individuals and users with low identity trust degree have high proportion, so that only ordinary transactions can be carried out and ordinary data can be accessed. Primary users will carry tags and upgrades to secondary users can remove tags.
Both the secondary user and the primary user have access to the data asset after receiving the rights issued by the digital asset manager. Others are illegal users, i.e. users that have not passed the identity authentication.
For the promotion and demotion operation: for primary users, if C 1 ≈0,C 2 And C 4 If the primary user is greater than a certain limit value, the primary user can be upgraded to a medium-grade user, namely R1-2, and if the primary user C 1 Or C 3 Above a certain limit, the secondary user may be downgraded to the primary user, i.e. R2→1.
Step four: user rights management and optimization
In order to enable a power distribution network administrator to more timely and accurately release rights of various service users, enable the grading of the power distribution network users to be more obvious, and enable the access process to be safer and more reliable, the method determines to optimize a power distribution network data asset user rights management and control model by adopting a deep learning algorithm, and adopts larger and more data sets to substitute the rights management and control model for prediction and analysis, so that a quicker and more efficient approach is provided for the power distribution network user access data asset process and user rights management and control process. The specific process is as follows:
selecting a certain number of power distribution network data asset users (I, C, R) as a training set T User The normalization processing is carried out on the data set, the normalization method of the data can scale the original data into dimensionless numerical values, and the data under different rules can be calculated and compared.
T User {User 1 ,User 2 ,User 3 ,...,User n }→T User {User 1 ,User 2 ,User 3 ,...,User n } (10)
Set T of users to be processed User ' substituting into the distribution network user authority grading model to obtain an initial training model, and collecting the users T User ' iterating repeatedly to obtain the generated level R error R E Minimal training model T Usermin
R E =T Useri -T User (i=0,1,2,3,...,n) (11)
Usermin =compare{T User1 ,T User2 ,T User3 ,...,T Usern } (12)
And bringing the new user into the final training model, and obtaining the authority level R of the new user according to the user characteristic vectors I and C.
Adding a new user authority level result into the training model T Usermin In step 2), performing iterative computation to generate a new training modelType (2).
Repeating the operating steps 2) to 4) to make the operation result more reliable so as to improve the efficiency in executing the access process of the distribution network user to the data asset. The specific flow is shown in fig. 4, and the training results in a user grading diagram shown in fig. 5:
step five: access procedure security record
In order to ensure that the data asset arrives at the hand of the user and cannot be illegally used, the access process needs to be recorded each time, and once the illegal actions of the user are found, the authority level of the user needs to be adjusted in time, and user information is deleted if necessary. The following describes the data asset security access recording process:
the data asset manager builds an empty log table to store the distribution network user access records.
Recording the whole process of safely accessing the data asset by the user of the power distribution network each time, wherein each record comprises: the method comprises the steps of distribution network user identity information, distribution network user authority level, accessed data asset types and contents, access duration, management of such data asset manager information and the like, and setting different color identifications for each record according to the distribution network user authority level.
The data asset access records are updated in time, the previous records are stored every three days, and only the power distribution network data asset manager has access rights to the data asset access records in order to ensure that the stored data records are encrypted by adopting a data encryption algorithm safely and reliably.
Once the illegal behaviors of the users are found, the illegal power distribution network users are timely processed through access records. For users with the grades of medium grade and primary grade, if illegal use is carried out after the data asset is acquired, the user is immediately defined as an illegal user; if the illegal operation is carried out, the intermediate user is changed into the primary user, the primary user is defined as an illegal user, all information of the illegal user is erased in the access record table, and the specific process is shown in fig. 6.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the description of the present invention, it should be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. The power distribution network data asset security access method considering authority hierarchical management and control is characterized by comprising the following steps of:
secure encryption of the data asset;
by acquiring the legal identity of the user, adopting a deep learning algorithm, and intelligently matching the authority of the user according to the grade and service requirements of the user;
and providing the encrypted data asset for the user according to the right successfully matched, and decrypting according to a decryption method corresponding to the encryption method of the user identity.
2. The method for securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 1, wherein:
in the process of securely encrypting the data asset, the data asset is securely encrypted by a Paillier algorithm.
3. The method for securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 2, wherein:
in the process of acquiring the legal identity of the user, encrypting the user identity according to the encryption method of the data asset, and acquiring the legal identity of the user by setting the legal identity of the user, wherein a zero knowledge proof algorithm is adopted to authenticate the user identity of the power distribution network, and the legal identity of the user is acquired.
4. A method of securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 3, wherein:
in the process of setting the validity of the user identity, the validity of the user identity is set by distributing user permission and defining user attribute information based on a grading rule of the user, wherein the user attribute information comprises the number of illegal recording, the number of data access, the number of times of accessing sensitive data and the cooperation duration with a power distribution network.
5. The method for securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 4, wherein:
in the process of matching the authority of a user by adopting a deep learning algorithm, scaling and shrinking original data by a normalization method, and converting the scaled original data into dimensionless numerical values;
and obtaining the authority requirements of the user through analyzing the access history and the authority level of the user according to the grading rule, the user authority and the user attribute information by the obtained numerical value through the deep learning algorithm, and giving the authority to the user.
6. The method for securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 5, wherein:
in the process of providing the data asset for the user, an access record library is established, the whole process of accessing the data asset by the user is recorded, and if the user has illegal behaviors when using the data asset, the authority level of the user is timely adjusted according to the access record, so that the legal and safe user is ensured to access the data asset of the power distribution network.
7. The method for securely accessing data assets of a power distribution network in view of rights hierarchical management as defined in claim 6, wherein:
in the process of recording the whole process of accessing the data assets by the user, each record comprises the identity information of the user of the power distribution network, the authority level of the user of the power distribution network, the type and content of the accessed data assets, the access duration and the management information of the manager of the data assets, and different color identifications are set for each record according to the authority level of the user.
8. The utility model provides a distribution network data asset security access system who takes into account hierarchical management of authority, its characterized in that includes:
the database module is used for storing data assets of the power distribution network and user identity information of users;
the database logic control module is used for controlling the database module to interact data with other modules of the system so as to realize the logic function of the system;
the data encryption module is used for carrying out safe encryption on the data asset;
the user authority matching module is used for intelligently matching the authority of the user according to the grade and service requirements of the user by acquiring the legal identity of the user and adopting a deep learning algorithm;
and the data decryption module is used for providing the encrypted data asset for the user according to the right successfully matched and decrypting according to a decryption method corresponding to the encryption method of the user identity.
9. The power distribution network data asset security access system that accounts for and is rights-tiered management as claimed in claim 8 wherein:
the data encryption module is used for carrying out safe encryption on the data asset through a Paillier algorithm.
10. The power distribution network data asset security access system that accounts for and is rights-tiered management as claimed in claim 9 wherein:
the user right matching module is used for encrypting the user identity according to the encryption method of the data asset, and acquiring the user legal identity by setting the user identity legal.
CN202311233561.1A 2023-09-21 2023-09-21 Power distribution network data asset security access method and system considering authority hierarchical management and control Pending CN117332391A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311233561.1A CN117332391A (en) 2023-09-21 2023-09-21 Power distribution network data asset security access method and system considering authority hierarchical management and control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311233561.1A CN117332391A (en) 2023-09-21 2023-09-21 Power distribution network data asset security access method and system considering authority hierarchical management and control

Publications (1)

Publication Number Publication Date
CN117332391A true CN117332391A (en) 2024-01-02

Family

ID=89276509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311233561.1A Pending CN117332391A (en) 2023-09-21 2023-09-21 Power distribution network data asset security access method and system considering authority hierarchical management and control

Country Status (1)

Country Link
CN (1) CN117332391A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117874826A (en) * 2024-03-11 2024-04-12 成都数据集团股份有限公司 Database authority management system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117874826A (en) * 2024-03-11 2024-04-12 成都数据集团股份有限公司 Database authority management system and method
CN117874826B (en) * 2024-03-11 2024-05-24 成都数据集团股份有限公司 Database authority management system and method

Similar Documents

Publication Publication Date Title
CN108681966B (en) Information supervision method and device based on block chain
US9858426B2 (en) Computer-implemented system and method for automatically identifying attributes for anonymization
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
JP4443224B2 (en) Data management system and method
WO2018032374A1 (en) Encrypted storage system for block chain and method using same
CN108683626B (en) Data access control method and device
CN112465411B (en) Risk prediction method, device and equipment
CN106209821B (en) Information security big data management system based on credible cloud computing
CN117332391A (en) Power distribution network data asset security access method and system considering authority hierarchical management and control
CN117235796B (en) Electronic commerce data processing method
Campanile et al. Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles.
CN116090000A (en) File security management method, system, device, medium and program product
CN117332433A (en) Data security detection method and system based on system integration
CN112883425B (en) Block chain-based data processing method and block chain link point
CN109903046A (en) User data management and device based on block chain
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
CN112328975A (en) Product software authorization management method, terminal device and medium
CN116432193A (en) Financial database data protection transformation method and financial data protection system thereof
CN113498592B (en) Method and system for digital property authentication and management
Wang et al. Research on Information Security of Network Accounting Based on the Combination of Apriori and AOI Algorithms
CN117034356B (en) Privacy protection method and device for multi-operation flow based on hybrid chain
CN114726655B (en) Character set encryption method based on digital certificate identity authentication
CN117527265B (en) Internet of things data acquisition system and method based on distributed digital identity
CN109063458B (en) Terminal security method and device for hierarchical information management
CN117494163B (en) Data service method and device based on security rules

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination