CN118590295A - Power system data processing method and system under cloud computing - Google Patents

Power system data processing method and system under cloud computing Download PDF

Info

Publication number
CN118590295A
CN118590295A CN202410819983.5A CN202410819983A CN118590295A CN 118590295 A CN118590295 A CN 118590295A CN 202410819983 A CN202410819983 A CN 202410819983A CN 118590295 A CN118590295 A CN 118590295A
Authority
CN
China
Prior art keywords
power
power data
transfer
access
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410819983.5A
Other languages
Chinese (zh)
Inventor
郭红兵
杨玥
郑璐
张建英
奥淇仑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inner Mongolia Electric Power Research Institute of Inner Mongolia Power Group Co Ltd
Original Assignee
Inner Mongolia Electric Power Research Institute of Inner Mongolia Power Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inner Mongolia Electric Power Research Institute of Inner Mongolia Power Group Co Ltd filed Critical Inner Mongolia Electric Power Research Institute of Inner Mongolia Power Group Co Ltd
Priority to CN202410819983.5A priority Critical patent/CN118590295A/en
Publication of CN118590295A publication Critical patent/CN118590295A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a system for processing electric power system data under cloud computing, which belong to the technical field of electric power information processing, wherein an electric power system server acquires an electric power running state data access request sent by an electric power access terminal, matches a corresponding transfer electric power data set, and sends the transfer electric power data set to an electric power data transfer verification terminal; detecting whether the transfer power data set comprises power data which is not disclosed or not through a power data transfer verification terminal; if the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set; and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal. The invention realizes the processing of the related access data in the power system, ensures the use safety of the power running state data, and simultaneously ensures the safety of the power system.

Description

Power system data processing method and system under cloud computing
Technical Field
The invention belongs to the technical field of power information processing, and particularly relates to a power system data processing method and system under cloud computing.
Background
In the prior art, the electric power information processing is to acquire, process, analyze and control data generated in the processes of electric power production, transmission, power distribution and the like so as to improve the operation efficiency and the safety of an electric power system.
In the process of power information processing, power data is generally required to be called and then processed, analyzed and controlled. The corresponding power data needs to be retrieved before the power data is processed, analyzed and controlled, and verification of the retrieval or extraction of the power data is generally required because the operation of the power data affects the stable operation of the power system. Only authorized users or devices are able to access specific power data. This helps to protect the integrity and security of the data from unauthorized access. Some important data exist in the power data, effective protection is needed, and the important power data can be extracted according to the authority of a user or according to the use condition, so that the power data can be ensured not to be illegally accessed or leaked.
How to ensure that the authorized users access the power data, ensure the safety of the power data and avoid the leakage of the power data is a technical problem to be solved currently.
Disclosure of Invention
The invention provides a data processing method of an electric power system under cloud computing, which realizes the processing of related access data in the electric power system and ensures the use safety of the data of the electric power running state.
The method comprises the following steps:
step S101: the power system server acquires a power running state data access request sent by a power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to a power data transfer verification terminal;
step S102: detecting whether the transfer power data set comprises power data which is not disclosed or not through a power data transfer verification terminal;
Step S103: if the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set;
step S104: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
It should be further noted that the method further includes:
Step S201: configuring a certificate configuration key and a power data access certificate based on a power data transfer verification terminal, and configuring a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate;
Step S202: the power data transfer verification terminal acquires an encrypted transfer power data set sent by the power system server, and processes the transfer power data set, the server public key and the access terminal public key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key;
step S203: decrypting the encrypted transfer power data set based on the power information verification key to obtain a transfer power data set, and detecting whether the transfer power data set comprises non-public power data or not;
step S204: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
In the method, a server public key of the power system server, a transit power data set access identifier, and an access terminal public key of the power access terminal are acquired based on the power data access certificate.
It should be further noted that the method further includes: and acquiring encrypted data, the access identifier of the transfer power data set and the access time stamp which are transmitted by the power system server, and processing the access time stamp, the server public key corresponding to the power system server, the access terminal public key corresponding to the power access terminal and the certificate configuration key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key.
It should be further noted that the method further includes:
Step S301, a power data transfer verification terminal acquires user authority information through a power access terminal and performs authority verification on the user authority information;
step S302, carrying out authority verification on the pass in the application of user authority verification under the condition that the user authority verification passes;
Step S303, under the condition that the user authority verification passes, determining the power data access authority level of the current identity ID based on the current identity ID in the user authority verification application and the power data access authority level of the pre-stored identity ID; the pre-stored power data access authority level comprises access identity IDs of different authorities and can correspondingly access power data of different levels;
Step S304, based on the power data access authority level of the current identity ID, judging whether the user information of the current identity ID needs multi-mode authority verification.
It should be further noted that, based on the power data access permission level of the current identity ID, judging whether the current identity ID needs multi-mode permission verification; the multi-mode authority verification is to execute two or more verification modes including face recognition verification, iris recognition verification and fingerprint verification according to the multi-mode verification of the current identity ID.
The invention also provides a data processing system of the power system under cloud computing, which comprises: the system comprises a power system server, a power access terminal and a power data transfer verification terminal;
The power system server acquires a power running state data access request sent by a power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to a power data transfer verification terminal;
The power data transfer verification terminal detects whether the transferred power data set comprises the data which is not disclosed;
if the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set;
And if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
From the above technical scheme, the invention has the following advantages:
The embodiment of the application utilizes the electric power data transfer verification terminal to carry out access control on the transfer electric power data set, realizes the processing of relevant access data in the electric power system, ensures the use safety of the electric power running state data, simultaneously ensures the safety of the electric power system, reduces the data processing capacity of the electric power system server, can also realize the judgment of the electric power access authority and the automatic judgment of the information safety, and improves the efficiency and the safety of electric power data access.
In the invention, a user configures a certificate configuration key and a power data access certificate to a power data transfer verification terminal, and obtains a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate; and obtaining the encrypted transfer power data set, and performing decryption processing through a Diffie-Hellman key exchange algorithm, the server public key and the access terminal public key to obtain the transfer power data set. Therefore, the safety of the communication process of the transfer power data set among the power system server, the power access terminal and the power data transfer verification terminal can be ensured, the data safety is ensured by carrying out encryption and decryption processing based on a Diffie-Hellman key exchange algorithm and related keys, and the risk of power data leakage is avoided.
The invention utilizes the power data transfer verification terminal to carry out authority verification on the received user identity ID, can limit or allow access to the power data, ensures the safety of the access of the power data and ensures the safety of the authority verification of the user.
Drawings
In order to more clearly illustrate the technical solutions of the present invention, the drawings that are needed in the description will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for processing data of a power system under cloud computing;
FIG. 2 is a flowchart of an embodiment of a method for processing data of a power system under cloud computing;
fig. 3 is a flowchart of another embodiment of a method for processing data of a power system under cloud computing.
Detailed Description
The following describes a method for processing data of a power system under cloud computing in an embodiment of the present application with reference to the accompanying drawings.
In order to facilitate understanding of the method provided by the embodiments of the present application, the following description is first made: first, in embodiments of the present application, "for indicating" may include for direct indication and for indirect indication, as well as explicit indication and implicit indication. In the specific implementation process, the manner of indicating the information to be indicated is various, for example, but not limited to, the information to be indicated may be directly indicated, such as the information to be indicated itself or an index of the information to be indicated. The information to be indicated can also be indicated indirectly by indicating other information, wherein the other information and the information to be indicated have an association relation. It is also possible to indicate only a part of the information to be indicated, while other parts of the information to be indicated are known or agreed in advance. The indication of the information to be indicated may also be achieved by means of a pre-agreement (e.g. protocol specification) whether a certain cell is present, for example, thereby reducing the indication overhead to some extent.
In the method for processing the data of the power system under the cloud computing, at least one means one or more, and a plurality of means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, and c may represent: a, b, or c, or a and b, or a and c, or b and c, or a, b and c, wherein a, b and c can be single or multiple.
In the embodiments of the present application, the descriptions of "when … …", "in … …", "if" and "if" etc. all refer to that the device (e.g., the terminal device or the access network device described below) will make corresponding processing under some objective condition, and are not limited in time, nor do the devices (e.g., the terminal device or the access network device described below) require an action that must be judged when implemented, nor do other limitations mean that there are any other limitations.
In an embodiment of the present application, the "predefined" may be a protocol definition. The "pre-defining" may be implemented by pre-storing corresponding codes, tables or other manners of indicating relevant information in devices (including, for example, terminal devices and network devices), and the application is not limited to the specific implementation manner.
The embodiment of the application provides a power system data processing system under cloud computing, which relates to a power system server, a power access terminal and a power data transfer verification terminal. The power system server, the power access terminal and the power data transfer verification terminal can all adopt electronic equipment. By way of example, the electronic device may be a Mobile Terminal (MT), a Mobile Station (MS), a Mobile Unit (MU), a wireless unit, a remote unit, a user agent, a mobile client, and the like. For example, the electronic device may be a mobile phone, a smart screen device, a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), a laptop computer (laptop), etc., which are not limited by the embodiments of the present application.
The electronic equipment provided by the embodiment of the application can comprise a processor, an external memory interface, a memory, a universal serial bus interface, a battery, an antenna, a wireless communication module, an audio module, a key, a camera and a display screen.
It should be understood that the structure illustrated in the embodiments of the present application does not constitute a specific limitation on the electronic device. In other embodiments of the application, the electronic device may include more or less components than illustrated, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor may include one or more processing units, such as: the processors may include a central processor (central processing unit, CPU), etc.), an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (IMAGE SIGNAL processor, ISP), a controller, a memory, a video codec, a digital signal processor (DIGITAL SIGNAL processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The memory is used for storing relevant parameters such as computer executable program codes, power running state data, keywords preset by the system, time stamps, power equipment types, power data access rights, user access rights and the like. The processor executes various functional applications of the electronic device and data processing by executing instructions stored in the memory. The memory may include a stored program area and a stored data area. The wireless communication module may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wi-Fi network (WIRELESS FIDELITY)), bluetooth (BT), global navigation satellite system (global navigation SATELLITE SYSTEM, GNSS), frequency modulation (frequency modulation, FM), near Field Communication (NFC), infrared (IR), etc. applied on an electronic device.
The software system of the electronic device may employ a layered architecture, an event driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture. In the embodiment of the application, an Android (Android) system with a layered architecture is taken as an example, and a software system of electronic equipment is exemplified.
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The method for processing the data of the power system under cloud computing provided by the embodiment of the application comprises the following steps:
step S101: the power system server obtains a power running state data access request sent by the power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to the power data transfer verification terminal.
In one embodiment of the present application, the power system server may obtain a power operation state data access request sent by a user through the power access terminal, where the power operation state data access request may include power operation state data that the user needs to obtain, power equipment related materials, related data information of the power system, and so on. The power operation state data acquired by the user may be data currently being operated or historical data stored in a database. The specific acquired data is not limited.
Step S102: and detecting whether the transfer power data set comprises the power data which is not disclosed by the power data transfer verification terminal.
In one embodiment of the application, the power data transfer verification terminal is operated by a monitoring person to set related keywords and related data elements for the power operation state data to be accessed, and if the power operation state data which can not be disclosed or added, deleted and checked by an access user is to be shielded, or the power operation state data which can not be accessed is sent to the power access terminal, or the added, deleted and checked operation can not be executed on the power operation state data.
For the embodiment, after the power system server sends the transfer power data set to the power data transfer verification terminal, the power data transfer verification terminal verifies whether the transfer power data set has the power data which is not disclosed. The specific judgment mode can be judged based on related parameters such as keywords, time stamps, power equipment types, power data access rights and user access rights preset by the system.
In an exemplary manner, when the keywords in the transit power data set are matched with the preset keywords of the system, the currently accessed power operation state data is considered to be the power data which is not disclosed. For example, the power operation state data related in a certain time period is set as the power operation state data which is not disclosed, the power access terminal sends a power operation state data access request, the corresponding transfer power data set is matched as the power operation state data in the time period, and the power operation state data is not disclosed.
Step S103: and if the transit power data set comprises the non-public power data, generating corresponding power prompt information and limiting access of the transit power data set.
Step S104: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
In one embodiment of the present application, the transfer power data set may be transmitted to the power access terminal if the transfer power data set does not include the unpublished power data.
In a specific embodiment, the transmitting the transit power data set to the power access terminal may further include: and sending the transfer power data set to a power access terminal, and storing the transfer power data set by the power access terminal.
Specifically, the power system server sends the transfer power data set to the power data transfer verification end, the transfer power data set obtained by the power data transfer verification end is analyzed to obtain each transfer power data in the transfer power data set, and relevant parameters such as a keyword, a time stamp, a power equipment type, a power data access authority, a user access authority and the like are extracted from each transfer power data. And judging whether the data obtained by analysis and extraction comprises the power data which is not disclosed, namely detecting whether the power data set comprises the power data which is not disclosed through a power data transfer verification terminal, if the power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting the access of the power data set, and if the power data set does not comprise the power data which is not disclosed, transmitting the power data set to a power access terminal. The embodiment of the application utilizes the electric power data transfer verification terminal to carry out access control on the transfer electric power data set, realizes the processing of relevant access data in the electric power system, ensures the use safety of the electric power running state data, simultaneously ensures the safety of the electric power system, reduces the data processing capacity of the electric power system server, can also realize the judgment of the electric power access authority and the automatic judgment of the information safety, and improves the efficiency and the safety of electric power data access.
The embodiment of the application relates to a method for processing data of a power system under cloud computing, which comprises the following steps:
Step S201: and configuring a certificate configuration key and a power data access certificate based on the power data transfer verification terminal, and configuring a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate.
It should be noted that, the user may configure the certificate configuration key and the matched power data access certificate for the power data transfer verification terminal. In the process of processing the power system data, a server public key and an access terminal public key can be respectively configured for the power system server and the power access terminal.
In the embodiment of the application, a server public key of a power system server and an access terminal public key of a power access terminal are obtained according to a power data access certificate, and the method specifically comprises the following steps: and acquiring a server public key of the power system server, a transit power data set access identifier and an access terminal public key of the power access terminal based on the power data access certificate. The transfer power data set access identifier is a transfer power data set obtained by matching a corresponding transfer power data set according to the power running state data access request, and identifying the transfer power data set by performing access processing each time. The identification of the transfer power data set can be convenient for query and use.
In the embodiment of the application, the power data transfer verification terminal stores the server public key corresponding to the power system server, the access identifier of the transfer power data set and the access terminal public key corresponding to the power access terminal into the transfer memory. After receiving the certificate, the power system server stores public keys of the power data transfer verification terminal and the power access terminal in the certificate; and after receiving the certificate, the power data transfer verification terminal stores the public key of the power system server and the public key of the power access terminal in the certificate. The power access terminal stores the public key of the power system server and the public key of the power data transfer verification terminal.
Step S202: and the electric power data transfer verification terminal acquires the encrypted transfer electric power data set sent by the electric power system server, and processes the transfer electric power data set, the server public key and the access terminal public key through a Diffie-Hellman key exchange algorithm to obtain an electric power information verification key.
In the embodiment of the application, the electric power system server performs key calculation by using the electric power access terminal public key, the electric power data transfer verification terminal public key, the electric power system server private key and the Diffie-Hellman key exchange algorithm, and transfers the encrypted transfer electric power data set to the electric power data transfer verification terminal based on a key encryption processing mode.
The power data transfer verification terminal obtains the encrypted transfer power data set, processes the encrypted transfer power data set, the server public key and the access terminal public key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key, and further comprises: and acquiring encrypted data, the access identifier of the transfer power data set and the access time stamp which are transmitted by the power system server, and processing the access time stamp, the server public key corresponding to the power system server, the access terminal public key corresponding to the power access terminal and the certificate configuration key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key.
The power data transfer verification terminal processes the access time stamp, the server public key corresponding to the power system server, the access terminal public key corresponding to the power access terminal and the certificate configuration key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key, and the method further comprises the following steps: and determining a server public key corresponding to the power system server and an access terminal public key corresponding to the power access terminal from the transfer memory based on the transfer power data set access identifier. And after acquiring the access identifier of the transfer power data set sent by the power system server, determining a server public key of the power system server in a local transfer memory based on the access identifier of the transfer power data set. The power system server public key, the power access terminal public key and the power data transfer verification terminal public key are contained in the power data access certificate, so that the public keys can be conveniently extracted and used.
Step S203: and decrypting the encrypted transfer power data set based on the power information verification key to obtain a transfer power data set, and detecting whether the transfer power data set comprises the non-public power data.
In an embodiment of the application, the encrypted transfer power data set is decrypted based on the power information verification key to obtain the transfer power data set, and whether the transfer power data set includes the non-public power data is detected. It can be seen that the power data transfer verification terminal performs key calculation by using a Diffie-Hellman key exchange algorithm according to the public key of the power system server, the public key of the power access terminal, the access time stamp and the private key of the power data transfer verification terminal, and detects whether the transferred power data set contains the power data which is not disclosed.
Step S204: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
In the embodiment of the application, a user configures a certificate configuration key and a power data access certificate to a power data transfer verification terminal, and obtains a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate; and obtaining the encrypted transfer power data set, and performing decryption processing through a Diffie-Hellman key exchange algorithm, the server public key and the access terminal public key to obtain the transfer power data set. Therefore, the safety of the communication process of the transfer power data set among the power system server, the power access terminal and the power data transfer verification terminal can be ensured, the data safety is ensured by carrying out encryption and decryption processing based on a Diffie-Hellman key exchange algorithm and related keys, and the risk of power data leakage is avoided.
The method for processing the data of the power system under the cloud computing provided by the embodiment of the application further comprises the following steps:
step S301, the power data transfer verification terminal obtains user authority information through the power access terminal, and performs authority verification on the user authority information.
In the embodiment of the application, the power data transfer verification terminal performs authority verification on the user authority information by acquiring the user authority information, so that only the user passing the user authority verification can access the transfer power data set. Specifically, the user permission is obtained by using the identity ID and the key input by the user, and matching are performed with the user permission pre-stored in the transit storage, so as to obtain the corresponding permission information of the user.
And the power data transfer verification terminal performs authority verification on the received identity ID and the key to generate an authority verification result. Here the corresponding rights may be matched out based on accessing the list of identity IDs. And when the authority matching the identity ID is the permission of access, judging that the user authority verification passes, and when the authority matching the identity ID is the permission of access, judging that the user authority verification fails, returning the transfer power data set to the power system server, and sending a prompt of the user authority verification failure. In addition, the embodiment can also carry out the user authority verification by carrying out the authority verification application on the IP address, the port or the protocol of the received user through the power data transfer verification terminal.
Step S302, in the case that the user authority verification passes, the authority verification is carried out on the pass in the user authority verification application.
Step S303, under the condition that the user authority verification passes, determining the power data access authority level of the current identity ID based on the current identity ID in the user authority verification application and the power data access authority level of the pre-stored identity ID; the pre-stored power data access authority level comprises access identity IDs of different authorities, and the power data of different levels can be accessed correspondingly.
According to the embodiment, the access level identification is carried out on the current identity ID according to the pre-stored identity ID, and the identity ID with high access level is matched to the power data access authority with high level, so that the flexibility and the diversity of access control can be realized.
Step S304, based on the power data access authority level of the current identity ID, judging whether the user information of the current identity ID needs multi-mode authority verification.
And judging whether the current identity ID needs multi-mode authority verification or not according to the power data access authority level based on the current identity ID, and taking the power data access authority level as a power data access authority level based on a previous identity ID authority verification result when the current identity ID does not need multi-mode authority verification. The multi-mode authority authentication of the present embodiment may be a multi-mode authentication according to the current ID, which performs two or more authentication modes including face recognition authentication, iris recognition authentication, fingerprint authentication, and the like. The multi-mode authority verification is performed on the current identity ID, namely, the user authority verification information corresponding to the current identity ID in a pre-stored memory is queried, and then the multi-mode authority verification is performed on the current identity ID based on the user authority verification information corresponding to the current identity ID and a preset multi-mode authority verification strategy, so that the accuracy and the safety of the identity ID verification are improved, and the accuracy of identity ID identification is guaranteed.
It can be seen that, in this embodiment, the permission verification is performed on the received user ID by using the power data transfer verification terminal, so that access to the power data can be restricted or allowed, the security of access to the power data is ensured, and the security of permission verification of the user is ensured.
The following is an embodiment of a system for processing data of a power system under cloud computing provided by the embodiments of the present disclosure, where the system and the method for processing data of a power system under cloud computing in the embodiments of the present disclosure belong to the same inventive concept, and details of the system for processing data of a power system under cloud computing are not described in detail in the embodiment of the system for processing data of a power system under cloud computing, and reference may be made to the embodiment of the method for processing data of a power system under cloud computing.
The system comprises: the system comprises a power system server, a power access terminal and a power data transfer verification terminal.
The power system server obtains a power running state data access request sent by the power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to the power data transfer verification terminal.
And the power data transfer verification terminal detects whether the transferred power data set comprises the power data which is not disclosed. If the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set; and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
In the power system data processing system under cloud computing according to the embodiment of the application, the power system server sends the transfer power data set to the power data transfer verification terminal, the transfer power data set obtained by the power data transfer verification terminal is analyzed to obtain each transfer power data in the transfer power data set, and relevant parameters such as extraction keywords, time stamps, power equipment types, power data access rights, user access rights and the like in each transfer power data are analyzed. And judging whether the data obtained by analysis and extraction comprises the power data which is not disclosed, namely detecting whether the power data set comprises the power data which is not disclosed through a power data transfer verification terminal, if the power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting the access of the power data set, and if the power data set does not comprise the power data which is not disclosed, transmitting the power data set to a power access terminal. The embodiment of the application utilizes the electric power data transfer verification terminal to carry out access control on the transfer electric power data set, realizes the processing of relevant access data in the electric power system, ensures the use safety of the electric power running state data, simultaneously ensures the safety of the electric power system, reduces the data processing capacity of the electric power system server, can also realize the judgment of the electric power access authority and the automatic judgment of the information safety, and improves the efficiency and the safety of electric power data access.
The power system data processing system under cloud computing provided by the embodiments of the present disclosure is the units and algorithm steps of each example described in connection with the embodiments disclosed herein, and can be implemented in electronic hardware, computer software, or a combination of both, and to clearly illustrate the interchangeability of hardware and software, each example's composition and steps have been generally described in terms of functionality in the foregoing description. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The method for processing the data of the power system under the cloud computing is characterized by comprising the following steps of:
step S101: the power system server acquires a power running state data access request sent by a power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to a power data transfer verification terminal;
step S102: detecting whether the transfer power data set comprises power data which is not disclosed or not through a power data transfer verification terminal;
Step S103: if the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set;
step S104: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
2. The method for processing data of a power system under cloud computing as recited in claim 1, further comprising:
Step S201: configuring a certificate configuration key and a power data access certificate based on a power data transfer verification terminal, and configuring a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate;
Step S202: the power data transfer verification terminal acquires an encrypted transfer power data set sent by the power system server, and processes the transfer power data set, the server public key and the access terminal public key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key;
step S203: decrypting the encrypted transfer power data set based on the power information verification key to obtain a transfer power data set, and detecting whether the transfer power data set comprises non-public power data or not;
step S204: and if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
3. The method for processing data of a power system under cloud computing as claimed in claim 2,
In the method, a server public key of a power system server, a transfer power data set access identifier and an access terminal public key of a power access terminal are acquired based on a power data access certificate.
4. The method for processing data of a power system under cloud computing as claimed in claim 2,
The method further comprises the steps of: and acquiring encrypted data, the access identifier of the transfer power data set and the access time stamp which are transmitted by the power system server, and processing the access time stamp, the server public key corresponding to the power system server, the access terminal public key corresponding to the power access terminal and the certificate configuration key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key.
5. The method for processing data of a power system under cloud computing according to claim 1 or 2, wherein the method further comprises:
Step S301, a power data transfer verification terminal acquires user authority information through a power access terminal and performs authority verification on the user authority information;
step S302, carrying out authority verification on the pass in the application of user authority verification under the condition that the user authority verification passes;
Step S303, under the condition that the user authority verification passes, determining the power data access authority level of the current identity ID based on the current identity ID in the user authority verification application and the power data access authority level of the pre-stored identity ID; the pre-stored power data access authority level comprises access identity IDs of different authorities and can correspondingly access power data of different levels;
Step S304, based on the power data access authority level of the current identity ID, judging whether the user information of the current identity ID needs multi-mode authority verification.
6. The method for processing data of a power system under cloud computing as claimed in claim 5,
Judging whether the current identity ID needs multi-mode authority verification or not based on the power data access authority level of the current identity ID; the multi-mode authority verification is to execute two or more verification modes including face recognition verification, iris recognition verification and fingerprint verification according to the multi-mode verification of the current identity ID.
7. A power system data processing system under cloud computing, wherein the system is configured to implement the power system data processing method under cloud computing as set forth in any one of claims 1 to 6; the system comprises: the system comprises a power system server, a power access terminal and a power data transfer verification terminal;
The power system server acquires a power running state data access request sent by a power access terminal, matches a corresponding transfer power data set, and sends the transfer power data set to a power data transfer verification terminal;
The power data transfer verification terminal detects whether the transferred power data set comprises the data which is not disclosed;
if the transfer power data set comprises the power data which is not disclosed, generating corresponding power prompt information and limiting access of the transfer power data set;
And if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
8. The cloud computing power system data processing system of claim 7,
The power data transfer verification terminal is also used for configuring a certificate configuration key and a power data access certificate, and configuring a server public key of a power system server and an access terminal public key of a power access terminal based on the power data access certificate;
the power data transfer verification terminal acquires an encrypted transfer power data set sent by the power system server, and processes the transfer power data set, the server public key and the access terminal public key through a Diffie-Hellman key exchange algorithm to obtain a power information verification key;
The power data transfer verification terminal decrypts the encrypted transfer power data set based on the power information verification key to obtain a transfer power data set, and detects whether the transfer power data set comprises the power data which is not disclosed;
And if the transfer power data set does not comprise the unpublished power data, transmitting the transfer power data set to a power access terminal.
9. The cloud computing power system data processing system of claim 7,
The power data transfer verification terminal is also used for acquiring user authority information through the power access terminal and performing authority verification on the user authority information; under the condition that the user authority verification passes, performing authority verification on the pass in the user authority verification application;
Under the condition that the user authority verification passes, determining the power data access authority level of the current identity ID based on the current identity ID in the user authority verification application and the power data access authority level of the pre-stored identity ID; the pre-stored power data access authority level comprises access identity IDs of different authorities and can correspondingly access power data of different levels;
Based on the power data access authority level of the current identity ID, whether the user information of the current identity ID needs multi-mode authority verification or not is judged.
10. The system according to claim 9, wherein the power data transfer verification terminal further determines whether the current ID requires multi-mode authority verification according to a power data access authority level of the current ID; the multi-mode authority verification is to execute two or more verification modes including face recognition verification, iris recognition verification and fingerprint verification according to the multi-mode verification of the current identity ID.
CN202410819983.5A 2024-06-24 2024-06-24 Power system data processing method and system under cloud computing Pending CN118590295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410819983.5A CN118590295A (en) 2024-06-24 2024-06-24 Power system data processing method and system under cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410819983.5A CN118590295A (en) 2024-06-24 2024-06-24 Power system data processing method and system under cloud computing

Publications (1)

Publication Number Publication Date
CN118590295A true CN118590295A (en) 2024-09-03

Family

ID=92537105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410819983.5A Pending CN118590295A (en) 2024-06-24 2024-06-24 Power system data processing method and system under cloud computing

Country Status (1)

Country Link
CN (1) CN118590295A (en)

Similar Documents

Publication Publication Date Title
US8639926B2 (en) Techniques for mobile device authentication
RU2620998C2 (en) Method and authentication device for unlocking administrative rights
CN107493561B (en) Shared device unlocking method, device and system and storage medium
CN111080857B (en) Vehicle digital key management and use method and device, mobile terminal and storage medium
CN107070909A (en) Method for sending information, message receiving method, apparatus and system
US20130237190A1 (en) Method and apparatus for remote portable wireless device authentication
CN112596802A (en) Information processing method and device
RU2684584C1 (en) Device for storing information and operation method thereof
CN111131300B (en) Communication method, terminal and server
CN110310392B (en) Vehicle unlocking method and device, computer equipment and storage medium
CN112329071B (en) Privacy data processing method, system, device and equipment
CN109639644B (en) Authorization verification method and device, storage medium and electronic equipment
CN109413648B (en) Access control method, terminal, smart card, background server and storage medium
WO2020036070A1 (en) Terminal registration system and terminal registration method
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN106549934B (en) Network equipment safety system
CN112153638A (en) Safety authentication method and equipment for vehicle-mounted mobile terminal
US20130073840A1 (en) Apparatus and method for generating and managing an encryption key
US12019717B2 (en) Method for the secure interaction of a user with a mobile terminal and a further entity
CN107548058B (en) Equipment access method and intelligent terminal
CN111259363B (en) Service access information processing method, system, device, equipment and storage medium
CN114980025B (en) Information viewing method of security chip and security chip device
CN118590295A (en) Power system data processing method and system under cloud computing
US9135449B2 (en) Apparatus and method for managing USIM data using mobile trusted module
CN112241284A (en) Program data updating method, system, device and equipment based on privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination