WO2023197529A1 - 针对输电线路的在线监测系统、方法、装置和主站 - Google Patents
针对输电线路的在线监测系统、方法、装置和主站 Download PDFInfo
- Publication number
- WO2023197529A1 WO2023197529A1 PCT/CN2022/120445 CN2022120445W WO2023197529A1 WO 2023197529 A1 WO2023197529 A1 WO 2023197529A1 CN 2022120445 W CN2022120445 W CN 2022120445W WO 2023197529 A1 WO2023197529 A1 WO 2023197529A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- online monitoring
- data packet
- monitoring data
- terminal
- encrypted
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 370
- 238000000034 method Methods 0.000 title claims abstract description 113
- 230000005540 biological transmission Effects 0.000 title claims abstract description 74
- 238000004590 computer program Methods 0.000 claims description 23
- 238000012545 processing Methods 0.000 claims description 9
- 238000012806 monitoring device Methods 0.000 claims description 6
- 230000004044 response Effects 0.000 abstract description 10
- 238000007726 management method Methods 0.000 description 54
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 6
- 230000001413 cellular effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- This application relates to the technical field of power grid monitoring, and in particular to an online monitoring system, method, device and master station for transmission lines.
- transmission lines need to be monitored online to ensure their normal operation.
- corresponding online monitoring terminals such as sensors, can be mounted on transmission lines to conduct online monitoring of transmission lines. After the online monitoring terminal obtains the online monitoring data of its mounted transmission line, it sends the online monitoring data to the main station, and the main station responds based on the online monitoring data.
- the main station responds to online monitoring data from online monitoring terminals that are not within the management scope of the main station, and a response error occurs.
- An online monitoring system for power transmission lines includes: a main station and an online monitoring terminal;
- the online monitoring terminal is used to splice the online monitoring data obtained by online monitoring of the transmission line it is mounted with its own terminal identification, obtain an online monitoring data package, and perform the online monitoring according to its own encryption method.
- the data packet is encrypted and the encrypted online monitoring data packet is sent to the main station;
- the main station is used to determine that the online monitoring data packet originates from the network within its own management scope after receiving the encrypted online monitoring data packet, if the encryption method of the online monitoring data packet corresponds to the decryption method it owns.
- the probability of the online monitoring terminal is greater than or equal to the first threshold;
- the main station is also configured to, after determining that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management range is greater than or equal to the first threshold, when the terminal identification in the online monitoring data packet belongs to its own management When identifying the terminal of an online monitoring terminal within the scope, it is determined that the probability that the online monitoring data packet originates from an online monitoring terminal within the scope of its own management is greater than or equal to the second threshold, and based on the online monitoring data in the online monitoring data packet Respond; wherein the second threshold is greater than the first threshold.
- An online monitoring method for transmission lines, applied to the main station, the method includes:
- the encrypted online monitoring data packet sent by the online monitoring terminal;
- the encrypted online monitoring data packet is obtained by the online monitoring terminal in the following manner: the online monitoring terminal will conduct online monitoring of the transmission line mounted on itself
- the obtained online monitoring data is spliced with its own terminal identification to obtain an online monitoring data packet, and the online monitoring data packet is encrypted according to its own encryption method to obtain an encrypted online monitoring terminal;
- the terminal identification in the online monitoring data packet belongs to the terminal identification of the online monitoring terminal within its own management scope , determine that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management range is greater than or equal to the second threshold, and respond based on the online monitoring data in the online monitoring data packet; wherein, the second threshold greater than the first threshold.
- An online monitoring device for transmission lines, applied to the main station, the device includes:
- the data packet receiving module is used to receive the encrypted online monitoring data packet sent by the online monitoring terminal;
- the encrypted online monitoring data packet is obtained by the online monitoring terminal in the following way: the online monitoring terminal will The online monitoring data obtained by online monitoring of the transmission line carried is spliced with its own terminal identification to obtain an online monitoring data packet, and the online monitoring data packet is encrypted according to its own encryption method to obtain an encrypted online monitoring terminal;
- the first processing module is used to successfully decrypt the encrypted online monitoring data packet based on its own decryption method and determine that the probability that the online monitoring data packet originates from the online monitoring terminal within its own management scope is greater than or equal to the first threshold;
- the second processing module is configured to, after determining that the probability that the online monitoring data packet originates from the online monitoring terminal within its own management scope is greater than or equal to the first threshold, when the terminal identification in the online monitoring data packet belongs to the online monitoring terminal within its own management scope.
- the second threshold is greater than the first threshold.
- a main station includes a memory and a processor, the memory stores a computer program, and the processor executes the above method.
- a computer-readable storage medium has a computer program stored thereon, and the computer program is executed by a processor to execute the above method.
- a computer program product has a computer program stored thereon, and the computer program is executed by a processor to execute the above method.
- the online monitoring terminal is used to conduct online monitoring of the transmission line to which it is mounted and obtain online monitoring data and Splice its own terminal identification to obtain online monitoring data packets, encrypt the online monitoring data packets according to its own encryption method, and send the encrypted online monitoring data packets to the main station;
- the main station is used to After receiving the encrypted online monitoring data packet, if the encryption method of the online monitoring data packet corresponds to the decryption method it owns, then it is determined that the probability that the online monitoring data packet comes from the online monitoring terminal within its own management scope is greater than or equal to the third A threshold;
- the master station is also configured to, after determining that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management range is greater than or equal to the first threshold, when the terminal identifier in the online monitoring data packet belongs to itself When the terminal identification of the online monitoring terminal within the management range is determined, the probability that the online monitoring data packet originate
- the main station determines whether the probability that the received online monitoring data packet originates from the online monitoring terminal within the management scope of the main station is greater than Equal to the first threshold, if so, then further combine it with whether the terminal identification in the online monitoring data packet belongs to the terminal identification of the online monitoring terminal within the management scope of the terminal itself. If so, determine that the received online monitoring data packet comes from the management scope of the main station. Whether the probability of the online monitoring terminal within is greater than or equal to the second threshold, thereby avoiding responding to the online monitoring data of the online monitoring terminal not within the management range of the main station and improving the accuracy of the response.
- Figure 1 is a schematic architectural diagram of an online monitoring system for transmission lines in one embodiment
- Figure 2 is a schematic architectural diagram of an online monitoring system for transmission lines in one embodiment
- Figure 3 is a schematic flow chart of an online monitoring method for transmission lines in one embodiment
- Figure 4 is a structural block diagram of an online monitoring device for transmission lines in one embodiment
- Figure 5 is an internal structure diagram of the master station in one embodiment.
- an embodiment means that a particular feature, structure or characteristic described in connection with the embodiment may be included in at least one embodiment of the application.
- the appearances of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It will be explicitly and implicitly understood by those skilled in the art that the embodiments described herein may be combined with other embodiments.
- this application provides an online monitoring system for power transmission lines, including a main station and an online monitoring terminal.
- the online monitoring terminal is used to splice the online monitoring data obtained by online monitoring of the transmission line mounted on it and its own terminal identification to obtain the online monitoring data package, and then encrypt the said online monitoring data according to its own encryption method.
- the online monitoring data packet is encrypted, and the encrypted online monitoring data packet is sent to the main station.
- the online monitoring terminal may include an inventory online monitoring terminal and an incremental online monitoring terminal.
- the inventory online monitoring terminal is mounted to the corresponding transmission line before the incremental online monitoring terminal.
- the existing online monitoring terminal can use the encryption algorithm stored in its own built-in security chip as its own encryption method; the incremental online monitoring terminal can use the encryption algorithm of the external encryption security terminal corresponding to itself as its own encryption method.
- this encrypted security terminal can integrate 4G or 5G communication modules.
- the system can also include a security gateway, and the online monitoring terminal can send the encrypted online monitoring data packet to the main station via the security gateway; wherein, the stock online monitoring terminal can be based on its own built-in
- the security chip is connected to the security gateway, and the incremental online monitoring terminal can be connected to the security gateway based on the external encryption security terminal.
- the main station is used to determine that the online monitoring data packet originates from the network within its own management scope after receiving the encrypted online monitoring data packet, if the encryption method of the online monitoring data packet corresponds to the decryption method it owns.
- the probability of the online monitoring terminal is greater than or equal to the first threshold.
- the main station is also configured to, after determining that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management range is greater than or equal to the first threshold, when the terminal identification in the online monitoring data packet belongs to its own management When identifying the terminal of an online monitoring terminal within the scope, it is determined that the probability that the online monitoring data packet originates from an online monitoring terminal within the scope of its own management is greater than or equal to the second threshold, and based on the online monitoring data in the online monitoring data packet A response is made in which the second threshold is greater than the first threshold.
- the main station determines whether the probability that the received online monitoring data packet originates from an online monitoring terminal within the management scope of the main station is greater than Equal to the first threshold, if so, then further combine it with whether the terminal identification in the online monitoring data packet belongs to the terminal identification of the online monitoring terminal within the management scope of the terminal itself. If so, determine that the received online monitoring data packet comes from the management scope of the main station. Whether the probability of the online monitoring terminal within is greater than or equal to the second threshold, thereby avoiding responding to the online monitoring data of the online monitoring terminal not within the management range of the main station and improving the accuracy of the response.
- the main station uses the encryption method corresponding to the decryption method it owns as the encryption method to be distributed, and sends the encryption method to be distributed to the online monitoring terminal mounted on the preset power transmission line; the preset power transmission line
- the line is a transmission line located in the geographical area corresponding to the management scope of the main station itself.
- the main station distributes the encryption method corresponding to the decryption method it owns to the corresponding online monitoring terminal.
- the online monitoring terminal that receives the encryption method to be distributed belongs to the online monitoring terminal within the management scope of the main station. In this way, the main station can be based on The correspondence between the decryption method and the encryption method can make a preliminary judgment on whether the received online monitoring terminal belongs to the management scope of the main station and improve the judgment efficiency.
- the main station can decrypt the encrypted online monitoring data packet based on its own decryption method. If the decryption is successful, it determines that the encryption method of the online monitoring data packet is the same as its own. Corresponds to the decryption method owned.
- the master station After the master station receives the encrypted online monitoring data packet, when judging whether the encryption method of the online monitoring data packet corresponds to the decryption method it owns, it can use the decryption method it owns to decrypt the received encrypted online data packet. Monitor the data packet and decrypt it. If the decryption is successful, it means that the two correspond to each other and improve the processing efficiency.
- the security gateway can send the terminal identification of each online monitoring terminal mounted on the preset power transmission line to the main station; the preset power transmission line is located in the geographical area corresponding to the management scope of the main station itself. transmission lines within;
- the main station is also configured to determine that the terminal identification in the online monitoring data packet belongs to The terminal identification of the online monitoring terminal within its own management scope.
- the security gateway collects the terminal identifiers of each online monitoring terminal mounted on the preset transmission line for the main station to make judgments, saving the processing resources of the main station.
- the self-organizing network of power system communication can include stock online monitoring terminals and incremental online monitoring terminals, security gateways with concentrators, and master stations.
- CFDA Cellular Fixed-wireless Digital Access
- micro-cellular fixed node wireless data access system is a wireless data access system with self-organizing MESH network structure characteristics.
- the above-mentioned CFDA mainly includes DAU (Distributing Access Unit, distributed access unit), CAC (Cellular Access Center, cellular access center) and security gateway (GPRS gateway).
- this application carries out security encryption design for existing online monitoring terminals and incremental online monitoring terminals, and establishes a unified password management scheme.
- the existing online monitoring terminals are connected to the security gateway based on integrated independent security chips, and additional
- the online monitoring terminal is based on the integrated encrypted secure terminal with 4G communication module and accesses the security gateway.
- the main station function integrates security services.
- the online monitoring terminal and the main station side have two-way identity authentication and two-way transmission data encryption and decryption, realizing the process from the online monitoring terminal to the main station.
- the full-link security encryption authentication of the main station reduces the risk of network attacks due to online monitoring, enables safe transmission of monitoring data, and ensures data reliability.
- two-way identity authentication and two-way transmission data encryption and decryption are adopted to achieve full-link security encryption authentication from the online monitoring terminal to the main station, reducing the risk of network attacks due to online monitoring, realizing safe transmission of online monitoring data, and ensuring Data reliability.
- two-way identity authentication refers to comparing the terminal identification extracted from the other party with the terminal identification pre-stored by itself. If the comparison results are consistent, it means that the authentication is successful, otherwise it means that the authentication fails. If authentication fails, the transmitted data will be discarded without any acknowledgment or response. It can prevent pseudo nodes or illegal intruders from easily intercepting terminal identification, thus ensuring data security.
- the online monitoring terminal has pre-stored multiple sets of ciphertext decryption rules issued by the main station, and the corresponding multiple sets of ciphertext decryption rules will be sent to each online monitoring terminal in advance, so that each online monitoring terminal can obtain the information from the multiple sets of ciphertext. Obtain a set of decryption rules to decrypt the currently received preset insertion rule ciphertext.
- the security gateway publishes messages to each online monitoring terminal, the one-time encryption method can also be used to further improve the security of data transmission.
- the security gateway provides a public key pool, and the key can be randomly selected for encryption each time a message is distributed.
- each online monitoring terminal stores the agreed decryption key in advance. This decryption key can be used to achieve secure authentication, encryption and decryption of data each time.
- the communication between the stock online monitoring terminal, the incremental online monitoring terminal and the security gateway mainly includes: the stock online monitoring terminal is based on the integrated independent security chip for encrypted communication with the security gateway, and the incremental online monitoring terminal is based on the integrated 4G communication module. Encrypted communication between the encrypted security terminal and the security gateway.
- a unified password communication method is used to communicate with each other, thereby ensuring the relative security of the entire power grid communication, achieving safe transmission of monitoring data, and ensuring data security. reliability.
- an online monitoring method for power transmission lines is provided.
- the introduction of this method embodiment can refer to the content of the system embodiment, and will not be described again here.
- this method embodiment may include the following steps:
- Step S301 Receive the encrypted online monitoring data packet sent by the online monitoring terminal.
- the encrypted online monitoring data packet is obtained by the online monitoring terminal in the following manner: the online monitoring terminal splices the online monitoring data obtained by online monitoring of the transmission line it is mounted with its own terminal identification , obtain the online monitoring data packet, encrypt the online monitoring data packet according to its own encryption method, and obtain the encrypted online monitoring terminal.
- Step S302 After successfully decrypting the encrypted online monitoring data packet based on the decryption method owned by itself, it is determined that the probability that the online monitoring data packet originates from the online monitoring terminal within its management range is greater than or equal to the first threshold.
- Step S303 After determining that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management scope is greater than or equal to the first threshold, when the terminal identification in the online monitoring data packet belongs to an online monitoring terminal within its own management scope, When identifying the terminal of the terminal, it is determined that the probability that the online monitoring data packet originates from the online monitoring terminal within its own management scope is greater than or equal to the second threshold, and a response is made based on the online monitoring data in the online monitoring data packet; wherein the third The second threshold is greater than the first threshold.
- the main station determines that the received online monitoring data packet originates from the online monitoring data packet within the management scope of the main station based on the correspondence between the encryption method of the online monitoring data packet and the decryption method it owns. Whether the probability of monitoring the terminal is greater than or equal to the first threshold. If so, further combine the terminal identification in the online monitoring data packet with whether it belongs to the terminal identification of the online monitoring terminal within the management scope of the terminal itself. If so, determine the received online monitoring data packet. Whether the probability originating from online monitoring terminals within the management range of the main station is greater than or equal to the second threshold, thereby avoiding responding to online monitoring data from online monitoring terminals not within the management range of the main station and improving the accuracy of the response.
- the main station can decrypt the encrypted online monitoring data packet based on its own decryption method. If the decryption is successful, it determines that the encryption method of the online monitoring data packet is the same as its own. Corresponds to the decryption method owned.
- the master station can use the encryption method corresponding to the decryption method it owns as the encryption method to be distributed; send the encryption method to be distributed to the online monitoring terminal mounted on the preset transmission line; the preset The transmission line is a transmission line located in the geographical area corresponding to the management scope of the main station itself.
- the main station can receive the encrypted online monitoring data packet of the online monitoring terminal via the security gateway; the main station can also receive the terminal identification of each online monitoring terminal mounted on the preset transmission line sent by the security gateway; wherein, The preset power transmission line is a power transmission line located in a geographical area corresponding to the management scope of the main station itself. If it is determined that the terminal identification in the online monitoring data packet is consistent with the terminal identification of one of the online monitoring terminals sent by the security gateway, the main station can determine that the terminal identification in the online monitoring data packet belongs to the online terminal within its own management scope. The terminal identification of the monitoring terminal.
- an online monitoring device for power transmission lines is provided, applied to the main station, and includes:
- the data packet receiving module 401 is used to receive the encrypted online monitoring data packet sent by the online monitoring terminal; the encrypted online monitoring data packet is obtained by the online monitoring terminal in the following way: the online monitoring terminal will The online monitoring data obtained by online monitoring of the mounted transmission line is spliced with its own terminal identification to obtain an online monitoring data packet. The online monitoring data packet is encrypted according to its own encryption method to obtain an encrypted online monitoring terminal. ;
- the first processing module 402 is configured to, after successfully decrypting the encrypted online monitoring data packet based on its own decryption method, determine that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management scope is greater than or equal to the first threshold;
- the second processing module 403 is configured to, after determining that the probability that the online monitoring data packet originates from an online monitoring terminal within its own management scope is greater than or equal to the first threshold, when the terminal identification in the online monitoring data packet belongs to its own management scope
- the probability that the online monitoring data packet originates from the online monitoring terminal within its own management range is greater than or equal to the second threshold, and a response is made based on the online monitoring data in the online monitoring data packet.
- the second threshold is greater than the first threshold.
- the device may also include an encryption and decryption processing module, which is used to decrypt the encrypted online monitoring data packet based on its own decryption method after receiving the encrypted online monitoring data packet. If the decryption is successful, then Make sure that the encryption method for online monitoring data packets corresponds to the decryption method you have.
- an encryption and decryption processing module which is used to decrypt the encrypted online monitoring data packet based on its own decryption method after receiving the encrypted online monitoring data packet. If the decryption is successful, then Make sure that the encryption method for online monitoring data packets corresponds to the decryption method you have.
- the device may also include an encryption method distribution module, configured to use the encryption method corresponding to the decryption method it owns as the encryption method to be distributed; and send the encryption method to be distributed to the preset transmission line.
- An online monitoring terminal; the preset transmission line is a transmission line located in the geographical area corresponding to the management scope of the main station itself.
- the data packet receiving module is also used to receive the encrypted online monitoring data packet of the online monitoring terminal via the security gateway;
- the above device also includes an identification receiving module for receiving the terminal identification of each online monitoring terminal mounted on the preset power transmission line sent by the security gateway; wherein the preset power transmission line is located within the management scope of the main station itself. Transmission lines within the corresponding geographical area;
- the above device also includes an identification judgment module, which is used to determine that if the terminal identification in the online monitoring data packet is consistent with the terminal identification of one of the online monitoring terminals sent by the security gateway, the main station can determine that the terminal identification in the online monitoring data packet is consistent with the terminal identification in the online monitoring data packet.
- the terminal identification belongs to the terminal identification of the online monitoring terminal within its own management scope.
- Each module in the above-mentioned online monitoring device for transmission lines can be implemented in whole or in part through software, hardware, and combinations thereof.
- Each of the above modules may be embedded in or independent of the processor of the computer device in the form of hardware, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
- a master station is provided, and its internal structure diagram can be shown in Figure 5.
- the master includes a processor, memory, and network interfaces connected via a system bus. Among them, the processor of the main station is used to provide computing and control capabilities.
- the main station's memory includes non-volatile storage media and internal memory.
- the non-volatile storage medium stores operating systems, computer programs and databases. This internal memory provides an environment for the execution of operating systems and computer programs in non-volatile storage media.
- the main station's database is used to store online monitoring data for transmission lines.
- the network interface of the master station is used to communicate with external terminals through a network connection.
- the master station also includes input and output interfaces. The input and output interfaces are connection circuits for exchanging information between the processor and external devices. They are connected to the processor through a bus, referred to as the I/O interface.
- the computer program is executed by a processor to implement an online monitoring method for transmission lines.
- FIG. 5 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied.
- the specific computer equipment can May include more or fewer parts than shown, or combine certain parts, or have a different arrangement of parts.
- a master station including a memory and a processor.
- the memory stores a computer program.
- the processor executes the computer program, it implements the steps in each of the above method embodiments.
- a computer-readable storage medium on which a computer program is stored.
- the computer program is executed by a processor, the steps in each of the above method embodiments are implemented.
- a computer program product is provided, a computer program is stored thereon, and the computer program is used by a processor to execute the steps in each of the above method embodiments.
- Non-volatile memory can include read-only memory (ROM), magnetic tape, floppy disk, flash memory or optical memory, etc.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM can be in many forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM).
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
本申请提供一种针对输电线路的在线监测系统、方法、装置和主站,可避免响应非主站管理范围内的在线监测终端的在线监测数据,包括:在线监测终端将对输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身有的加密方式对在线监测数据包进行加密,将加密后的在线监测数据包发给主站;若对在线监测数据包的加密方式与自身拥有的解密方式对应,主站确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于等于第一阈值,当在线监测数据包的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于等于第二阈值并进行响应。
Description
本申请涉及电网监测技术领域,特别是涉及一种针对输电线路的在线监测系统、方法、装置和主站。
输电线路作为电力设备的一种,为保证其正常运行,需要对输电线路进行在线监测。通常,可以在输电线路上挂载相应的在线监测终端,如传感器,以对输电线路进行在线监测。在线监测终端得到其挂载的输电线路的在线监测数据后,将该在线监测数据发给主站,主站基于该在线监测数据进行响应。
在线监测终端数量众多,有时会出现主站对来源于非主站管理范围内的在线监测终端的在线监测数据进行响应,出现响应错误的情况。
发明内容
基于此,有必要针对上述技术问题,提供一种针对输电线路的在线监测系统、方法、装置、主站、存储介质和计算机程序产品。
一种针对输电线路的在线监测系统,所述系统包括:主站和在线监测终端;
所述在线监测终端,用于将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,并将加密后的在线监测数据包发给主站;
所述主站,用于收到加密后的在线监测数据包后,若对在线监测数据包的加密方式与自身拥有的解密方式对应,则确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;
所述主站,还用于在确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
一种针对输电线路的在线监测方法,应用于主站,所述方法包括:
接收在线监测终端发送的加密后的在线监测数据包;加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端;
基于自身拥有的解密方式对加密后的在线监测数据包解密成功后,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;
在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
一种针对输电线路的在线监测装置,应用于主站,所述装置包括:
数据包接收模块,用于接收在线监测终端发送的加密后的在线监测数据包;加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端;
第一处理模块,用于基于自身拥有的解密方式对加密后的在线监测数据包解密成功后,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;
第二处理模块,用于在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所 述第一阈值。
一种主站,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行上述方法。
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行上述方法。
一种计算机程序产品,其上存储有计算机程序,所述计算机程序被处理器执行上述方法。
上述针对输电线路的在线监测系统、方法、装置、主站、存储介质和计算机程序产品中,所述在线监测终端,用于将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,并将加密后的在线监测数据包发给主站;所述主站,用于收到加密后的在线监测数据包后,若对在线监测数据包的加密方式与自身拥有的解密方式对应,则确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;所述主站,还用于在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。该方案中,主站基于对在线监测数据包的加密方式和自身拥有的解密方式之间的对应情况,确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第一阈值,若是,则进一步结合在线监测数据包中的终端标识是否属于终端自身管理范围内的在线监测终端的终端标识,若是,则确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第二阈值,由此,避免对非主站管理范围内的在线监测终端的在线监测数据进行响应,提高响应的正确率。
图1为一个实施例中针对输电线路的在线监测系统的架构示意图;
图2为一个实施例中针对输电线路的在线监测系统的架构示意图;
图3为一个实施例中针对输电线路的在线监测方法的流程示意图;
图4为一个实施例中针对输电线路的在线监测装置的结构框图;
图5为一个实施例中主站的内部结构图。
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
在本申请中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本申请所描述的实施例可以与其它实施例相结合。
在一个实施例中,如图1所示,本申请提供一种针对输电线路的在线监测系统,包括主站和在线监测终端。
其中,所述在线监测终端,用于将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,并将加密后的在线监测数据包发给主站。
进一步地,如图2所示,在线监测终端可以包括存量在线监测终端和增量在线监测终端,存量在线监测终端先于增量在线监测终端挂载至相应的输电线路。存量在线监测终端可以将存储在自身内置的安全芯片中的加密算法作为自身拥有的加密方式;增量在线监测终端可以将外置的与自身对应的加密安全终端的加密算法作为自身拥有的加密方式,该加密安全终端可以集成4G或5G通信模组。
进一步地,如图2所示,本系统还可以包括安全网关,在线监测终端可以经由安全网关将加密后的在线监测数据包发给所述主站;其中,存量在线监测终端可以基于自身内置的安全芯片接入安全网关,增量在线监测终端可以基于 外置的加密安全终端接入安全网关。
所述主站,用于收到加密后的在线监测数据包后,若对在线监测数据包的加密方式与自身拥有的解密方式对应,则确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值。
所述主站,还用于在确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应,其中,第二阈值大于第一阈值。
上述方案中,主站基于对在线监测数据包的加密方式和自身拥有的解密方式之间的对应情况,确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第一阈值,若是,则进一步结合在线监测数据包中的终端标识是否属于终端自身管理范围内的在线监测终端的终端标识,若是,则确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第二阈值,由此,避免对非主站管理范围内的在线监测终端的在线监测数据进行响应,提高响应的正确率。
进一步地,主站将与自身拥有的解密方式对应的加密方式作为待分发加密方式,将所述待分发加密方式发给挂载至预设的输电线路的在线监测终端;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。
主站将与自身拥有的解密方式对应的加密方式分发给相应的在线监测终端,收到该待分发加密方式的在线监测终端属于主站管理范围内的在线监测终端,这样,可以让主站基于解密方式和加密方式之间的对应情况,对收到的在线监测终端是否属于主站管理范围进行初步判断,提高判断效率。
进一步地,主站在收到加密后的在线监测数据包后,可以基于自身拥有的解密方式对加密后的在线监测数据包解密,若解密成功,则确定对在线监测数据包的加密方式与自身拥有的解密方式对应。
主站收到加密后的在线监测数据包后,在判断对在线监测数据包的加密方式是否和自身拥有的解密方式对应时,可以利用主站自身拥有的解密方式对收到的加密后的在线监测数据包进行解密,若解密成功,说明二者对应,提高处理效率。
进一步地,安全网关可以将挂载在预设的输电线路的各在线监测终端的终端标识发给所述主站;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路;
所述主站,还用于若确定所述在线监测数据包中的终端标识与所述安全网关发送的其中一个在线监测终端的终端标识一致,则确定所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识。
上述方式中,由安全网关收集挂载在预设的输电线路的各在线监测终端的终端标识,以供主站进行判断,节约主站的处理资源。
电力系统通信作为电力系统不可缺少的重要组成部分,电力系统通信的自组网可以包括存量在线监测终端和增量在线监测终端、设有集中器的安全网关和主站。CFDA(Cellular Fixed-wireless Digital Access)微蜂窝式固定节点无线数据接入系统是一种自组织的MESH网络结构特征的无线数据接入系统。上述CFDA中主要包括DAU(Distributing Access Unit,分布接入单元)、CAC(Cellular Access Center,蜂窝接入中心)以及安全网关(GPRS网关)。
本申请为保障在线监测网络与数据安全,针对存量在线监测终端和增量在线监测终端进行安全加密设计,并建立统一密码管理方案,存量在线监测终端基于集成自主的安全芯片接入安全网关,增量在线监测终端基于集成带4G通信模组的加密安全终端接入安全网关,主站功能集成安全服务,在线监测终端与主站侧双向身份认证与双向传输数据加解密,实现从在线监测终端到主站的全链路安全加密认证,降低因在线监测遭受网络攻击的隐患风险,实现监测数据的安全传输,保障数据的可靠性。
进一步地,存量在线监测终端、增量在线监测终端、安全网关、主站相互间的通信均采用加密设计,建立统一的密码管理方式,如采用统一密钥等。相互之间采用双向身份认证与双向传输数据加解密,实现从在线监测终端到主站 的全链路安全加密认证,降低因在线监测遭受网络攻击的隐患风险,实现在线监测数据的安全传输,保障数据的可靠性。其中,双向身份认证是指将从对方提取的终端标识与自身预先存储的终端标识进行比对,若比对结果一致,则表示认证成功,否则表示认证失败。若认证失败,则将丢弃传输数据且不作出任何应答或响应。可防止伪节点或非法入侵者对终端标识的轻易截获,进而保证数据的安全性。
其中,在线监测终端预先存储有由主站发布的多套密文解密规则,而对应的多套密文解密规则会预先发送到各在线监测终端,以便于各在线监测终端从该多套密文解密规则中获取一套来对当前接收到的预设插入规则密文进行解密。当安全网关发布消息到各在线监测终端时,还可采用一次一密的加密方法,来进一步提高数据传输的安全性。具体地,安全网关提供有一个公开密钥池,每次分布消息时可随机抽取密钥进行加密,相应地,各在线监测终端预先存储有约定的解密密钥。通过该解密密钥可实现对每次数据的安全认证及加解密。
存量在线监测终端、增量在线监测终端和安全网关之间的通信,主要包括:存量在线监测终端基于集成自主安全芯片与安全网关进行加密通信,增量在线监测终端基于集成带4G通信模组的加密安全终端与安全网关间进行加密通信。
在多个存量在线监测终端、增量在线监测终端组成的自组网内,均采用统一的密码通信方式进行相互通信,进而确保整个电网通信的相对安全,实现监测数据的安全传输,保障数据的可靠性。
在一个实施例中,如图3所示,提供了一种针对输电线路的在线监测方法,其中,本方法实施例的介绍可以参照系统实施例的内容,这里不赘述。
以该方法应用于主站为例进行说明,本方法实施例可以包括以下步骤:
步骤S301,接收在线监测终端发送的加密后的在线监测数据包。
其中,加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端。
步骤S302,基于自身拥有的解密方式对加密后的在线监测数据包解密成功 后,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值。
步骤S303,在确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中第二阈值大于第一阈值。
上述针对输电线路的在线监测方法中,主站基于对在线监测数据包的加密方式和自身拥有的解密方式之间的对应情况,确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第一阈值,若是,则进一步结合在线监测数据包中的终端标识是否属于终端自身管理范围内的在线监测终端的终端标识,若是,则确定收到的在线监测数据包来源于主站管理范围内的在线监测终端的概率是否大于等于第二阈值,由此,避免对非主站管理范围内的在线监测终端的在线监测数据进行响应,提高响应的正确率。
进一步地,主站在收到加密后的在线监测数据包后,可以基于自身拥有的解密方式对加密后的在线监测数据包解密,若解密成功,则确定对在线监测数据包的加密方式与自身拥有的解密方式对应。
进一步地,主站可以将与自身拥有的解密方式对应的加密方式作为待分发加密方式;将所述待分发加密方式发给挂载至预设的输电线路的在线监测终端;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。
进一步地,主站可以经由安全网关接收在线监测终端的加密后的在线监测数据包;主站还可以接收安全网关发送的挂载在预设的输电线路的各在线监测终端的终端标识;其中,所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。若确定所述在线监测数据包中的终端标识与所述安全网关发送的其中一个在线监测终端的终端标识一致,主站可以确定所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识。
应该理解的是,虽然如上所述的各实施例所涉及的流程图中的各个步骤按 照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,如上所述的各实施例所涉及的流程图中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。
在一个实施例中,如图4所示,提供了一种针对输电线路的在线监测装置,应用于主站,包括:
数据包接收模块401,用于接收在线监测终端发送的加密后的在线监测数据包;加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端;
第一处理模块402,用于基于自身拥有的解密方式对加密后的在线监测数据包解密成功后,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;
第二处理模块403,用于在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
进一步地,所述装置还可以包括加密解密处理模块,用于在收到加密后的在线监测数据包后,可以基于自身拥有的解密方式对加密后的在线监测数据包解密,若解密成功,则确定对在线监测数据包的加密方式与自身拥有的解密方式对应。
进一步地,所述装置还可以包括加密方式分发模块,用于将与自身拥有的 解密方式对应的加密方式作为待分发加密方式;将所述待分发加密方式发给挂载至预设的输电线路的在线监测终端;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。
进一步地,数据包接收模块,还用于经由安全网关接收在线监测终端的加密后的在线监测数据包;
上述装置还包括标识接收模块,用于接收安全网关发送的挂载在预设的输电线路的各在线监测终端的终端标识;其中,所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路;
上述装置还包括标识判断模块,用于若确定所述在线监测数据包中的终端标识与所述安全网关发送的其中一个在线监测终端的终端标识一致,主站可以确定所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识。
关于针对输电线路的在线监测装置的具体限定可以参见上文中对于针对输电线路的在线监测方法的限定,在此不再赘述。上述针对输电线路的在线监测装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,提供了一种主站,其内部结构图可以如图5所示。该主站包括通过系统总线连接的处理器、存储器和网络接口。其中,该主站的处理器用于提供计算和控制能力。该主站的存储器包括非易失性存储介质和内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该主站的数据库用于存储针对输电线路的在线监测数据。该主站的网络接口用于与外部的终端通过网络连接通信。该主站还包括输入输出接口,输入输出接口是处理器与外部设备之间交换信息的连接电路,它们通过总线与处理器相连,简称I/O接口。该计算机程序被处理器执行时以实现一种针对输电线路的在线监测方法。
本领域技术人员可以理解,图5中示出的结构,仅仅是与本申请方案相关 的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
在一个实施例中,提供了一种主站,包括存储器和处理器,存储器存储有计算机程序,处理器执行计算机程序时实现上述各个方法实施例中的步骤。
在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现上述各个方法实施例中的步骤。
在一个实施例中,提供了一种计算机程序产品,其上存储有计算机程序,所述计算机程序被处理器执行上述各个方法实施例中的步骤。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,上述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存或光存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上的实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (10)
- 一种针对输电线路的在线监测系统,其特征在于,所述系统包括:主站和在线监测终端;所述在线监测终端,用于将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,并将加密后的在线监测数据包发给主站;所述主站,用于收到加密后的在线监测数据包后,若对在线监测数据包的加密方式与自身拥有的解密方式对应,则确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;所述主站,还用于在确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
- 根据权利要求1所述的系统,其特征在于,所述主站,用于收到加密后的在线监测数据包后,基于自身拥有的解密方式对加密后的在线监测数据包解密,若解密成功,则确定对在线监测数据包的加密方式与自身拥有的解密方式对应。
- 根据权利要求1或2所述的系统,其特征在于,所述主站,还用于将与自身拥有的解密方式对应的加密方式作为待分发加密方式,将所述待分发加密方式发给挂载至预设的输电线路的在线监测终端;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。
- 根据权利要求1所述的系统,其特征在于,所述在线监测终端包括存量在线监测终端和增量在线监测终端,所述存量在线监测终端,用于将存储在自身内置的安全芯片中的加密算法作为自身拥有的加密方式;所述增量在线监测终端,用于将外置的与自身对应的加密安全终端的加密算法作为自身拥有的加密方式。
- 根据权利要求1所述的系统,其特征在于,所述系统还包括安全网关;所述在线监测终端,还用于经由安全网关将加密后的在线监测数据包发给所述主站;所述安全网关,还用于将挂载在预设的输电线路的各在线监测终端的终端标识发给所述主站;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路;所述主站,还用于若确定所述在线监测数据包中的终端标识与所述安全网关发送的其中一个在线监测终端的终端标识一致,则确定所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识。
- 一种针对输电线路的在线监测方法,其特征在于,应用于主站,所述方法包括:接收在线监测终端发送的加密后的在线监测数据包;加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端;基于自身拥有的解密方式对加密后的在线监测数据包解密成功后,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
- 根据权利要求6所述的方法,其特征在于,所述方法还包括:在收到加密后的在线监测数据包后,基于自身拥有的解密方式对加密后的 在线监测数据包解密,若解密成功,则确定对在线监测数据包的加密方式与自身拥有的解密方式对应。
- 根据权利要求6或7所述的方法,其特征在于,所述方法还包括:将与自身拥有的解密方式对应的加密方式作为待分发加密方式;将所述待分发加密方式发给挂载至预设的输电线路的在线监测终端;所述预设的输电线路是位于所述主站自身管理范围对应的地理区域内的输电线路。
- 一种针对输电线路的在线监测装置,其特征在于,应用于主站,所述装置包括:数据包接收模块,用于接收在线监测终端发送的加密后的在线监测数据包;加密后的在线监测数据包是所述在线监测终端通过如下方式得到的:所述在线监测终端将对自身所挂载的输电线路进行在线监测得到的在线监测数据和自身的终端标识进行拼接,得到在线监测数据包,按自身拥有的加密方式对所述在线监测数据包进行加密,得到加密后的在线监测终端;第一处理模块,用于基于自身拥有的解密方式对加密后的在线监测数据包解密成功后,确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值;第二处理模块,用于在确定在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第一阈值之后,当所述在线监测数据包中的终端标识属于自身管理范围内的在线监测终端的终端标识时,确定所述在线监测数据包来源于自身管理范围内的在线监测终端的概率大于或等于第二阈值,并基于所述在线监测数据包中的在线监测数据进行响应;其中,所述第二阈值大于所述第一阈值。
- 一种主站,包括存储器和处理器,所述存储器存储有计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求6至8任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210372518.2A CN114465825B (zh) | 2022-04-11 | 2022-04-11 | 针对输电线路的在线监测系统、方法、装置和主站 |
CN202210372518.2 | 2022-04-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023197529A1 true WO2023197529A1 (zh) | 2023-10-19 |
Family
ID=81417200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/120445 WO2023197529A1 (zh) | 2022-04-11 | 2022-09-22 | 针对输电线路的在线监测系统、方法、装置和主站 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114465825B (zh) |
WO (1) | WO2023197529A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114465825B (zh) * | 2022-04-11 | 2022-07-26 | 广东电网有限责任公司佛山供电局 | 针对输电线路的在线监测系统、方法、装置和主站 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080205649A1 (en) * | 2007-01-08 | 2008-08-28 | S&C Electric Co. | Power distribution system secure access communication system and method |
CN104319874A (zh) * | 2014-09-12 | 2015-01-28 | 国家电网公司 | 一种智能电网输电线路状态在线监测系统及其监测方法 |
CN104579684A (zh) * | 2015-01-04 | 2015-04-29 | 成都卫士通信息产业股份有限公司 | 一种适用于配电网数据的sm2校验算法 |
US20180167308A1 (en) * | 2016-03-14 | 2018-06-14 | State Grid Jiangsu Electric Power Company Nanjing Power Supply Company | Multimode Communication Method for Transmission Line Condition Monitoring |
CN208707655U (zh) * | 2018-07-24 | 2019-04-05 | 南方电网科学研究院有限责任公司 | 一种配电自动化密钥协商系统 |
CN110300108A (zh) * | 2019-06-26 | 2019-10-01 | 国网山东省电力公司临朐县供电公司 | 一种配电自动化报文加密传输方法、系统、终端及存储介质 |
CN110996318A (zh) * | 2019-12-23 | 2020-04-10 | 广西电网有限责任公司电力科学研究院 | 一种变电站智能巡检机器人安全通信接入系统 |
CN111313546A (zh) * | 2020-01-19 | 2020-06-19 | 尚阳科技股份有限公司 | 配电变压器监测终端的监控运维系统、方法、存储介质 |
CN114465825A (zh) * | 2022-04-11 | 2022-05-10 | 广东电网有限责任公司佛山供电局 | 针对输电线路的在线监测系统、方法、装置和主站 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109301932A (zh) * | 2018-07-18 | 2019-02-01 | 江阴长仪集团有限公司 | 一种电力能效监测终端及分布式管理方法 |
CN110336379B (zh) * | 2019-07-10 | 2021-07-23 | 国家电网有限公司 | 基于物联网的变电站在线监测系统及终端设备 |
CN110852750A (zh) * | 2019-11-14 | 2020-02-28 | 国网山东省电力公司潍坊市寒亭区供电公司 | 一种输电塔监控系统及监控方法 |
CN112737124B (zh) * | 2020-12-30 | 2023-06-02 | 广东电网有限责任公司电力科学研究院 | 一种电力设备监测终端构建方法和装置 |
-
2022
- 2022-04-11 CN CN202210372518.2A patent/CN114465825B/zh active Active
- 2022-09-22 WO PCT/CN2022/120445 patent/WO2023197529A1/zh unknown
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080205649A1 (en) * | 2007-01-08 | 2008-08-28 | S&C Electric Co. | Power distribution system secure access communication system and method |
CN104319874A (zh) * | 2014-09-12 | 2015-01-28 | 国家电网公司 | 一种智能电网输电线路状态在线监测系统及其监测方法 |
CN104579684A (zh) * | 2015-01-04 | 2015-04-29 | 成都卫士通信息产业股份有限公司 | 一种适用于配电网数据的sm2校验算法 |
US20180167308A1 (en) * | 2016-03-14 | 2018-06-14 | State Grid Jiangsu Electric Power Company Nanjing Power Supply Company | Multimode Communication Method for Transmission Line Condition Monitoring |
CN208707655U (zh) * | 2018-07-24 | 2019-04-05 | 南方电网科学研究院有限责任公司 | 一种配电自动化密钥协商系统 |
CN110300108A (zh) * | 2019-06-26 | 2019-10-01 | 国网山东省电力公司临朐县供电公司 | 一种配电自动化报文加密传输方法、系统、终端及存储介质 |
CN110996318A (zh) * | 2019-12-23 | 2020-04-10 | 广西电网有限责任公司电力科学研究院 | 一种变电站智能巡检机器人安全通信接入系统 |
CN111313546A (zh) * | 2020-01-19 | 2020-06-19 | 尚阳科技股份有限公司 | 配电变压器监测终端的监控运维系统、方法、存储介质 |
CN114465825A (zh) * | 2022-04-11 | 2022-05-10 | 广东电网有限责任公司佛山供电局 | 针对输电线路的在线监测系统、方法、装置和主站 |
Also Published As
Publication number | Publication date |
---|---|
CN114465825A (zh) | 2022-05-10 |
CN114465825B (zh) | 2022-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4924513A (en) | Apparatus and method for secure transmission of data over an unsecure transmission channel | |
US4881263A (en) | Apparatus and method for secure transmission of data over an unsecure transmission channel | |
US10749667B2 (en) | System and method for providing satellite GTP acceleration for secure cellular backhaul over satellite | |
US11336627B2 (en) | Packet inspection and forensics in an encrypted network | |
WO2020173231A1 (zh) | 资源请求方法、设备及存储介质 | |
CN111355684B (zh) | 一种物联网数据传输方法、装置、系统、电子设备及介质 | |
WO2023197529A1 (zh) | 针对输电线路的在线监测系统、方法、装置和主站 | |
US8464044B2 (en) | Wireless network probe system and method | |
CN111414640A (zh) | 秘钥访问控制方法和装置 | |
CN114142995B (zh) | 面向区块链中继通信网络的密钥安全分发方法及装置 | |
CN113992427B (zh) | 基于相邻节点的数据加密发送方法及装置 | |
CN115333839A (zh) | 数据安全传输方法、系统、设备及存储介质 | |
US11652910B2 (en) | Data transmission method, device, and system | |
WO2022021256A1 (zh) | 一种关联控制方法及相关装置 | |
CN100499649C (zh) | 一种实现安全联盟备份和切换的方法 | |
US20230208625A1 (en) | Communication method and related apparatus | |
KR20240002666A (ko) | 메신저 서비스를 제공하기 위한 방법, 시스템 및 비일시성의 컴퓨터 판독 가능한 기록 매체 | |
WO2022110688A1 (zh) | 基于现场总线的数据传输方法、身份识别方法及系统 | |
CN113472715B (zh) | 数据传输方法和装置 | |
WO2019200690A1 (zh) | 数据保护方法、服务器及计算机可读存储介质 | |
CN111859351A (zh) | 向芯片写入信息的方法、系统、服务器及存储介质 | |
CN113849851A (zh) | 代理方法、设备及计算机可读存储介质 | |
WO2023024540A1 (zh) | 处理报文、获取sa信息的方法、装置、系统及介质 | |
CN116418602B (zh) | 一种基于可信硬件的元数据保护匿名通信方法及系统 | |
WO2021189258A1 (zh) | 实现保密通信的方法、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22937166 Country of ref document: EP Kind code of ref document: A1 |