Electric power secondary system safety incident analysis method for non-conformity strategy access

A technology for power secondary systems and security incidents, applied to electrical components, transmission systems, digital transmission systems, etc., can solve problems such as weak information correlation, high database pressure, and on-site users struggling to solve various alarms, etc., to achieve Reduce time complexity, achieve precise positioning, and achieve intelligent effects

Active Publication Date: 2015-05-06
BEIJING KEDONG ELECTRIC POWER CONTROL SYST +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are also some problems: the intranet security monitoring platform mainly implements the function of summarizing alarm information, and does not perform secondary analysis on massive alarm data, resulting in numerous on-site alarms and weak information correlation, which is not conducive to reflecting the security of the secondary power system Risk indicators, on the contrary, cause on-site users to be exhausted in solving various alarms, which seriously affects the vitality of the intranet security monitoring platform; the analysis and storage of intranet security monitoring data and the compression and merging of alarms are performed asynchronously. The pressure is high, and the alarm generation cycle is also long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power secondary system safety incident analysis method for non-conformity strategy access
  • Electric power secondary system safety incident analysis method for non-conformity strategy access
  • Electric power secondary system safety incident analysis method for non-conformity strategy access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical content of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0029] figure 1 It is an overall flow chart of the analysis method for the safety event of the power secondary system provided by the present invention. Among them, the original alarm data is processed by the agent module, and then processed by the alarm parsing and merging module (Logagent), and then placed in the database. The alarm secondary analysis module (loganlyse) reads the data from the database for secondary analysis and business association, and processes The results are put back into the database.

[0030] (1) Alarm parsing and merging.

[0031] Such as figure 2 As shown, in the Chinese patent application with the application publication number CN103607291A, a method for analyzing and merging alarms for the intranet security monitoring platform of the power secondary system is disclosed, which includes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an electric power secondary system safety incident analysis method for non-conformity strategy access. The method includes the steps: (1) extracting a characteristic value of a new alarm when a new alarm is given; polling a device linked list in a real-time non-conformity strategy access alarm list, judging whether the new alarm is positioned in a node of the device linked list or not, and turning to the step (2) if the new alarm is positioned in the node of the device linked list; turning to the step (3) if not; (2) indicating the new alarm if the new alarm is positioned in the node of the device linked list, and associating the new alarm with an alarm maintained by the node; (3) finding a corresponding position in the device linked list and inserting the new alarm if not; (4) updating the real-time non-conformity strategy access alarm list. By the aid of association mining, numerous non-conformity strategy access alarm messages appearing on the site is analyzed twice to form a more significant alarm message, and function support is provided for rapid positioning and timely processing of the alarm.

Description

technical field [0001] The invention relates to an alarm event analysis method, in particular to a power secondary system safety event analysis method for non-compliance policy access, and belongs to the technical field of power system dispatching. Background technique [0002] The internal network security monitoring platform of the power secondary system (referred to as the internal network security monitoring platform) is mainly used for security event monitoring, security event analysis, statistical reports, asset management, etc. of the internal network of the power secondary system, and is to maintain the security and stability of the power secondary system Important technical support for operation. [0003] In the Chinese invention patent application with publication number CN101222725A, a method for reducing the number of northbound interface alarms by using alarm merging is disclosed. Among them, the network element management system EMS reports alarms or alarm rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
Inventor 高明慧高翔梁野卢楷张志军
Owner BEIJING KEDONG ELECTRIC POWER CONTROL SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products