Threat processing system based on smart grid information security detection

A smart grid and information security technology, applied in the field of threat processing systems, can solve the problems of lack of three-dimensionality, inability to guide the construction of smart grid security systems, lack of linkage, etc., and achieve the effect of comprehensive guidance

Active Publication Date: 2018-04-20
STATE GRID CHONGQING ELECTRIC POWER +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing smart grid information security monitoring, the following models are mainly applied: one is ISO7498-2, which describes functional services and technical mechanisms, and the other is P2DR and PDRR, which explain the important links of information security. Security technology, although P2DR and PDRR put the strategy of security management at the core, but these technologies do not reflect many aspects of information security construction in addition to technology management in each functional link, so they lack three-dimensionality
There is no or less consideration of factors other than technology, and at the same time, there is a lack of linkage in all aspects, so that it cannot provide comprehensive guidance for the construction of the security system of the smart grid.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat processing system based on smart grid information security detection
  • Threat processing system based on smart grid information security detection
  • Threat processing system based on smart grid information security detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0025] The technical scheme that the present invention solves the problems of the technologies described above is:

[0026] figure 1 Shown is a threat processing system based on smart grid information security detection, which mainly includes two parts: the building block of the smart grid framework and the flow graph analysis module, among which:

[0027] The building block of the smart grid framework: designed according to the characteristics of the smart grid, it consists of seven parts: smart meters, power towers, power companies, control centers, concentrators, renewable energy and users; smart meters are used to share relevant information with public facilities for monitoring and billing purposes;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention requests for protecting a threat processing system based on smart grid information security detection, mainly relating to the following three parts: smart grid framework abstract design,SGN-based data flow diagram design and analysis on a data flow diagram. In combination with a bidirectional communication characteristic result of an intelligent electric meter, the data flow diagramabout a smart grid is obtained; and finally, the data flow diagram is analyzed, so that a threat on data storage and data flow identifiers is obtained. The method is mainly combined with 5 entity objects, 6 data storages, 9 processing programs and 39 data flows in the data flow diagram; due to analysis on the flow diagram, potential threats in the smart grid can be analyzed; applications and essential assets associated with prime assets in a power grid system are determined; and furthermore, the essential assets are protected through a layered attribute encryption method, so that the assets are protected.

Description

technical field [0001] The invention belongs to the intersection field of smart grid and information technology security, and in particular relates to a threat processing system based on smart grid information security detection. Background technique [0002] At present, with the development of economy, social progress, improvement of scientific and technological level, and the increasingly prominent global energy and environmental problems, the power grid is an important infrastructure for social and economic development, an important content of energy strategic layout, and an important link in the energy industry chain. Development is facing new opportunities and challenges. In order to solve the persistent and terrible threat of global warming to the environment, the application of smart grid can improve the management efficiency of energy resources and reduce CO 2 emissions play a vital role in mitigating global warming. [0003] However, due to the interactive charact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/64G06F21/60
CPCG06F21/602G06F21/64H04L9/083H04L9/0847H04L9/0861H04L63/0478H04L63/10H04L63/105
Inventor 杨云吕跃春王华吴文勤艾洪汪靖杰陈曦赵杰邵刚
Owner STATE GRID CHONGQING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products