Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Trusted access method for energy internet, trusted client and server

A technology of energy internet and access method, applied in the field of trusted clients and servers

Active Publication Date: 2019-07-19
NORTH CHINA ELECTRICAL POWER RES INST +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the interaction security problem between multiple systems in the current Energy Internet, this application adds a trusted evaluation module to the independent system to realize the security of various Energy Internet unauthorized terminals accessing the network with the idea of ​​trusted access, and Fully consider the unification of business continuity and information security risk tolerance in different business systems, conduct effective security assessments on terminal requests for access data, and then adopt different access paths for terminals with different risk levels, so as to ensure maximum security The security of the overall system of Energy Internet will not be affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted access method for energy internet, trusted client and server
  • Trusted access method for energy internet, trusted client and server
  • Trusted access method for energy internet, trusted client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0080] At present, the interaction between independent systems in the Energy Internet has not yet been realized in practice. The reason is that on the one hand, operators hope to protect the potential value of information resources in their own systems, and there are technical barriers; It is also difficult to guarantee the security of interaction among multiple systems, and the differences between multiple systems are likely to become attack vuln...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted access method for an energy internet, a trusted client and a server. A trusted authentication service system (comprising a trusted server and a trusted client) is added between an unauthorized terminal and a to-be-interacted energy system; the network access security of various energy internet unauthorized terminals is realized by using a credible access idea, theinformation interaction of a system-level energy system is realized, the interaction security between systems is ensured, and the problem of vulnerability attack caused by the difference between multiple systems is avoided.

Description

technical field [0001] The present application relates to the technical field of trusted computing, and more specifically, relates to a trusted access method for energy Internet, a trusted client and a server. Background technique [0002] The Energy Internet is an inevitable trend in the development of the energy industry. Various forms of energy can achieve the overall balance and optimization of the energy system through information interaction and collaborative optimization. In the current energy information system, its information transmission is relatively independent, that is, energy suppliers such as electricity, natural gas, and heating power network, their information and data management are all completed in their own independent systems, and for system-level information interaction, currently Not yet implemented in practice. The essential reason is that, on the one hand, operators hope to protect the potential value of information resources in their own systems, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/083H04L63/10H04L63/1416H04L63/1433H04L63/145
Inventor 孙跃徐小天陈威李敏司冠林
Owner NORTH CHINA ELECTRICAL POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products