Business nature protection method, device and system for power monitoring system

A technology for system business and power monitoring, applied in transmission systems, information technology support systems, electrical components, etc., can solve problems such as no technical methods

Active Publication Date: 2019-12-24
NANJING NARI GROUP CORP +4
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of the security protection of the business itself, there is no relevant technical method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business nature protection method, device and system for power monitoring system
  • Business nature protection method, device and system for power monitoring system
  • Business nature protection method, device and system for power monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0063] Such as figure 1 As shown, the present invention provides a method for protecting the business essence of a power monitoring system, which performs security protection from five aspects of the business essence, thereby realizing the security protection of the business essence of the power monitoring system, which specifically includes the following contents:

[0064] 1. Protect the security of business software processes

[0065] Through the security check in the compilation stage, it is ensured that the code is safe, the process is free of virus infection, the process space is strongly isolated, and the program execution flow conforms to the predetermined track.

[0066] 1. In order to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a business nature protection method, a device and a system for an electric power monitoring system. The method comprises the following steps: ensuring code security, no virus infection in a process, strong process space isolation and program execution flow conforming to a predetermined track through security check in a compiling stage to protect the security of a business software process; through a data encryption interface of an equipment fingerprint generation secret key, ensuring the storage safety of sensitive data stored in a local machine, and ensuring the communication safety through bidirectional authentication and a mode that a communication processing function cannot execute codes in a landing mode; ensuring the service security in a credible authorization verification mode; and protecting the man-machine interaction security of the service software by fusing unified identity authentication and authorization management of an operating system and a service application user. According to the method, security protection is provided for five essential aspects of process, storage, communication, service and man-machine interaction, so that security protection of the business nature of the power monitoring system is realized.

Description

technical field [0001] The invention belongs to the technical field of power system automation network security, and in particular relates to a method, device and system for protecting the business essence of a power monitoring system. Background technique [0002] The new generation of power monitoring system adopts the advanced technology of "cloud big things moving intelligence", builds public components such as data management, communication management and distributed computing, big data mining analysis, artificial intelligence engine, etc. The application provides unified and standardized basic services, data services and human-computer interaction services to create a reliable, safe and efficient system operating environment, as well as a standard and open multi-service and multi-scenario development ecology. [0003] A large number of new technologies are adopted in the new generation of power monitoring system, and the security risks introduced by new technologies an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/08H04L63/0869H04L63/0823H04L63/12Y04S40/20
Inventor 刘苇陶洪铸魏兴慎周劼英汪明张晓杨维永朱世顺祁龙云吕小亮闫珺王海清刘勇裴培
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products