Cross-security intranet and Internet data security interaction system and method

A data security and interactive system technology, applied in the field of electric power dispatching automation, can solve the problems of incapable of vertical authentication, non-partitioned security, non-dedicated network, etc., and achieve the effect of ensuring security

Active Publication Date: 2020-07-17
NARI TECH CO LTD +3
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the defects of the existing technology, provide a data security interaction system and method across the secure intranet and the Internet, and completely open up the data interaction between the power dispatch automation system and the ubiquitous resource aggregator system Barriers, realize the data transmission between the power dispatching data network security area and the Internet area, and completely solve the technical defects of the existing interaction methods that are not partitioned in security, not dedicated to the network, not isolated horizontally, and cannot be authenticated vertically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-security intranet and Internet data security interaction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1: as figure 1 As shown, the present invention proposes a data security interactive system across a secure intranet and the Internet, including at least one SCADA server, forward network security isolation equipment, reverse network security isolation equipment, communication servers, database servers, information security network isolation Device and acquisition server; the SCADA server is located in the dispatching control security zone 1; the communication server and the database server are located in the dispatching management security zone 3; the collection server is located in the Internet zone; both the forward network security isolation device and the reverse network security isolation device are set in the SCADA server and the communication server; the information security network isolation device is set between the database server and the collection server; the data transmission client of the communication server is connected with the data server of ...

Embodiment 2

[0022] Embodiment 2: When the data access system across the secure intranet and the Internet is in the state of uploading data, the acquisition server sends the data to the database server through the information security network isolation device by calling the database security agent service; The wired network of the static IP communicates with the database server; the communication server reads the uploaded data by calling the database service, generates a power system standard E format file, transmits it to the SCADA server through the reverse network security isolation device, and finally analyzes it by the SCADA server. Store, display, all the other are the same as embodiment 1.

Embodiment 3

[0023] Embodiment 3: when the data access system across the secure intranet and the Internet is in the state of sending data, the SCADA server sends the data to the communication server through the forward network security isolation device in the form of a message; the communication server calls the database service Write the issued data into the database server; the acquisition server obtains the issued data from the database server through the information security network isolation device by calling the database security agent service, and the rest is the same as that of embodiment 2.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cross-security intranet and Internet data security interaction system and method. The data security interaction system comprises an SCADA server, a communication server, a database server and an acquisition server, a forward network security isolation device and a reverse network security isolation device are arranged between the SCADA server and the communication server.A data transmission client of the communication server is connected with a data server of the database server, and an information security network isolation device is arranged between the database server and the acquisition server. The mode that the network security isolation equipment is matched with the information security network isolation device is adopted, cross-security intranet and Internet transmission of electric power data is achieved, a data interaction barrier between an electric power dispatching automation system and a ubiquitous resource aggregator system is broken through, and the security of data interaction is guaranteed.

Description

technical field [0001] The invention relates to a data security interaction system and method across a security intranet and the Internet, and belongs to the technical field of electric power dispatching automation. Background technique [0002] With the rapid development of urbanization, the urban load characteristics of the power grid are becoming more and more obvious, and the difficulty of peak load regulation of the power grid is increasing day by day. Therefore, on the basis of the unified optimization and control function of centralized power generation resources, the power dispatching automation system needs to incorporate ubiquitous regulation resources into the scope of power grid dispatching optimization control, and use its load and time elasticity to increase power grid peak-shaving resources to achieve grid load balance. Shaving peaks and filling valleys. [0003] When the power dispatching automation system collects and controls data on ubiquitous resources, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F16/27
CPCH04L63/02H04L67/06G06F16/27H04L67/56
Inventor 顾云汉黄军高张勇郭骏宁剑凌行龙徐傲朱法顺丁学田吕猛
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products