Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power grid data security protection method and distributed power grid data security protection system

A data security and power grid technology, applied in the field of data security, can solve the problems of poor power grid system operation reliability, low labor or protection level, data security protection and audit dependence, etc., to achieve the effect of safe transmission and improved reliability.

Inactive Publication Date: 2021-09-03
杭州市电力设计院有限公司余杭分公司 +2
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are various data attacks in the power grid data storage system, especially for core data, but the data security protection and auditing in the existing power grid system mainly rely on manual or low protection level, resulting in poor reliability of power grid system operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid data security protection method and distributed power grid data security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] A power grid data security protection method, which implements grid data configuration transformation based on information source coding, configures different data transmission channels and data storage grids for each type of grid data, and provides different data access channels and data storage grids for different data access channels and data storage grids. Different grid data access operation rules and data access nodes are configured in each grid. And configure the corresponding abnormal data filtering algorithm for the entrance of each data transmission channel, all the filtered abnormal data will be fed back to the corresponding power grid data audit node, and the analysis will be realized through the power grid data analysis audit model loaded in the grid data audit node Audit, all analysis and audit results will be fed back to the management cloud.

[0019] In this embodiment, different data access nodes are invoked according to the user's identification result...

Embodiment 2

[0023] Such as figure 1 As shown, a distributed power grid data security protection system includes:

[0024] Distributed data acquisition nodes are used to collect different types of grid data respectively. In this embodiment, the categories can be configured according to the monitoring purpose of grid data;

[0025] The data transmission module is used to configure different data transmission channels for each type of grid data according to the type of grid data collected, so as to realize the filtering and transmission of grid data;

[0026] The data storage module is used to configure different data storage grids for each type of grid data according to the type of grid data collected, and configure different grid data access operation rules and data access for different data access channels and data storage grids Node, and the entrances of different data transmission channels are configured with corresponding abnormal data filtering algorithms;

[0027] The data analysis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data security, in particular to a power grid data security protection method and a distributed power grid data security protection system, and the security protection method comprises the steps: configuring different data transmission channels and data storage grids for each type of power grid data; and configuring different power grid data access operation rules and data access nodes for different data access channels and data storage grids. Different data access nodes are called according to the identity recognition result of the user, so that the unlocking of the data access channel and the data transmission channel within the authority is realized. According to the invention, automatic auditing and analysis of the power grid data can be realized, and safe transmission, storage and access of the power grid data are realized, so that the reliability of a power grid operation system is greatly improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a power grid data security protection method and a distributed power grid data security protection system. Background technique [0002] There are various data attacks in the power grid data storage system, especially for core data, but the data security protection and auditing in the existing power grid system mainly rely on manual work or low protection level, which leads to poor operational reliability of the power grid system. Contents of the invention [0003] In order to solve the above-mentioned technical problems, the present invention provides a power grid data security protection method and a distributed power grid data security protection system, which can realize the safe transmission, storage and access of power grid data while realizing automatic review and analysis of power grid data, thereby Greatly improve the reliability of the power grid operation system. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/9035G06Q50/06
CPCG06F21/6218G06F16/9035G06Q50/06
Inventor 杜忠钱喜鹤王杨黄宁洁李锋
Owner 杭州市电力设计院有限公司余杭分公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products