Security protection method of communication data of special electricity public network

A public network communication and data security technology, which is applied in the direction of secure communication devices, electrical components, network connections, etc., can solve problems such as fragile security, low security, and high security, and achieve reliable behavior auditing, improving security, and ensuring The effect of identity reliability

Active Publication Date: 2010-03-03
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF0 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, since the design goal of DTU is protocol conversion and data communication, it does not adopt identity authentication and transmission encryption technology on the network layer in principle, so its security is very low, especially when the transmission delay of GPRS network is long. Large (usually about 1500ms), when using TCP communication, there will often be retransmitted data packets. In order to reduce data traffic and reduce communication costs, many DTUs change TCP to UDP. At this time, they are more vulnerable to hackers on the network and their security is more fragile. , so there is a big potential safety hazard when using this communication mode to realize the data communication of power dispatching, and necessary safety protection measures must be taken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method of communication data of special electricity public network
  • Security protection method of communication data of special electricity public network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as figure 2 As shown, the environment after application of the present invention is: the calling telecontrol communication security gateway 7 and the called telecontrol communication security gateway 9 are connected to the public network 8 by dialing, and an encrypted communication is established for the communication front-end processor 6 and the remote RTU10 Public network communication channel, the data is connected to the telecontrol communication security gateway 7 through the serial port or the network from the communication front-end processor 6, then connected to the public network 8 through the telecontrol communication security gateway 7, and then connected to the telecontrol communication security gateway from the public network 8 9. Connect the remote RTU10 through a serial port or a network, the calling remote communication security gateway 7 is provided with an internal network host I71 and an external network host I72, and the called remote communica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection method of communication data of a special electricity public network, which provides secure and reliable data communication for the data communication ofthe special electricity public network by adopting the technical means of network isolation, right control, identity authentication and transmission encryption, realizes the purpose of securely usingthe public network for communication at any time and in any places without making any change to the application environment or software. In the process of application, a calling telecontrol communication security gateway (7) and a called telecontrol communication security gateway (9) are connected to a public network (8) by dialing; an encrypted public network communication channel is establishedfor the communication between a communication front-end processor (6) and a remote RTU (10); and the data is connected with the telecontrol communication security gateway (7) from the communication front-end processor (6) through a serial port or network, connected with the public network (8) through the calling telecontrol communication security gateway (7), connected with the called telecontrolcommunication security gateway (9) from the public network (8), and then connected with the remote RTU (10) through the serial port or the network. The invention can be widely applied to the field ofsecurity protection of the communication data of the public network.

Description

technical field [0001] The invention relates to a method for protecting the security of communication data in a dedicated electric power public network. Background technique [0002] At present, the national electric power system is comprehensively carrying out security protection work in accordance with the requirements of the sixteen-character policy of "safety partition, network dedicated, horizontal isolation, and vertical authentication" determined by the "Secondary Electric Power System Safety Protection Regulations" (No. 5 Order of the Electric Power Regulatory Commission) , It is of great strategic significance to increase the strength of network and information security, ensure the smooth flow of information in normal production and operation, and ensure the safety of the secondary power system. [0003] According to the "Secondary Safety Protection Plan for Electric Power", its requirements for public network communication are as follows: [0004] "Safety protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L12/66
Inventor 刘智勇陈良汉
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products