Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication data security protection method for private electric power public network

A public network communication and data security technology, which is applied in the direction of secure communication devices, electrical components, network connections, etc., can solve problems such as fragile security, low security, and high security, and achieve reliable behavior auditing, improving security, and ensuring The effect of identity reliability

Active Publication Date: 2011-11-30
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, since the design goal of DTU is protocol conversion and data communication, it does not adopt identity authentication and transmission encryption technology on the network layer in principle, so its security is very low, especially when the transmission delay of GPRS network is long. Large (usually about 1500ms), when using TCP communication, there will often be retransmitted data packets. In order to reduce data traffic and reduce communication costs, many DTUs change TCP to UDP. At this time, they are more vulnerable to hackers on the network and their security is more fragile. , so there is a big potential safety hazard when using this communication mode to realize the data communication of power dispatching, and necessary safety protection measures must be taken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication data security protection method for private electric power public network
  • Communication data security protection method for private electric power public network
  • Communication data security protection method for private electric power public network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as figure 2 As shown, the environment after application of the present invention is: the calling telecontrol communication security gateway 7 and the called telecontrol communication security gateway 9 are connected to the public network 8 through dial-up, and the communication between the communication front-end processor 6 and the telecontrol terminal RTU10 is established. Encrypted public network communication channel, the data is connected to the telecontrol communication security gateway 7 through the serial port or network from the communication front-end processor 6, then connected to the public network 8 through the telecontrol communication security gateway 7, and then connected to the telecontrol communication from the public network 8 The security gateway 9 connects the telecontrol terminal RTU10 through a serial port or network, and the calling telecontrol communication security gateway 7 is provided with an internal network host I 71 and an external ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security protection method for private electric power public network communication. The method provides safe and reliable data communication for private electric power public network data communication through the technical means of network isolation, authority control, identity authentication and transmission encryption, and realizes Use public network communication anywhere and safely without any changes to the application environment or software. In application, the calling telecontrol communication security gateway (7) and the called telecontrol communication security gateway (9) are connected to the public network (8) through dial-up, and are the communication front-end processor (6) and the telecontrol terminal RTU (10) The communication establishes an encrypted public network communication channel, and the data is connected to the remote communication security gateway (7) from the communication front-end processor (6) through a serial port or network, and connected to the public network (8) through the calling telecontrol communication security gateway (7). , connect the called telecontrol communication security gateway (9) from the public network (8), and then connect the telecontrol terminal RTU (10) through a serial port or network. The invention can be widely used in the field of public network communication data security protection.

Description

technical field [0001] The invention relates to a method for protecting the security of communication data in a dedicated electric power public network. Background technique [0002] At present, the national electric power system is comprehensively carrying out security protection work in accordance with the requirements of the sixteen-character policy of "safety partition, network dedicated, horizontal isolation, and vertical authentication" determined by the "Secondary Electric Power System Safety Protection Regulations" (No. 5 Order of the Electric Power Regulatory Commission) , It is of great strategic significance to increase the strength of network and information security, ensure the smooth flow of information in normal production and operation, and ensure the safety of the secondary power system. [0003] According to the "Secondary Safety Protection Plan for Electric Power", its requirements for public network communication are as follows: [0004] "Safety protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06H04L12/66
Inventor 胡荣周鹏李鹏刘智勇陈良汉
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products