Smart power grid user access authorization method

A smart grid and smart power technology, applied in the field of smart grid user access authorization, can solve the problems of easy theft of user privacy and sensitive information, inconvenient system and business expansion, lack of strict authentication and encryption, etc., to help the network life cycle. and energy control, improving simplicity and scalability, reducing the probability of being cracked

Inactive Publication Date: 2014-01-01
STATE GRID CHONGQING ELECTRIC POWER
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the smart grid information exchange security access and access control is still in its infancy, the direct application of the existing access control technology to the smart grid may cause the following problems: (1) The openness of the remote access layer wireless channel makes the smart grid The power grid is easy to be monitored, which makes the privacy and sensitive information of users in the network easy to be stolen. Malicious attackers can access and modify important data of users in the power grid by impersonating users based on the existing background information
(2) The two-way interaction between the power grid and users is enhanced, intelligent collection and intelligent terminal equipment are used in large quantities, a large number of distribution networks and user two-way intelligent terminal equipment need or even must be accessed through wireless public networks, and a large num

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart power grid user access authorization method
  • Smart power grid user access authorization method
  • Smart power grid user access authorization method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0046] The embodiments of the present invention are described in detail below, and examples of the embodiments are shown in the accompanying drawings. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present invention, but should not be construed as an explanation of the present invention. limit.

[0047] The invention provides a data security transmission method in a body area network system, in particular a smart grid user access authorization method, which includes the following steps:

[0048] The first step: deploy the smart grid security access system according to the hierarchical structure, the remote access layer is the smart power terminal, the access security layer is the access control component, the access control component and the authentication server; after the smart power terminal completes the security access authentication The authority credential information is sent to the access contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a smart power grid user access authorization method. The smart power grid user access authorization method includes the following steps that a smart power grid safety connection system is deployed according to the hierarchical structure, after finishing safety connection authorization, a smart electric power terminal sends authority certification information to a connection control assembly, and the connection control assembly conducts computing on the certification information and sends the result to a certification server for role certification and authorization, wherein a remote access layer is the smart electric power terminal, and a connection safety layer is composed of the connection control assembly, an access control assembly and the certification server. According to the smart power grid user access authorization method, relevant certification functions are implemented by the connection control assembly which is used as the third party, the functions of the smart terminal (especially a mobile terminal) are weakened, and therefore privacy information of users can be protected in the authorization process. In addition, appropriate access authorization is conducted according to roles of the users, only access resources which are matched with the roles of the users in the minimum range are open to the users, internal resources are prevented from illegal access to a certain extent, and the safety requirements of a smart power grid are met.

Description

technical field [0001] The invention belongs to the field of access control, relates to terminal access authorization and user authority management in a smart grid, and in particular relates to a smart grid user access authorization method. Background technique [0002] As a branch of the Internet of Things, smart grid is an important public application network. The electric power industry is the most important basic energy industry in the national economic development, and plays an extremely important role in the sustainable development of the national economy. With the development of the world economy, the aggravation of climate change and the adjustment of energy policies in various countries, the relationship between power grids, power plants, governments, customers and other groups has become closer, and customers' requirements for power quality are constantly improving. Renewable energy has gradually become an important power source The world's energy is developing to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/28
Inventor 杨云吕跃春白云庆聂静吴斌常涛
Owner STATE GRID CHONGQING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products