Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power secondary system information security level protection online compliance detection method

A power secondary system, compliance detection technology, applied in the field of level protection, to achieve the effect of flexible expression, saving time and satisfying accuracy

Inactive Publication Date: 2014-08-27
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the deficiencies and shortcomings of the prior art, and provide an intelligent, online online compliance detection method for the information security level protection of the secondary power system, which can effectively solve the problems caused by the manual single-point security configuration inspection method. bring about problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power secondary system information security level protection online compliance detection method
  • Power secondary system information security level protection online compliance detection method
  • Power secondary system information security level protection online compliance detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with specific examples.

[0036] The online compliance detection method of the power secondary system information security level protection described in this embodiment is as follows: figure 1 As shown, the specific process is as follows:

[0037] 1) Create a job and check whether the job needs to be executed immediately. If it needs to be executed immediately, directly call the execution interface, otherwise initialize the scheduler and wait for the task;

[0038] 2) After the job execution time is reached, check the number of objects and the number of collectors, and judge whether the target device is reachable in the network. If the device is connected to the network, use online collection, otherwise call offline collection;

[0039] 3) After the collection method is selected, the task is sent to the collector, and the collector obtains the target device information to realize the configuration bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power secondary system information security level protection online compliance detection method. In terms of power secondary system safety protection assessment requirements and information security level protection standards, an exclusive machine language is designed as a core, so that the power secondary system safety protection assessment requirements and the information security level protection standards are expressed precisely and flexibly, a middle layer acquisition technology is driven to collect configuration base lines, an information restructuring technology is comprehensively applied in a mode that remote detection is combined with local detection, the security configuration problem existing in network assets can be found out automatically, efficiently and accurately, and powerful compliance detection reports are provided. The method can greatly improve accuracy and compliance of safety protection assessment and information security level protection test results and avoid many problems brought by traditional ways.

Description

technical field [0001] The invention relates to the technical field of safety protection evaluation and information security level protection of a power secondary system, in particular to an online compliance detection method for information security level protection of a power secondary system. Background technique [0002] With the improvement of power automation level and the development of communication technology and network technology, the power system relies more and more on the power information network to ensure its safe, reliable and efficient operation. The security of the information network is directly related to the safety of the power system. The research on key technologies of power system information security is particularly important. [0003] With the in-depth development of the research and development and application of the integrated intelligent operation system, the types and quantities of various IT equipment continue to increase, and its security man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L29/06
Inventor 温伯坚苏扬蔡泽祥席禹刘明波
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products