Electric power scheduling system and business monitoring method for the same

A power dispatching and business technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inundation of safety information and alarm events, failure to repair in time, and increased maintenance costs, so as to save the time needed to find the cause of the problem. time, improve the quality of business monitoring, and avoid the effect of noise pollution

Inactive Publication Date: 2016-04-27
SHANDONG UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Traditional equipment monitoring and management products only focus on a certain aspect of operation and maintenance. It is difficult for these decentralized and independent management systems to form an overall risk perspective, which makes it difficult to coordinate security policies and configurations, and to respond quickly to security incidents
Failure to comprehensively and accurately grasp the information security status of the dispatch automation system, failure to promptly and effectively identify the cause of the problem, resulting in failure to repair the failure in time
[0005] (2) Due to the increasing amount of safety-related information, key safety information and warning events are often overwhelmed by low-value or worthless warning information, and it is difficult to analyze and extract some global and significant issues
[0006] (3) The increasing complexity of network systems and application systems is continuously increasing the difficulty, workload, and labor costs of operation and maintenance. It is time-consuming and labor-intensive to manage a large number of hosts, network devices, and security devices in scattered locations.
Operation and maintenance personnel are busy all day to find the cause of the problem
[0007] ⑷Because new security threats always appear before security countermeasures, when a device has a problem, the traditional method cannot immediately know which device is faulty, let alone intuitively find out the cause of the network device, information channel, or server device or application system
It is very inconvenient to use, and when using it, it needs to operate and maintain from hardware equipment to application software and database. It is impossible to intuitively see where the problem occurs. Operation and maintenance personnel usually need to check the network, server host and software system one by one. The professionalism of equipment operation and maintenance personnel is too high, which increases the cost of maintenance
[0008] In addition, in the existing technology, when the operation and maintenance personnel go to the site to maintain related equipment, they usually need to wait for the relevant users of the equipment to be maintained to save the corresponding data, which affects the work efficiency of the operation and maintenance personnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power scheduling system and business monitoring method for the same
  • Electric power scheduling system and business monitoring method for the same
  • Electric power scheduling system and business monitoring method for the same

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0049] Such as figure 1 , 3 As shown, a business monitoring method for a power dispatching system of the present invention includes:

[0050] Step A, collecting security event logs generated by at least two devices in the power dispatching system in real time: in this embodiment, the devices include firewalls, intrusion detection systems, anti-virus software, network devices, operating systems, and databases;

[0051] Step B, read the security events in each security event log collected in step A in real time, and based on the preset importance levels of security events, and the pre-established mapping relationship between the above-mentioned importance levels and related security events, Determine and classify the importance level of each security event read above; the importance level includes level I, level II and level III;

[0052] Step C, respectively counting the number of security events in each importance level classification in real time, and comparing the number o...

specific Embodiment approach 2

[0072] The difference from specific embodiment 1 is that in the business monitoring method for power dispatching system described in this specific embodiment: in step D, for each importance level classification, each security event is reported in the form of a report Statistics show. This facilitates the centralized management, centralized monitoring and effective auditing of the dispatching system business, which is more practical.

[0073] The difference from specific embodiment 1 is that in the service monitoring system for power dispatching system described in this specific embodiment: for the security event log processing unit, it is also used to call the display unit to display each of the importance levels The various security events classified are displayed in the form of reports, so as to facilitate the centralized management, centralized monitoring and effective audit of the dispatching system business; in addition, the business monitoring system for the power dispat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an electric power scheduling system and a business monitoring method for the same. The business monitoring method comprises steps of collecting safety incident logs in the electric power scheduling system in real time, reading the safety incident in safety incident logs in real time, determining and dividing the importance level of all read incidents according to the important level of the preset safety incident and preset established mapping relations between the various importance levels and related safety incidents, performing statistics on the quantity of the safety incidents in various importance level classifications, performing comparison on the statistic quantity and a preset corresponding value, performing corresponding importance level classification alarm according to the comparison result, and displaying read safety incident by classification. The invention can improve the working efficiency of the operation personnel, reduces the omission probability on the relative important problem, reduces the requirement on the specialty and avoids the noise pollution during alarming.

Description

technical field [0001] The invention relates to the field of service monitoring of electric power dispatching system, in particular to a service monitoring method and system for electric power dispatching system. Background technique [0002] With the rapid advancement of the information construction process of electric power enterprises, the network system is becoming more and more complex, and the system architecture is becoming larger and larger, especially the problems of safe operation and maintenance are becoming more and more prominent. [0003] In recent years, the power grid company system has implemented strong logic isolation of information internal and external networks, information system security level protection, deployed information internal and external network boundary protection and monitoring, desktop security management, mobile storage media security management and anti-virus, firewall, intrusion detection, intrusion Defense, traffic audit and other secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/02H04L41/06
Inventor 王剑车仁飞朱诚刘英亮王恩起
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products