A trusted working system for power grid information security based on big data

An information security and big data technology, applied in the field of big data, can solve problems such as potential safety hazards and impacts on the normal operation of the power grid, and achieve the effects of safety assurance, reduction of manual intervention, and improvement of computing efficiency

Active Publication Date: 2017-05-31
江苏柯而特信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] On the one hand, it is necessary to disclose the power grid information to the public and accept supervision. On the other hand, if the information is accessed without identity verification, it will have an impact on the normal operation of the power grid and cause potential safety hazards. How to ensure that the information is fully disclosed on the premise of Grid information security has not been effectively resolved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted working system for power grid information security based on big data
  • A trusted working system for power grid information security based on big data
  • A trusted working system for power grid information security based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 1 The big data-based power grid information security trusted working system shown includes a data quality management module 1, a useful data mining module 2, an identity verification module 3 and a trusted evaluation module 4, wherein the quality management module 1 includes a data descriptor Module 11, data quality evaluation sub-module 12 and data quality classification management sub-module 13, useful data mining module 2 includes data preprocessing sub-module 21, useful data construction sub-module 22, useful data correction sub-module 23 and useful data hierarchical mining The sub-module 24 and the identity verification module 3 include a fingerprint identification sub-module 31 and an alarm sub-module 32 .

[0053] (1) Data description sub-module 11:

[0054] The data is described by introducing the attributes of the data itself and the attributes of the data influencer. The attributes of the data itself are represented by the size of the data, the...

Embodiment 2

[0092] Such as figure 1 The big data-based power grid information security trusted working system shown includes a data quality management module 1, a useful data mining module 2, an identity verification module 3 and a trusted evaluation module 4, wherein the quality management module 1 includes a data descriptor Module 11, data quality evaluation sub-module 12 and data quality classification management sub-module 13, useful data mining module 2 includes data preprocessing sub-module 21, useful data construction sub-module 22, useful data correction sub-module 23 and useful data hierarchical mining The sub-module 24 and the identity verification module 3 include a fingerprint identification sub-module 31 and an alarm sub-module 32 .

[0093] (1) Data description sub-module 11:

[0094] The data is described by introducing the attributes of the data itself and the attributes of the data influencer. The attributes of the data itself are represented by the size of the data, the...

Embodiment 3

[0132] Such as figure 1 The big data-based power grid information security trusted working system shown includes a data quality management module 1, a useful data mining module 2, an identity verification module 3 and a trusted evaluation module 4, wherein the quality management module 1 includes a data descriptor Module 11, data quality evaluation sub-module 12 and data quality classification management sub-module 13, useful data mining module 2 includes data preprocessing sub-module 21, useful data construction sub-module 22, useful data correction sub-module 23 and useful data hierarchical mining The sub-module 24 and the identity verification module 3 include a fingerprint identification sub-module 31 and an alarm sub-module 32 .

[0133] (1) Data description sub-module 11:

[0134] The data is described by introducing the attributes of the data itself and the attributes of the data influencer. The attributes of the data itself are represented by the size of the data, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power grid information security credible work system based on big data. According to the system architecture, a credibility assessment mechanism and a credible relation transmission mechanism are constructed on the basis of protection functions, authentication, integrity measurement and other features, and the system comprises a data quality management module, a useful data mining module, an authentication module and a credibility assessment module. The data quality management module comprises a data description submodule, a data quality evaluation submodule and a data quality level-to-level administration submodule, the useful data mining submodule comprises a data preprocessing submodule, a useful data construction submodule, a useful data correction submodule and a useful data hierarchical mining submodule, and the authentication module comprises a fingerprint identification submodule and an alarm submodule.

Description

technical field [0001] The invention relates to the field of big data, in particular to a safe and trusted working system for power grid information based on big data. Background technique [0002] Big data refers to the collection of data whose content cannot be captured, managed and processed by conventional software tools within a certain period of time. The research and application of big data has become an indispensable research field of modern information. [0003] Among the data information currently in use, a large part of the data is released by the manager and modified by the manager according to the user's suggestion or the manager's own needs. For this part of the massive information, how can we Better quality management and mining, and finding useful information quickly and effectively, is an urgent problem to be solved. [0004] Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/32G06F21/62G06F21/78G06Q50/06
CPCG06F16/90G06F16/903G06F21/32G06F21/6227G06F21/78G06F2216/03G06Q50/06
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月曾明霏杭聪贺冠博王海黎新何钟柱
Owner 江苏柯而特信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products