Electric power communication method and device

A power communication and server technology, applied in electrical components, transmission systems, etc., can solve problems such as shutdown, attack, and unprotected computers, saving time and cost and ensuring information security.

Inactive Publication Date: 2016-12-07
NANYANG POWER SUPPLY COMPANY OF STATE GRID HENAN ELECTRIC POWER
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is the most widely used technology at present, using security protection software to achieve computer information security. This technical solution has the advantages of low cost and flexible development, but there are also some shortcomings: (1) After the system is reinstalled, the software needs to be reinstalled; (2) ) The software is easy to be uninstalled, causing the computer to be in an unprotected state; (3) There are loopholes in the software, Trojan horses and viruses will attack the security protection software, stop the protection process, and make the security protection invalid
The other type is hardware technology solutions, such as hard disks with encryption chips and secure U disks. This solution has the advantages of high security and difficulty in cracking, but there are also some shortcomings: high hardware cost, poor compatibility, and poor versatility
[0005] The above two methods need to use special information security equipment for information security control, the hardware cost is high, and the compatibility and versatility are poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power communication method and device
  • Electric power communication method and device
  • Electric power communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0046] Such as figure 1 As shown, a power communication method includes the following steps:

[0047] Step S101, setting cache servers in different levels of security work areas, each server in the security work area is connected to a corresponding cache server, and the server and cache servers are connected via a virtual private network (VPN);

[0048] Step S102, connect the built-in security encryption chip to the USB port of the server and the cache server for encryption, set the BIOS so that the system can only start from the security encryption chip of the designated USB port; start the system, and judge whether the security encryption chip is working normally, if not work, the system will automatically shut down;

[0049] Step S103, the server sets the authorization authority for the user terminal according to the user type; the USB port of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electric power communication method and device. The method comprises the following steps that cache servers are arranged in different levels of safety operation areas, and each server in the safety operation areas is connected to the corresponding cache servers; USB (Universal Serial Bus) ports of the server and the cache server are connected to an internal security encryption chip for encryption, and a BIOS (Basic Input Output System) is arranged, so that a system is only started from the security encryption chip at the appointed USB port; the server sets authorization for a user terminal according to the user type; a USB port of the user terminal is connected to the internal security encryption chip for encryption, and the BIOS is arranged, so that the system is only started from the security encryption chip at the appointed USB port; when the server detects an access request of a user, the server carries out user authentication; after the authentication is successful, the server carries out access, search and change on data according to instructions sent by the user terminal; and the data is stored into the cache server and is sorted in the cache server according to the addressed times. The method and the device are used for realizing the secure transmission of electric power data, are good in universality and are suitable for occasions with higher requirements for data security of electric power departments.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to an electric power communication method and device. Background technique [0002] The traditional technical solutions to realize computer information security are mainly divided into two categories: one is software technical solutions. This is the most widely used technology at present, using security protection software to achieve computer information security. This technical solution has the advantages of low cost and flexible development, but there are also some shortcomings: (1) After the system is reinstalled, the software needs to be reinstalled; (2) ) The software is easy to be uninstalled, causing the computer to be in an unprotected state; (3) There are loopholes in the software, Trojan horses and viruses will attack the security protection software, stop the protection process, and make the security protection invalid. The other type is hardware technology s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/08H04L63/083H04L63/102H04L63/1416
Inventor 李勇谷超李红姚伟周英豪李东谷明浩
Owner NANYANG POWER SUPPLY COMPANY OF STATE GRID HENAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products