Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method and system based on distribution automation wireless maintenance

A technology of distribution automation and safety certification, applied in the field of intelligent distribution network, can solve problems such as poor wireless connection security

Active Publication Date: 2019-05-17
GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a secure wireless connection security authentication method and system for power distribution terminal equipment to address the problem of poor wireless connection security of existing distribution network terminal equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system based on distribution automation wireless maintenance
  • Security authentication method and system based on distribution automation wireless maintenance
  • Security authentication method and system based on distribution automation wireless maintenance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as figure 1 As shown, in one embodiment, a method for security authentication based on distribution automation wireless maintenance includes the following steps:

[0032] Step S100, receiving a login request uploaded by a mobile terminal, where the login request carries identity authentication information.

[0033] Identity authentication information includes login account number and password, QR code business card, etc. The mobile terminal interacts with the server for login requests through a browser or software. The mobile terminal can be a smartphone, tablet or computer. Specifically, the user may input a login account and a login password on a login interface of the computer.

[0034] Step S200, perform identity authentication according to the login request.

[0035] Identity authentication refers to the confirmation of user identity through certain means. There are many methods of identity authentication, which can be basically divided into: identity authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security authentication method and system based on distribution automation wireless maintenance. Including receiving the login request uploaded by the mobile terminal, the login request carries identity authentication information; performing identity authentication according to the login request; when the identity authentication is successful, generating and sending an instruction to select a power distribution terminal device to the mobile terminal; The instruction of the power terminal equipment, and generate a verification code; send the verification code to the selected power distribution terminal device, and the selected power distribution terminal device will turn on the wireless function; send the verification code to the mobile terminal, and the mobile terminal will pass the verification code according to the verification code Establish a wireless connection with the selected power distribution terminal equipment. The method and system perform encryption authentication based on login request and verification code authentication to ensure the legitimacy of the mobile terminal and the maintenance personnel before establishing a secure and encrypted wireless connection, which can effectively prevent people from using the mobile terminal to power distribution terminals at will. device to operate.

Description

technical field [0001] The invention relates to the field of intelligent distribution network, in particular to a method and system for wireless maintenance security authentication based on distribution automation. Background technique [0002] In recent years, the construction of the power grid has entered a period of rapid development, the operating range of the distribution network is gradually expanding, and the matching distribution network automation system has also begun to be widely used. At the same time, smart mobile devices and wireless Automation and mobility can effectively improve the efficiency of staff. [0003] The distribution network automation terminal mainly refers to various feeder remote terminals of the distribution network feeder loop and the remote terminal of the distribution transformer. station, and at the same time receive the remote control command from the master station and complete the local protection function. The power distribution term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04W76/10H04W12/03
CPCH04L63/083H04L63/0838H04W12/06H04W76/14Y02D30/70
Inventor 熊文肖健王文龙郑欣邓迪刘育权霍建彬曾先锋
Owner GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD