Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management method of power business terminal

A technology for power business and data security, applied in the field of information statistics security, can solve the problems of lack of necessary identification of data credibility, failure to consider information security issues, lack of use of mobile handheld devices, etc., to improve information collection, ensure security, and ensure confidentiality. Effect

Inactive Publication Date: 2018-02-27
NORTH CHINA ELECTRIC POWER UNIV (BAODING) +5
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many mobile handheld devices used in the power field do not consider information security issues, and a few products that consider security only consider the security access and identity authentication of mobile handheld devices, which is not necessary for the use of mobile handheld devices. The lack of necessary identification of the credibility of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management method of power business terminal
  • Data security management method of power business terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] A data security management method for a power service terminal, comprising constructing a multi-level security model of a power service terminal based on a security chip, the multi-level security model of a power service terminal includes a trusted software stack functional architecture, and the trusted software stack functional architecture includes the following part:

[0027](1) Trusted access control: Since service providers cannot be trusted to implement user-defined access control policies, in data security technology, researchers are concerned with how to implement access control of data objects through non-traditional access control methods; among them, The most concerned is the access control based on cryptographic methods; including the method of implementing access control based on hierarchical key generation and distribution strategies; using attribute-based encryption algorithms, such as the attribute-based encryption scheme KP-ABE of key rules or ciphertext...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security management method of a power business terminal. The method comprises the step of building a power business terminal multi-stage security model based on a security chip, wherein the power business terminal multi-stage security model comprises a credible software stack function framework comprising the following parts of credible access control, data privacy protection, resource access control, data existence and workability verification and data isolation technology in tolerant database. According to the data security management method of the power business terminal provided by the invention, the built power business terminal multi-stage security model based on the security chip performs security protection to system applications in an application layer; risks of occurrence of vicious incidents such as large area outage caused by illegal data tampering, and illegal command control are effectively reduced, insurance of power grid security and electricity quality of electricity customers is facilitated; running security and power distribution reliability of a power grid can be improved, and the method is of great importance in the aspect of improving quality of service.

Description

technical field [0001] The invention relates to the technical field of information statistics security, in particular to a data security management method for electric power service terminals. Background technique [0002] With the popularization of mobile handheld devices, the information security of mobile handheld devices has attracted more and more attention. The information security of mobile handheld devices mainly involves: mobile end-to-end secure communication technology, mobile information monitoring technology, mobile trusted computing technology, mobile identity acquisition and authentication technology and mobile security access technology. At present, many mobile handheld devices used in the power field do not consider information security issues, and a few products that consider security only consider the security access and identity authentication of mobile handheld devices, which is not necessary for the use of mobile handheld devices. The lack of necessary...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06H04L63/08H04L63/0853H04L63/1441
Inventor 吴克河徐美娇刘忠海张鹏郭伟
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products