Unlock instant, AI-driven research and patent intelligence for your innovation.

Power mobile terminal network security model and modelling method based on risk transfer mechanism

A mobile terminal, network security technology, applied in data exchange networks, electrical components, transmission systems, etc., can solve problems such as lack of security design, user sensitive information, privacy data leakage, system business data theft, etc.

Inactive Publication Date: 2018-04-06
STATE GRID FUJIAN ELECTRIC POWER CO LTD +2
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information security loopholes in the current smart terminal operating system and the lack of security design of the application itself can easily lead to the leakage of user sensitive information and private data, and even lead to the risk of system business data being stolen
[0004] 2) The power mobile information system includes two parts: "traditional information system" and "mobile information system" from a horizontal perspective, and is divided into two parts: an information intranet and an information extranet from a vertical perspective. The data interaction of each other leads to the transmission of information security risks between each other. At present, there is no research on this aspect in China.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power mobile terminal network security model and modelling method based on risk transfer mechanism
  • Power mobile terminal network security model and modelling method based on risk transfer mechanism
  • Power mobile terminal network security model and modelling method based on risk transfer mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments.

[0027] The present invention provides a power mobile terminal network security model based on a risk transfer mechanism, which includes the following four components: 1) Risk identification module. This module mainly digitizes electric mobility safety risks through risk analysis and identification. 2) Risk calculation module. This module mainly establishes a risk calculation model based on the extracted data message. 3) Risk transfer algorithm realization module. This module uses the algorithm of cellular automata to analyze the relationship of risk transfer and establish a risk transfer model.

[0028] According to the analysis of the safety of electric mobility, the main existing problems are as follows:

[0029] (1) Dynamic injection risk

[0030] There is a risk of dynamic injection in mobile applications, and attackers can easily impl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims at providing a power mobile terminal network security model and modeling method based on a risk transfer mechanism. The model comprises a risk identification module, a risk calculation module and a risk transfer algorithm implementation module, wherein the risk identification module is used for digitalizing a power mobile security risk through risk analysis and identification; the risk calculation module is used for establishing a risk calculation model according to an extracted data message; and the risk transfer algorithm implementation module adopts an algorithm of a cellautomaton to analyze a risk transfer relation and establish a risk transfer model. According to a power mobile network security risk relation, various risks are digitized. A power mobile network security risk matrix model is established for the digitized risks through a cell automaton algorithm. According to the risk matrix model obtained through calculation, the risk transfer model is calculated, and finally whether a power mobile system node is invaded or not is judged.

Description

technical field [0001] The invention belongs to the field of electric power safety network, and in particular relates to a power mobile terminal network safety model and a modeling method based on a risk transfer mechanism. Background technique [0002] In terms of the security of the power system, the network architecture of the power information system is huge and complex, and there are many data interaction nodes between the power mobile terminal and the power information system, and the methods are diversified. In the analysis of the safe interaction mode between the mobile terminal and the information system , it is necessary to study a risk transfer model to solve the complex security problems of power information systems. [0003] 1) Since the relevant power mobile applications are in the early stage of development, the main consideration in the design is the realization of functions, and the safety considerations are generally insufficient. The information security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/145
Inventor 吴丽进何金栋谢新志吴雅燕赵志超吴丹
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD