Unlock instant, AI-driven research and patent intelligence for your innovation.

A security access control strategy for edge access management system of power Internet of things

An access control strategy and technology of the Internet of Things, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as the inability to directly obtain the access rights of subordinate edge gateways, so as to ensure information security, improve access efficiency, The effect of guaranteeing independence

Active Publication Date: 2022-07-08
NARI NANJING CONTROL SYST +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the deficiencies of the existing technology, the purpose of the present invention is to provide a security access control strategy for the edge access management system of the electric power Internet of things, so as to solve the security considerations of the entire electric power Internet of things edge access management system in the prior art , each gateway should have its own users and user groups independently, resulting in technical problems that the user groups of the master site will not be able to directly obtain the access rights of its subordinate edge gateways

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security access control strategy for edge access management system of power Internet of things
  • A security access control strategy for edge access management system of power Internet of things
  • A security access control strategy for edge access management system of power Internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and cannot be used to limit the protection scope of the present invention.

[0051] The specific embodiment of the present invention provides a security access control strategy for the edge access management system of the power Internet of things, the strategy includes the following two parts:

[0052] 1. A single power IoT gateway establishes a user security access mechanism

[0053] In order to ensure the data security and access security of each gateway in the power Internet of Things, the user management systems of the main station and the edge gateway should have their own users and user groups independently. In this case, a user security access mechanism needs to be established separately for each gateway.

[0054] According to the design requirements...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security access control strategy for an edge access management system of the power Internet of Things in the technical field of electric power automation, and aims to solve the problem in the prior art that each The gateways should have their own users and user groups independently, resulting in the technical problem that the user group of the master station will not be able to directly obtain the access rights of its subordinate edge gateways. The strategy includes the following steps: in response to the access request sent by the user terminal, extracting the key and the user name generated by the user terminal; The verification result determines whether the access request from the client is passed; if it is determined to pass the access request from the client, a security access token for verifying the operation instruction of the client is created; in response to the logout request from the client, the security access token is destroyed.

Description

technical field [0001] The invention relates to a security access control strategy of a power Internet of Things edge access management system, and belongs to the technical field of power automation. Background technique [0002] In the power Internet of Things edge access management system, the secure access between the main station and the edge gateway is an important issue involving actual use requirements. Commonly used security access control strategies mainly include network access control, network permission control, directory-level security control, attribute security control, network server security control, network monitoring and locking control, network port and node security control, and firewall control. Policies are mainly used for secure access between the client and the server. However, in the power IoT edge access management system, different gateways are often set up on different servers, and edge gateways at the same level exist independently of each othe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/12
CPCH04L63/20H04L63/08H04L63/0807H04L63/083H04L67/12Y04S40/20
Inventor 井伟灿沈健张敏侯明国陈力赖华尧黄葛峰陈龙丁礼良赵锋汪鹤汪燕倩魏洁茹王艳阳
Owner NARI NANJING CONTROL SYST