Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication security maintenance device based on power edge gateway equipment

An edge gateway and communication security technology, applied in internal/peripheral computer component protection, instrument, character and pattern recognition, etc., can solve problems such as cost limitation, interference operation, missing and missing data judgment, etc., and achieve good adaptability and scalability Effect

Active Publication Date: 2021-03-09
FUSHUN POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For data transmission: 1. In terms of data uplink channels, for a large amount of sensor device data, information may be maliciously replaced or maliciously blocked, resulting in omissions and omissions in data judgment
2. In terms of data downlink, there may be a large number of abnormal instructions for the equipment, causing the next-level equipment to enter a temporary out-of-control state, interfering with normal operation
Among the current processing methods: 1. Most of the mutual authentication and information encryption between sensors and edge gateways are realized through computational encryption, but such methods generally have relatively high complexity and have certain requirements for the computing power of processing devices. For edge gateway devices not very suitable
2. There is also security encryption realized by blockchain technology, through the encryption of relevant blocks on the chain, the effective protection of the block information is realized, but this type of method is not very effective in processing misjudgment information of trusted devices , and the judgment of the operating data is relatively independent, without forming an overall judgment
3. Some are encrypted by hardware devices, but for edge gateway devices that need to process a large number of sensors, installing corresponding security hardware on each sensor has limitations on cost
And on the whitelist mechanism, it is impossible to dynamically screen whitelist members

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication security maintenance device based on power edge gateway equipment
  • Communication security maintenance device based on power edge gateway equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0046] It should be noted that the connections mentioned below mean the construction of data channels to generate information exchange, which are mostly part of algorithms and have nothing to do with the actual module structure. It should be noted that the improved functions of the present invention are mainly realized by algorithm codes, and its specific execution functions are convenient to adjust, so here only the relevant units whose functions are simply classified are used as replacements.

[0047] As the practical application carrier of edge computing, edge gateways are widely used, but there are also data security issues. The present invention realizes the unique i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a communication security maintenance device based on power edge gateway equipment, and relates to the technical field of electrical equipment. The device comprises a hardware part and a software part, wherein the hardware part comprises an encryption identification unit and communication interface equipment thereof, and is used for carrying out information reading, white list qualification comparison and pre-classification on communication data transmitted by lower-layer equipment, and is in data connection with a software port; and the software part comprises a basic discrimination module, a periodic white list equipment inspection module and an information detection and fault discrimination module. According to the invention, on the basis of a machine learning algorithm and hardware encryption feature coding information, unique identification and security evaluation of the bottom sensing device are realized, periodic white list updating is arranged, and the security requirement of the whole device data transmission process is met. And on the basis, a function of realizing multi-gateway matrix type auxiliary security evaluation in the edge gateway at the same level is designed, so that the purpose of improving the judgment accuracy is achieved.

Description

technical field [0001] The invention relates to the technical field of electrical equipment, in particular to a maintenance communication security device based on an electric edge gateway device. Background technique [0002] Under the premise of increasing communication speed, processing equipment tends to be more and more intelligent and portable, which brings about the rapid development of Internet of Things technology. The interconnection of smart devices also promotes the rapid development of smart grid-related devices, but what follows is an increasingly large amount of data and more types of communication requirements. Under this premise, the edge gateway device of edge computing and bearer technology, a processor layout method with better information extraction ability and faster data processing feedback speed began to emerge, but this also brought about the Certain threat to security. [0003] Most of the information transmission process of the traditional power g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72G06K9/62G06N20/00
CPCG06F21/72G06N20/00G06F18/24G06F18/214Y04S40/20
Inventor 张海刘鑫蕊丁以心孙秋野张瑶瑶樊志诚湛树广王震张祥陈杰辉
Owner FUSHUN POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products