Unlock instant, AI-driven research and patent intelligence for your innovation.

Policy configuration management system for network security device of power monitoring system

A network security and power monitoring technology, applied in the direction of security communication devices, computer security devices, program control devices, etc., can solve problems such as inability to provide analysis and comparison, query and statistics functions, inconsistent standards, and wide-area propagation of security threats. The effect of displaying clear structure and improving configuration efficiency

Active Publication Date: 2022-07-08
GUANGXI POWER GRID CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, the threat to the network security of the power monitoring system has become increasingly serious, and the boundary protection security strategy of the network security horizontal and vertical devices is not perfect, which will lead to the wide-area spread of security threats
At present, the network security devices of the power monitoring system, especially the horizontal security isolation and vertical encryption devices, cannot provide analysis and comparison, query and statistics functions in terms of security policy management, and there is currently no system that supports horizontal isolation and encryption security policy verification functions
Can only rely on manual verification, there are risks of inconsistent standards, low efficiency, and missing items

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy configuration management system for network security device of power monitoring system
  • Policy configuration management system for network security device of power monitoring system
  • Policy configuration management system for network security device of power monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments:

[0036] like figure 1 As shown, the policy configuration management system of the network security device of the power monitoring system includes a user management module, a setting management module, a log management module, and a configuration management module;

[0037] The user management module is used to set the management authority for the login user and separate the system authority;

[0038] The setting management module is used to set the security threshold of the policy configuration item of the network security device and manage the IP address usage of the network security device;

[0039] The log management module is used to record the user's login record and the user's operation record;

[0040] The configuration management module is used to automatically parse or retrospective...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of power monitoring systems, in particular to a policy configuration management system of a network security device of a power monitoring system, comprising a user management module, a setting management module, a log management module, and a configuration management module; the user management module is used to manage user settings Permissions to separate system permissions; setting management module is used to set security thresholds and manage IP addresses; log management module is used to record system login records and user operation records; configuration management module is used for horizontal isolation devices and vertical isolation devices of different manufacturers. The policy configuration file of the encryption device is automatically analyzed or retrospectively analyzed; the invention can automatically analyze and compare the policy configuration files of the horizontal isolation device and the vertical encryption device of the power monitoring system, and at the same time, one-click query of the content exceeding the security threshold can be realized , so that the modification content of the policy configuration file can be clearly understood without manual verification, which improves the configuration efficiency.

Description

technical field [0001] The invention relates to the technical field of power monitoring systems, in particular to a policy configuration management system of a network security device of the power monitoring system. Background technique [0002] In recent years, the network security threats of power monitoring systems have become increasingly severe, and the network security horizontal and vertical device boundary protection security strategies are not perfect, which will lead to wide-area spread of security threats. At present, the network security devices of the power monitoring system, especially the horizontal security isolation and vertical encryption devices, cannot provide analysis and comparison, query and statistics functions in security policy management, and there is currently no system that supports the horizontal isolation and encryption security policy verification functions. It can only rely on manual verification, and there are risks of inconsistent standards...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0803G06F21/62G06F21/60G06F9/445G06Q50/06
CPCH04L63/02H04L41/0803H04L63/0428G06F21/6227G06F21/602G06F9/44505G06Q50/06Y04S40/20
Inventor 陆力瑜刘媛陈文迪刘慕娴刘桂华
Owner GUANGXI POWER GRID CORP