Method and system for dynamically executing control commands of power heterogeneous equipment

A technology of equipment control and execution method, applied in the field of power system, can solve the problems of neglecting the security of remote control system, frequency offset of power system, affecting the security of target system, etc., and achieve the effect of reducing information security risks

Active Publication Date: 2022-04-29
HUNAN UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the lack of strict security access mechanism for third-party heterogeneous equipment, their own security defense measures vary, which brings potential security risks to the stable operation of the power system.
Third-party heterogeneous equipment manufacturers pay too much attention to the openness of the network architecture and the high communication efficiency, high real-time performance, high availability and high business continuity brought about by its compatibility, while ignoring the security of its remote control system
Once the malicious attacker's instantaneous control power in the target area exceeds the target system safety threshold, it will cause the frequency of the power system to shift, and it is very likely to cause the frequency instability of the target system, seriously affecting the security of the target system
[0003] However, there is currently no effective solution for the communication security of third-party heterogeneous devices
Considering that the communication security of third-party heterogeneous equipment brings potential security risks to the stable operation of the power system, it is urgent to propose a method and system for dynamically executing control commands of power heterogeneous equipment to ensure power system security from the perspective of communication and power services. Stable operation, reducing the risk of power system operation under the penetration of large-scale third-party heterogeneous equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for dynamically executing control commands of power heterogeneous equipment
  • Method and system for dynamically executing control commands of power heterogeneous equipment
  • Method and system for dynamically executing control commands of power heterogeneous equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0118] Further as a preferred embodiment, the step S1 includes:

[0119] Step S11: User U i Choose your own user ID i and password PW i . To protect the password PW i security, choose a random number, and calculate the random password RPW containing the random number i , the specific calculation formula is as follows:

[0120] RPW i =h(a t ||PW i ) (1)

[0121] Among them, i is the user number, a t is a random number at time t, || is a connection, h(.) is a one-way hash function, and the algorithm for generating random passwords in the present invention adopts the national secret SM3 hash algorithm.

[0122] In one embodiment, user U 1 Set your own user ID 1 For CXSG2021, password PW i For GXJDDNN, random number a t is E8, then the random password RPW 1 for h(E8GXJDDNN).

[0123] Step S12: according to user identification ID i and random password RPW i , add user time freshness factor T i,e And the third-party heterogeneous device identifier TID j , Constru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for dynamically executing control instructions of power heterogeneous equipment, the method includes establishing a digital certificate authentication model for third-party heterogeneous equipment, providing digital certificates for third-party heterogeneous equipment and their users; expanding the control instructions of third-party heterogeneous equipment Message content, adding time stamps, user digital authentication feedback information, digital signatures, and random numbers to build a communication security defense method for third-party heterogeneous devices; establishing a dynamic cycle evaluation model for user credit management, based on the number of abnormal operations of heterogeneous The number of operations, calculate the dynamic credit evaluation value of the user at time t; establish the associated electric power model of the third-party heterogeneous equipment, and calculate the associated electric power of the user's remote control at time t; according to the dynamic credit evaluation value and associated electric power, establish the third-party The credit delay response model of the control command determines the control command response equipment at time t. The invention can improve the safety of power system operation under the penetration of third-party heterogeneous equipment.

Description

technical field [0001] The present invention relates to the field of power system technology, in particular to power system information physical security technology, and in particular to a method and system for dynamically executing control commands of power heterogeneous equipment. Background technique [0002] As large-scale third-party heterogeneous devices are connected to the power grid, users can remotely control high-power electrical equipment, such as air conditioners and electric water heaters, through third-party heterogeneous devices. However, due to the lack of strict security access mechanism for third-party heterogeneous equipment, their own security defense measures vary, which brings potential security risks to the stable operation of the power system. Third-party heterogeneous equipment manufacturers pay too much attention to the openness of the network architecture and the high communication efficiency, high real-time performance, high availability and high...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/30G06F21/64G06F21/60G06Q50/06
CPCH04L9/3247H04L9/3263H04L9/3297H04L9/3239H04L9/0869H04L9/3066G06F21/645G06F21/602G06Q50/06
Inventor 刘绚严康褚旭张波田建伟
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products