Self-adaptive substation longitudinal encryption host verification method and terminal

A technology of vertical encryption and verification method, applied in the field of vertical encryption host verification of adaptive substation, can solve the problems of inability to achieve large-scale, multi-channel verification, long verification time, dependence on business equipment and personnel skills, etc. Realize the effect of self-adaptive verification and correction to improve work efficiency

Active Publication Date: 2021-12-10
MAINTENANCE BRANCH OF STATE GRID FUJIAN ELECTRIC POWER
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) If the business is disconnected during the verification process, the fault point cannot be accurately judged, and it is highly dependent on business equipment and personnel skills
[0005] (2) Only one service can correspond to one policy during verification, that is, each tunnel policy can only be verified separately, and mass and multi-channel verification cannot be realized
[0006] (3) Long calibration time
With the increase of business access, the configuration of tunnel policies is increased. According to the existing technical conditions, the required verification time is increased.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive substation longitudinal encryption host verification method and terminal
  • Self-adaptive substation longitudinal encryption host verification method and terminal
  • Self-adaptive substation longitudinal encryption host verification method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Please refer to 1 and image 3 , Embodiment 1 of the present invention is:

[0080] An adaptive substation longitudinal encryption host verification method, comprising:

[0081] S1. Establish a connection with the vertical encryption host, acquire and identify configuration information;

[0082] The step S1 is specifically:

[0083] Establishing a connection with the longitudinal encryption host through the configuration port, and obtaining and identifying configuration information through the configuration port, the configuration information includes certificate configuration, tunnel configuration and policy configuration;

[0084] The establishment of a connection with the vertical encryption host through the configuration port is specifically:

[0085] A connection is established with the vertical encryption host through three network ports: a configuration port, an uplink port and a downlink port.

[0086] In this embodiment, we establish a connection with the v...

Embodiment 2

[0104] Please refer to figure 2 , the second embodiment of the present invention is:

[0105] An adaptive substation longitudinal encryption host verification terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, when the processor executes the computer program, the above implementations are realized Steps in Example 1.

[0106] To sum up, the invention provided by the present invention obtains the configuration information of the longitudinally encrypted authentication host through the configuration port, automatically identifies the configuration information of different types of hosts, establishes each service tunnel through the acquired configuration information, automatically generates and executes the verification cases The verification program finally generates a verification report and corrects the strategy, solves the problem of automatic verification of the longitudinal encryption host in the substatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a self-adaptive substation longitudinal encryption host verification method and a terminal. The method comprises the following steps: establishing connection with a longitudinal encryption host, and acquiring and identifying configuration information; establishing a virtual tunnel for the longitudinal encryption host according to the configuration information, and generating a verification case according to the configuration information; performing tunnel strategy verification on the virtual tunnel according to the verification case to obtain a verification result, and performing strategy consistency comparison with a preset strategy information table according to the verification result to obtain a comparison result; according to the comparison result, correcting the tunnel strategy, and generating an analysis report. According to the method, the problem of automatic verification of the longitudinal encryption host of the transformer substation is solved, automatic verification of a whole strategy information table covered by multiple channels is realized, adaptive verification and correction of different encryption host models are realized, manual intervention is not needed, and the working efficiency is greatly improved.

Description

technical field [0001] The invention relates to the technical field of power systems, in particular to a verification method and a terminal for an adaptive substation longitudinally encrypted host. Background technique [0002] With the extensive use of network equipment, equipment monitoring and the promotion of the Internet of Things, the network security of the power monitoring system has become one of the indicators for measuring the safe and stable operation of the power system. In the "Guidelines for Network Security Protection of Electric Power Monitoring System", the basic protection principles have been clarified: security partition, dedicated network, horizontal isolation, and vertical authentication. At present, the use of vertical encryption and authentication devices in most power monitoring systems is an important measure for network security protection of power monitoring systems. [0003] The verification of the vertical encryption authentication host (devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/46H04L12/26
CPCH04L63/205H04L12/4633H04L43/50Y04S40/20
Inventor 邱建斌陈建洪林峰江秋华陈闽江陈志辉胡琳张振兴陈扩松郑宇林炜吴雨晴
Owner MAINTENANCE BRANCH OF STATE GRID FUJIAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products