Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security protection method for electric power measurement and control terminal

A measurement and control terminal, information security technology, applied in the direction of digital data protection, secure communication devices, electrical components, etc., can solve the problem that the firewall does not have the functions of detection attack, identity authentication and encrypted communication, so as to improve the use management ability and improve the security. sexual effect

Inactive Publication Date: 2022-04-08
QINGDAO TOPSCOMM COMM +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the security protection widely used in power measurement and control terminals includes firewalls, network boundary isolation, and virtual professional networks, but some firewalls do not have the functions of detecting attacks through application layer protocols, identity authentication, and encrypted communication. The remote communication of the measurement and control terminal plays a protective role

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection method for electric power measurement and control terminal
  • Information security protection method for electric power measurement and control terminal
  • Information security protection method for electric power measurement and control terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] An information security protection method for electric power measurement and control terminals. The device access control in the network access control protection can be implemented at the network layer, such as binding the IP and MAC addresses of the devices, and establishing a white list in a switch or a master station system. The data source authentication in the network access control and protection may adopt cryptographic techniques such as shared keys.

[0030] Such as figure 1 As shown, the access authorization and authentication protection includes the following steps:

[0031] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security protection method for an electric power measurement and control terminal. The information security protection method specifically comprises the steps of network access control protection, access authorization and authentication protection, audit log recording, data integrity verification, data confidentiality protection, service continuity and network attack defense protection. The network access control protection is protection of access control before connection with the equipment is established; the access authorization and authentication protection comprises the following steps: firstly judging whether a user name exists or not through an equipment end, then judging whether client software passes configuration authentication or not, further judging the correctness of password information input by a user, judging whether communication time is overtime or not, and finally judging whether a request item is authorized or not; the equipment side judges whether log storage is full or not according to the number of the stored audit records, then records the audit information in detail and gives an alarm for reminding, and records the audit logs in detail; verifying data integrity through grammar verification of an input field and verification of a received message through calculation; due to confidentiality of data transmission and storage, a client encrypts plaintext information and transmits the plaintext information in a network channel, after the plaintext information reaches an equipment end, the equipment decrypts the ciphertext, and the equipment judges whether to store and reply the content according to the transmitted content; the service continuity is that the equipment has a self-protection function and can recover the protection of a normal operation state when an exception occurs; the defense protection of the equipment on the network attack is improved by adding the equipment to the data flooding attack, and the method has very high safety protection.

Description

technical field [0001] The invention relates to the field of information security protection of embedded devices, in particular to an information security protection method for power measurement and control terminals. Background technique [0002] Embedded devices are composed of software and hardware, and are devices that can operate independently. They are usually embedded systems for specific applications, and have the characteristics of low power consumption, low performance, and high integration. The power measurement and control terminal is a kind of embedded device, which is used to collect and analyze various information of the electric energy meter and upload it to the main station of the power consumption information collection terminal. At present, the security protection widely used in power measurement and control terminals includes firewalls, network boundary isolation, and virtual professional networks, but some firewalls do not have the functions of detecting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F21/44G06F21/31G06F21/46G06F21/64
Inventor 葛玉磊随洪峰郑亚岗石建文
Owner QINGDAO TOPSCOMM COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products