Energy internet data security processing system and method
An energy Internet and data security technology, applied in the field of energy Internet data security processing systems, can solve problems such as disturbing program stability, exposing secret key information, stealing data, etc., to avoid repeated damage or crash, prevent similar abnormal situations, and accurately Captured effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] An Energy Internet data security processing system and method in this embodiment, such as figure 1 shown, including:
[0060] Server terminal 1 is the main control terminal of Energy Internet;
[0061] The receiving module 2 is used to receive energy supply and demand requests;
[0062] The traceability module 3 is used to trace the location where the request signal occurs, and identify whether the request target is a user;
[0063] The request data receiving module 4 is used to receive the request data of the supply and demand request;
[0064] The output path analysis and proofreading module 5 is used to analyze the output path of the request data, and proofread the output path and the legal path of Energy Internet construction to form a difference file;
[0065] The energy supply and demand transmission module 6 is used to form a real-time transmission channel and transmit energy supply and demand data;
[0066] The transmission dynamic monitoring unit 7 is used ...
Embodiment 2
[0089] A method for securely processing energy Internet data, such as figure 2 shown, including the following steps:
[0090] Stp1: Obtain real-time data of energy supply and demand requests;
[0091] Stp2: Verify the identity key according to the request data information, after the identity verification is confirmed, call the relevant historical request data and compare it with the waiting request data;
[0092] Stp3: Analyze the transmission request data, set the relevant permissions of the requested data, and send the set permissions to the requesting unit and authorize them;
[0093] Stp4: Energy supply and demand transmission begins, analyze the real-time status of the distribution node during the transmission process, capture abnormal dynamic data and give feedback;
[0094] Stp5: Verify and repair the abnormal feedback data, generate a transmission abnormal database, and provide a transmission abnormal database replacement cycle to be carried in the transmission abno...
Embodiment 3
[0106] like figure 1 As shown, an ATCM-KNN algorithm is provided to calculate the abnormal data set during the energy interaction process:
[0107] Assuming that the normal data is clustered into f clusters based on the binary K-means algorithm, it is first necessary to calculate the distance between the sample to be tested and the cluster centers of the f clusters (here is also the Euclidean distance), and select the cluster with the shortest distance as the test sample to be tested. The normal training set added, the shorter the distance, the higher the similarity between the sample points to be tested and the samples in the cluster; the cluster with the closest distance to the sample points to be tested is selected as the normal training set, by calculating the singular value of the sample to be tested and The singular value of all samples in the normal training set can be used to obtain the P value of the sample to be tested relative to the normal training set. If the P va...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


