Unlock instant, AI-driven research and patent intelligence for your innovation.

Energy internet data security processing system and method

An energy Internet and data security technology, applied in the field of energy Internet data security processing systems, can solve problems such as disturbing program stability, exposing secret key information, stealing data, etc., to avoid repeated damage or crash, prevent similar abnormal situations, and accurately Captured effect

Pending Publication Date: 2022-04-26
STATE GRID ZHEJIANG ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the above-mentioned shortcomings in the prior art, the present invention provides a system and method for energy Internet data security processing, which solves the problem that there are still many hidden dangers in the process of energy Internet data input and output. The branch cuts in and conducts illegal operations such as stealing data, energy, and disrupting program stability, which will bring huge losses and long-term energy Internet data transmission paralysis or key information exposure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy internet data security processing system and method
  • Energy internet data security processing system and method
  • Energy internet data security processing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] An Energy Internet data security processing system and method in this embodiment, such as figure 1 shown, including:

[0060] Server terminal 1 is the main control terminal of Energy Internet;

[0061] The receiving module 2 is used to receive energy supply and demand requests;

[0062] The traceability module 3 is used to trace the location where the request signal occurs, and identify whether the request target is a user;

[0063] The request data receiving module 4 is used to receive the request data of the supply and demand request;

[0064] The output path analysis and proofreading module 5 is used to analyze the output path of the request data, and proofread the output path and the legal path of Energy Internet construction to form a difference file;

[0065] The energy supply and demand transmission module 6 is used to form a real-time transmission channel and transmit energy supply and demand data;

[0066] The transmission dynamic monitoring unit 7 is used ...

Embodiment 2

[0089] A method for securely processing energy Internet data, such as figure 2 shown, including the following steps:

[0090] Stp1: Obtain real-time data of energy supply and demand requests;

[0091] Stp2: Verify the identity key according to the request data information, after the identity verification is confirmed, call the relevant historical request data and compare it with the waiting request data;

[0092] Stp3: Analyze the transmission request data, set the relevant permissions of the requested data, and send the set permissions to the requesting unit and authorize them;

[0093] Stp4: Energy supply and demand transmission begins, analyze the real-time status of the distribution node during the transmission process, capture abnormal dynamic data and give feedback;

[0094] Stp5: Verify and repair the abnormal feedback data, generate a transmission abnormal database, and provide a transmission abnormal database replacement cycle to be carried in the transmission abno...

Embodiment 3

[0106] like figure 1 As shown, an ATCM-KNN algorithm is provided to calculate the abnormal data set during the energy interaction process:

[0107] Assuming that the normal data is clustered into f clusters based on the binary K-means algorithm, it is first necessary to calculate the distance between the sample to be tested and the cluster centers of the f clusters (here is also the Euclidean distance), and select the cluster with the shortest distance as the test sample to be tested. The normal training set added, the shorter the distance, the higher the similarity between the sample points to be tested and the samples in the cluster; the cluster with the closest distance to the sample points to be tested is selected as the normal training set, by calculating the singular value of the sample to be tested and The singular value of all samples in the normal training set can be used to obtain the P value of the sample to be tested relative to the normal training set. If the P va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of energy internet data security, in particular to an energy internet data security processing system and method, and the system comprises a server terminal which is a master control end of an energy internet; the receiving module is used for receiving an energy supply and demand request; the traceability module is used for tracing the generation position of the request signal and identifying whether a request target is a user; the request data receiving module is used for receiving request data of a supply and demand request; the output path analysis and proofreading module is used for analyzing a request data output path and proofreading the output path and an energy internet construction legal path to form a difference file; according to the invention, a processing system with relatively high security is set for potential safety hazards existing in data transmission of the energy internet nowadays, and the system can effectively avoid the phenomenon that the energy internet is easily collapsed due to invasion and attack, so that the identity data of an energy supply and demand request user is protected; and abnormal illegal invasion and attack users are accurately captured.

Description

technical field [0001] The present invention relates to the technical field of energy internet data security, in particular to a system and method for energy internet data security processing. Background technique [0002] The Energy Internet can be understood as the comprehensive use of advanced power electronics technology, information technology and intelligent management technology to integrate a large number of new power networks, oil networks, and natural gas networks composed of distributed energy collection devices, distributed energy storage devices and various types of loads. and other energy nodes are interconnected to realize an energy peer-to-peer exchange and sharing network with two-way energy flow. There are many systems, platforms, and users involved in the high-elastic interaction process of massive data resources under the form of energy Internet, and the interaction between source, network, load, and storage services has obvious cross-regional characteris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/1408H04L63/1433H04L63/1491H04L63/1416H04L63/083G06F18/23G06F18/214
Inventor 王以良周鹏刘若琳王文郭亚琼戚伟强陈逍潇叶卫许敏董科朱好孙望舒王臻
Owner STATE GRID ZHEJIANG ELECTRIC POWER