CN114531942A - Intelligent power grid measuring method - Google Patents
Intelligent power grid measuring method Download PDFInfo
- Publication number
- CN114531942A CN114531942A CN202180004633.8A CN202180004633A CN114531942A CN 114531942 A CN114531942 A CN 114531942A CN 202180004633 A CN202180004633 A CN 202180004633A CN 114531942 A CN114531942 A CN 114531942A
- Authority
- CN
- China
- Prior art keywords
- data
- management
- service
- password
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 44
- 230000005540 biological transmission Effects 0.000 claims abstract description 33
- 238000009826 distribution Methods 0.000 claims abstract description 13
- 238000005259 measurement Methods 0.000 claims abstract description 11
- 238000000691 measurement method Methods 0.000 claims abstract description 8
- 238000003860 storage Methods 0.000 claims abstract description 7
- 238000007726 management method Methods 0.000 claims description 63
- 238000001514 detection method Methods 0.000 claims description 21
- 230000007246 mechanism Effects 0.000 claims description 16
- 238000005516 engineering process Methods 0.000 claims description 13
- 230000006854 communication Effects 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 10
- 230000002265 prevention Effects 0.000 claims description 9
- 238000011161 development Methods 0.000 claims description 7
- 239000013307 optical fiber Substances 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 6
- 238000007689 inspection Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000011897 real-time detection Methods 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 3
- 230000000903 blocking effect Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 239000003795 chemical substances by application Substances 0.000 claims description 3
- 230000008447 perception Effects 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000013468 resource allocation Methods 0.000 claims description 3
- 238000004220 aggregation Methods 0.000 abstract 1
- 230000002776 aggregation Effects 0.000 abstract 1
- 239000010410 layer Substances 0.000 description 9
- 238000002955 isolation Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 230000005611 electricity Effects 0.000 description 4
- 230000002457 bidirectional effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 239000011229 interlayer Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/35—Utilities, e.g. electricity, gas or water
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y20/00—Information sensed or collected by the things
- G16Y20/30—Information sensed or collected by the things relating to resources, e.g. consumed power
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/10—Detection; Monitoring
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/20—Analytics; Diagnosis
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00001—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the display of information or by user interaction, e.g. supervisory control and data acquisition systems [SCADA] or graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00002—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
- H02J13/00016—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus
- H02J13/00017—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus using optical fiber
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
- H02J13/00022—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using wireless data transmission
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
- H02J13/00022—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using wireless data transmission
- H02J13/00026—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using wireless data transmission involving a local wireless network, e.g. Wi-Fi, ZigBee or Bluetooth
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
- H02J13/00028—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment involving the use of Internet protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/30—Arrangements in telecontrol or telemetry systems using a wired architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/40—Arrangements in telecontrol or telemetry systems using a wireless architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/60—Arrangements in telecontrol or telemetry systems for transmitting utility meters data, i.e. transmission of data from the reader of the utility meter
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/128—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
Abstract
The invention relates to the field of intelligent measurement of a power grid and discloses an intelligent measurement method of the power grid, which comprises the following steps: step 1: the access, management and control of equipment are carried out through the Internet of things management platform and the power grid resource service platform, and the real-time sensing, real-time control, aggregation and distribution of the Internet of things sensing terminal are responsible; step 2: the key generation, distribution, updating, revocation and storage are completed through a key management system; step 3: establishing a database, and summarizing and storing basic information data; step 4: and acquiring and collecting the basic data through the acquisition terminal equipment, and encrypting and transmitting the basic data. The safety protection capability of the inner boundary and the outer boundary of the system is improved, the collected data are encrypted and protected, and the password service interfaces are unified, so that unified supervision can be performed among systems at all levels, the office terminal can be accessed to authentication and use authority management and control, different services can be distinguished according to safety classes, problem data in the data transmission process can be detected and stored, and the data outflow loss is prevented.
Description
Technical Field
The invention relates to the technical field of intelligent measurement of a power grid, in particular to an intelligent measurement method of the power grid.
Background
Distribution companies often face the challenges of difficult electricity stealing supervision, high line loss, difficult electricity charge collection and the like, and mainly rely on manual meter reading, so that the operation cost is high, and under the background of rapid development of energy internet and electric power market, the power grid needs to develop towards intelligent measurement, internet of things sensing, big data intelligent application and the like.
The existing intelligent measuring method has the advantages that when an acquisition terminal is accessed through a wireless APN or VPN private network of an operator, a wireless private network and an optical fiber private network, a safety access area is not arranged, the safety protection capability of the inner boundary and the outer boundary of the system is to be improved, the acquired data only enters a reinforced application layer protection measure, the safety of the transmitted data and the corresponding terminal network is not effectively protected temporarily, a password service interface is not unified, a password service management system is incomplete, so that a set of independent password service system is independently made among subsystems at all levels, the unified supervision among the systems at all levels is difficult, internal users at provincial level, prefecture level, power supply station level access management information areas access an acquisition system master station of an intranet office terminal to resident users, private transformer users and transformer station gateways to perform electric quantity data acquisition, parameter sending, electric quantity statistics, line loss calculation and other operations, and the office terminal lacks access authentication and use authority control, and different services are measured without being distinguished according to the security level.
Technical problem
Aiming at the defects in the prior art, the invention provides the intelligent power grid measuring method which can effectively solve the problems that a safe access area is not set when a collecting terminal is accessed, the protection effect of collected data is poor, a password service management system is incomplete, an office terminal is lack of access authentication and use authority control, and different measured services are not distinguished according to security levels in the prior art.
Technical solution
In order to achieve the above object, the present invention is achieved by the following technical solutions.
The invention discloses an intelligent power grid measuring method which comprises the following steps.
Step 1: and the equipment is accessed, managed and controlled through the Internet of things management platform and the power grid resource service platform, and is responsible for real-time sensing, real-time control, convergence and distribution of the Internet of things sensing terminal.
Step 2: and the key generation, distribution, updating, revocation and storage are completed through the key management system.
Step 3: and establishing a database for summarizing and storing basic information data.
Step 4: and acquiring and collecting the basic data through the acquisition terminal equipment, and encrypting and transmitting the basic data.
Step 5: the basic data are intelligently analyzed through an edge computing APP, and other perception data are converged and edge computed through an edge Internet of things agent.
Step 6: and monitoring data operation in real time.
Step 7: and uniformly sending the data to the Internet of things management platform.
Step 8: a wireless network and a wired power optical fiber network are adopted to transmit data, a safety access gateway is arranged, and the data enters a company intranet management information large area through the safety access gateway.
Step 9: and providing the data to an application development part to build various business systems.
Furthermore, the password management system in Step2 independently establishes a password service system between subsystems at each level, and performs unified supervision on the systems at each level.
The method and the system perform unified management on registration, management and authorization of the service application using the password security service, password resource allocation, password application strategies and the like, support unified authentication control when the password service is requested by the service application, and perform unified management operation on the password security service of the intelligent measurement password application service platform.
The method is characterized in that an access control mechanism based on attributes is adopted to carry out fine-grained access control on service data in combination with a cryptographic technology, a traditional standard network communication cryptographic technology is fused based on a lightweight key management mechanism, various algorithms such as SM1, SM2 and SM4 of national ciphers are supported, a certificate management mechanism in seamless connection with a standard CA system is supported, and key life cycle management of a terminal module and an intelligent electric meter is carried out based on the SM1/SM2/SM4 of the national ciphers.
Further, the encryption transmission in Step4 includes encrypting the sensitive data transmission, performing MAC verification, and introducing a replay prevention mechanism and a man-in-the-middle attack prevention mechanism.
Further, the acquiring of the basic data in Step4 includes: electric quantity collection, environment quantity collection and state quantity collection.
The method comprises the following steps of collecting electric quantity data, generating parameters, counting electric quantity and calculating line loss for residential users, special transformer users and transformer substation gateways.
Further, the wireless network coverage in Step8 includes: public network APN and electric power private network.
Furthermore, the security access gateway in Step8 performs identity authentication on the concentrator terminal of the access service system, and prevents cross-network intrusion of illegal data at the terminal side through protocol blocking, format check and protocol analysis technologies, and an encrypted transmission channel is established between the security access gateway and the access terminal through key negotiation to perform transmission protection on service messages between the terminal and the service system.
Further, the types of services in Step9 include: the method comprises the following steps of collecting services, setting parameters, controlling load and charge, and the like, wherein different services are distinguished according to corresponding security levels.
A method for deploying real-time detection data operation in an intelligent power grid measurement method is characterized by comprising the following steps.
S1: and detecting problem data, carrying out periodic repeated inspection, carrying out real-time verification on the data transmission process, and processing in a mode of combining manpower and software.
S2: and (5) storing the problem data in a storage terminal.
S3: and independently submitting the problem data to a computing end.
S4: and carrying out background inspection and recalculating and analyzing.
S5: and eliminating secondary objection data and generating a problem report.
S6: and submitting the problem report to a collection end.
S7: and (5) re-collecting related basic data.
S8: and independently submitting the data to a computing end for computing and analyzing.
Further, the data transmission process detection factors include: data receiving end detection, data transmission midway link detection and data sending end detection.
Further, the generating factors of the problem report in step S5 include: problem data detection source, problem data detection time and problem data attribute.
Advantageous effects
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects.
1. According to the invention, the security access area is set when the acquisition terminal is accessed through the operator wireless APN or VPN private network, the wireless private network and the optical fiber private network, the security protection capability of the inner and outer boundaries of the system is improved, the acquired data is encrypted and protected, so that the security of the transmission data and the corresponding terminal network is effectively protected, the password service interfaces are unified, the password service management system is perfected, a set of independent password service system is independently made among all the subsystems, so that the systems can be uniformly monitored, the office terminal can access authentication and use authority control, and different measurement services can be distinguished according to security levels.
2. The intelligent electric meter can reduce line loss through multi-dimensional monitoring analysis, support power distribution and utilization integrated management, assist the high-efficiency operation of electric power enterprises, and realize bidirectional passing between user side equipment and electric power companies, namely, the intelligent electric meter simultaneously sends various power consumption information of users to local users and electric power companies, the intelligent electric meter informs the users of the power consumption situation through local real-time data display, the electric power companies provide real-time electricity price information, and the users can reasonably control the power consumption of local loads according to the information, thereby achieving the dual purposes of improving economic benefits and saving energy.
The problem data acquisition system can detect the problem data in the data transmission process, capture and retain the problem data, prevent loss caused by data outflow, check the problem data in a mode of combining manpower and software, eliminate useless problem data and automatically acquire the eliminated problem data again.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a schematic flow chart of an intelligent power grid measurement method.
FIG. 2 is a schematic flow chart of a method for real-time detection of data calculation according to the present invention.
Fig. 3 is a schematic structural diagram of an intelligent measurement architecture in an intelligent measurement method for a power grid.
Fig. 4 is a schematic structural diagram of a security framework of an acquisition and detection system in an intelligent power grid measurement method.
Fig. 5 is a schematic structural diagram of an application architecture in an intelligent power grid measurement method.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention will be further described with reference to the following examples.
Modes for carrying out the invention
Example 1.
The method for intelligently measuring a power grid in this embodiment, as shown in fig. 1, includes the following steps.
Step 1: and the equipment is accessed, managed and controlled through the Internet of things management platform and the power grid resource service platform, and is responsible for real-time sensing, real-time control, convergence and distribution of the Internet of things sensing terminal.
Step 2: and the key generation, distribution, updating, revocation and storage are completed through the key management system.
Step 3: and establishing a database for summarizing and storing basic information data.
Step 4: and acquiring and collecting the basic data through the acquisition terminal equipment, and encrypting and transmitting the basic data.
Step 5: the basic data are intelligently analyzed through an edge computing APP, and other perception data are converged and edge computed through an edge Internet of things agent.
Step 6: and monitoring data operation in real time.
Step 7: and uniformly transmitting the data to the Internet of things management platform.
Step 8: a wireless network and a wired power optical fiber network are adopted to transmit data, a safety access gateway is arranged, and the data enters a company intranet management information large area through the safety access gateway.
Step 9: and providing the data to an application development part to build various business systems.
As shown in fig. 1, the password management system in Step2 independently establishes a password service system between subsystems at each level, and performs unified supervision on the systems at each level.
The method and the system perform unified management on registration, management and authorization of the service application using the password security service, password resource allocation, password application strategies and the like, support unified authentication control when the password service is requested by the service application, and perform unified management operation on the password security service of the intelligent measurement password application service platform.
The method is characterized in that an access control mechanism based on attributes is adopted to carry out fine-grained access control on service data in combination with a cryptographic technology, a traditional standard network communication cryptographic technology is fused based on a lightweight key management mechanism, various algorithms such as SM1, SM2 and SM4 of national ciphers are supported, a certificate management mechanism in seamless connection with a standard CA system is supported, and key life cycle management of a terminal module and an intelligent electric meter is carried out based on the SM1/SM2/SM4 of the national ciphers.
As shown in fig. 1, the encryption transmission in Step4 includes encrypting the sensitive data transmission, performing MAC verification, and introducing a replay prevention mechanism and a man-in-the-middle attack prevention mechanism.
As shown in fig. 1, the acquisition of the basic data in Step4 includes: electric quantity collection, environment quantity collection and state quantity collection.
The method comprises the following steps of collecting electric quantity data, generating parameters, counting electric quantity and calculating line loss for residential users, special transformer users and transformer substation gateways.
As shown in fig. 1, the security access gateway in Step8 performs identity authentication on the concentrator terminal of the access service system, and prevents cross-network intrusion of illegal data at the terminal side through protocol blocking, format check and protocol analysis techniques, and an encrypted transmission channel is established between the security access gateway and the access terminal through key negotiation to perform transmission protection on service messages between the terminal and the service system.
As shown in fig. 1, the various types of services in Step9 include: the method comprises the following steps of collecting services, setting parameters, controlling load and charge, and the like, wherein different services are distinguished according to corresponding security levels.
When the system is specifically implemented, a security access area is set when the operator wireless APN or VPN private network and the wireless private network and the optical fiber private network are accessed, the security protection capability of the inner boundary and the outer boundary of the system is improved, collected data is encrypted and protected, the security of the transmitted data and the security of a corresponding terminal network are effectively protected, password service interfaces are unified, a password service management system is perfected, a set of independent password service system is independently made among all subsystems, all the subsystems can be uniformly supervised, the office terminal can access authentication and use authority management and control, and different services can be distinguished according to security levels.
Example 2.
In other aspects, the present embodiment further provides a method for real-time detection data operation, as shown in fig. 2, including the following steps.
S1: and detecting problem data, carrying out periodic repeated inspection, carrying out real-time verification on the data transmission process, and processing in a mode of combining manpower and software.
S2: and (5) storing the problem data in a storage terminal.
S3: and independently submitting the problem data to a computing end.
S4: and carrying out background inspection and recalculating and analyzing.
S5: and eliminating secondary objection data and generating a problem report.
S6: and submitting the problem report to an acquisition end.
S7: and (5) re-collecting related basic data.
S8: and independently submitting the data to a computing end, and computing and analyzing.
In this embodiment, the detection factors of the data transmission process include: data receiving end detection, data transmission midway link detection and data sending end detection. The generating factors of the problem report in the step S5 include: problem data detection source, problem data detection time and problem data attribute.
This embodiment can detect the problem data in the data transmission process when concrete implementation to snatch the problem data and keep, prevent that the data flow from causing the loss, the artifical mode that combines together with software of accessible is checked the problem data, can reject useless problem data, can gather again to the problem data of rejecting automatically.
Example 3.
As shown in fig. 3, the present invention performs security scheme development on the existing system side, deploys a password application service platform, and performs security module development on the terminal side and the electric meter side, thereby satisfying the existing charge control service and security encryption requirements. Meanwhile, a safety communication module is developed for the stock equipment, so that the upgrade and the reconstruction of the stock equipment are realized. The method specifically comprises the steps of system side password service platform deployment, data security protection strategy implementation, security modules embedded in terminals and meters, debugging completion, and testing circulation of password data such as keys and certificates in the whole life cycle.
Example 4.
As shown in fig. 4 and 5, the existing measurement system is refined and partitioned to obtain the relationships between different levels of the system, and based on the inter-level boundaries of the system, the outer boundary of the system is protected by providing a boundary-raising protection means to strengthen the boundary isolation protection capability, including deploying and upgrading systems or devices such as WAF, forward isolation, reverse isolation, protocol isolation and the like.
The main equipment for horizontal and vertical interconnection includes interconnection exchanger of every service system, forward and backward isolating device, vertical encryption authentication device, fire wall, safety access area, scheduling data network, comprehensive data network and public communication network. These devices may each take a redundant standby configuration. The alignment and reverse isolation devices can be configured in a number increased or form an isolation array according to specific service requirements.
The interconnection exchanger is used for the convergence access of the service system with vertical and horizontal data communication, the access control between the access systems and the horizontal and vertical interconnection of the security zone.
The forward and reverse isolation devices are deployed at the network boundary of the non-control area and the management information area and are used for physically isolating the production control area network from the management information area network, so that the relevant service system of the production control area sends data to the relevant service system of the management information area in a forward one-way mode. And the related service system of the management information large area imports plain text data to the related service system of the production control area in a reverse one-way mode.
The non-control area longitudinal encryption authentication gateway is deployed between the non-control area and the scheduling data network non-real-time VPN, is used for identity authentication of network data communication between a local non-control area and a remote non-control area related service system or service module, access control and encryption and decryption of transmission data, and guarantees the legality of system connection and confidentiality and integrity of data transmission.
The method is based on the prior application layer, introduces the boundary protection means applied by the national secret algorithm technology, unifies the boundary identity authentication strategies between different levels of systems and between different levels in the system, including IP verification, MAC verification, special identity identification verification and the like, unifies the security measurement and verification methods for systems, equipment, service flows, communication protocols and the like of access and visit, and avoids illegal access, visit and transmission.
Before the communication between the conventional ammeter, concentrator, distribution transformer terminal, negative transformer terminal and main station, identity authentication is carried out on both communication sides based on a state-secret application layer signature verification technology, a state-secret-based PKI authentication system or a state-secret standard network layer security authentication method, so that the functions of interception prevention, counterfeit prevention and reuse prevention are realized, and the confidentiality of authentication information and the authenticity of the entity identity of network equipment in the transmission process between a meter-arrival end and a central system are ensured.
And disassembling the end-field-edge-pipe-cloud interlayer structure of the charge control system, clearly separating the network boundary, and ensuring the integrity of the network boundary and the system resource access control information by using the integrity verification function based on the cryptographic algorithm on the interlayer boundary. If an access instruction and a control instruction are set, a control signaling check code generation rule and a check rule are set, and the boundary safety is ensured by packaging, checking access and control instructions according to the rule at each layer of sending end and receiving check boundary node.
The electric meter-concentrator, the concentrator/distribution transformer terminal/negative transformer terminal-main station are arranged with encryption modules, terminals and secret devices, based on the cryptographic algorithm technology, the application layer and the network layer are used for carrying out security encapsulation on transmission data and instructions, and the integrity of data in the communication process is guaranteed.
Between the master station and the meter, a password machine is deployed at the center side, and a password chip or module is deployed at the meter side, based on a state-password algorithm, an application layer security authentication protection mechanism is adopted, and application layer full-section secret packaging protection and security authentication signature protection are performed on bidirectional interactive application data (including sensitive information, service acquisition data, scheduling instructions and the like), so that the confidentiality of a sensitive information data field or the whole message in the communication process is ensured.
A new protection upgrading scheme is provided from the existing cost control password service support system, a plurality of service ports such as marketing, metering, detection, issuing and the like, and the defects in the existing password application and key management are combined. The method comprises protocol security, algorithm application, secret key management, cipher service upgrading requirements, and correspondingly provides upgrading and reconstruction schemes on a protocol, an interface and a system by combining each service port, so as to define the interface and the protocol definition.
In addition, from off-line and on-line key management, running a plurality of dimensions such as issuing with a key, issuing with a key for testing, issuing with a symmetric key and an asymmetric key, and the like, the key management interaction schemes are respectively provided for business ports such as marketing, metering, detection, issuing and the like by combining with research and development of a digital institute and development of a secret management system module.
The marketing, metering, detecting and issuing of the system architecture of the confidential management are refined, and the difference and the similarity of the external access interfaces of the system are given out in a stripping mode. And standardizing an interactive method of a dense pipe system aiming at the difference and the similarity.
And (4) combining the secret management system used firstly, counting the management relation among the secret management systems, and constructing a unified secret management system with multi-stage authentication, wherein the package unifies the secret key management system and is compatible with the certificate management system.
And the system confidential management and certificate calling service interfaces at all levels are standardized and unified, so that the uniform signing and issuing operation of keys and certificates of all service subsystems, equipment and devices is ensured, and the overall system confidential management capability is improved.
For the scene with online interaction, an online certificate interaction scheme is constructed based on LADP and OCPS protocols, and for the scene with service control requirements or the scene incapable of executing online operation, the offline certificate issuing scheme can be planned based on the idea of issuing the certificate offline.
The current situation of the password resources of the existing terminal security module is researched, and starting from different service ports, a set of terminal access identity authentication and data protection scheme is provided by adopting VPN network security protection technologies such as SSL or IPSec and the like, so that the purposes of terminal identity anti-counterfeiting and data anti-tampering are realized.
In summary, the invention sets the security access area when the acquisition terminal accesses through the operator wireless APN or the VPN private network, the wireless private network and the optical fiber private network, thereby improving the security protection capability of the inner and outer boundaries of the system, and performing encryption protection on the acquired data, so that the security of the transmission data and the corresponding terminal network is effectively protected, the password service interfaces are unified, the password service management system is perfected, a set of independent password service system is independently made among all the subsystems, so that the systems can be uniformly monitored, the office terminal can access authentication and use authority management and control, and different measured services can be distinguished according to the security level.
Can detect the problem data of data transmission in-process to snatch the problem data and keep, prevent that the data outflow from causing the loss, the artifical mode that combines together with software of accessible is checked the problem data, can reject useless problem data, can gather again the problem data of rejecting automatically.
The line loss is reduced through multidimensional monitoring and analysis, power distribution and utilization integrated management is supported, a power-assisted power enterprise operates efficiently, bidirectional passing between user side equipment and a power company can be achieved, namely, the intelligent electric meter sends various power consumption information of a user to a local user and the power company at the same time, the intelligent electric meter informs the user of the power consumption condition through local real-time data display, the power company provides real-time electricity price information, the user can reasonably control the power consumption of a local load according to the information, and the dual purposes of improving economic benefits and saving energy are achieved.
The above examples are only for illustrating the technical solutions of the present invention, and are not limited thereto. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: modifications of the technical solutions described in the embodiments or equivalent replacements of some technical features may still be made. Such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.
Claims (10)
1. An intelligent power grid measuring method is characterized by comprising the following steps:
step 1: the equipment access, management and control are carried out through the Internet of things management platform and the power grid resource service platform, and the Internet of things management platform is responsible for real-time sensing, real-time control, convergence and distribution of the Internet of things sensing terminal;
step 2: the key generation, distribution, updating, revocation and storage are completed through a key management system;
step 3: establishing a database, and summarizing and storing basic information data;
step 4: acquiring and collecting basic data through collection terminal equipment, and carrying out encrypted transmission;
step 5: the method comprises the steps that intelligent analysis is conducted on basic data through an edge calculation APP, and other perception data are converged and edge calculated through an edge internet of things agent;
step 6: monitoring data operation in real time;
step 7: the data are uniformly sent to an internet of things management platform;
step 8: the data is transmitted by adopting a wireless network and a wired power optical fiber network, a safety access gateway is arranged, and the data enters a company intranet management information large area through the safety access gateway;
step 9: and providing the data to an application development part to build various business systems.
2. The intelligent power grid measurement method according to claim 1, wherein: the password management system in Step2 independently establishes a password service system among subsystems at all levels, and carries out unified supervision on the systems at all levels;
the method comprises the following steps of carrying out unified management on registration, management and authorization of business application using password security service, password resource allocation, password application strategies and the like, supporting unified authentication control when a business application password service request is carried out, and carrying out unified management operation on the password security service of an intelligent measurement password application service platform;
the method is characterized in that an access control mechanism based on attributes is adopted to carry out fine-grained access control on service data in combination with a cryptographic technology, a traditional standard network communication cryptographic technology is fused based on a lightweight key management mechanism, various algorithms such as SM1, SM2 and SM4 of national ciphers are supported, a certificate management mechanism in seamless connection with a standard CA system is supported, and key life cycle management of a terminal module and an intelligent electric meter is carried out based on the SM1/SM2/SM4 of the national ciphers.
3. The method of claim 1, wherein the method comprises: the encryption transmission process in Step4 includes encrypting the sensitive data transmission, performing MAC verification, and introducing a replay prevention mechanism and a man-in-the-middle attack prevention mechanism.
4. The method of claim 1, wherein the method comprises: the acquisition of the basic data in Step4 includes: collecting electrical quantity, environment quantity and state quantity;
the method comprises the following steps of collecting electric quantity data, generating parameters, counting electric quantity and calculating line loss for residential users, special transformer users and transformer substation gateways.
5. The method of claim 1, wherein the method comprises: the wireless network coverage in Step8 includes: public network APN and private power network.
6. The method of claim 1, wherein the method comprises: the security access gateway in Step8 performs identity authentication on the concentrator terminal of the access service system, and prevents cross-network intrusion of illegal data at the terminal side through protocol blocking, format check and protocol analysis technologies, and an encryption transmission channel is established between the security access gateway and the access terminal through key negotiation to perform transmission protection on service messages between the terminal and the service system.
7. The method of claim 1, wherein the method comprises: the various services in Step9 include: collecting class services, parameter setting class services, load control fee control class services and the like; different services are distinguished according to the corresponding security levels.
8. The method for power grid intelligent measurement deployed with real-time detection data operation according to claim 1, characterized by comprising the following steps:
s1: detecting problem data, carrying out periodic repeated inspection, carrying out real-time verification on the data transmission process, and processing in a mode of combining manpower with software;
s2: problem data are stored and stored in a storage end;
s3: independently submitting the problem data to a computing end;
s4: performing background check, and recalculating and analyzing;
s5: eliminating secondary objection data and generating a problem report;
s6: submitting the problem report to an acquisition end;
s7: re-collecting related basic data;
s8: and independently submitting the data to a computing end for computing and analyzing.
9. The method of claim 8, wherein the step of performing the real-time detection comprises: the data transmission process detection factors comprise: data receiving end detection, data transmission midway link detection and data sending end detection.
10. The method of claim 5, wherein the method comprises: the generating factors of the problem report in the step S5 include: problem data detection source, problem data detection time and problem data attribute.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/137755 WO2023108396A1 (en) | 2021-12-14 | 2021-12-14 | Intelligent measurement method for power grid |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114531942A true CN114531942A (en) | 2022-05-24 |
Family
ID=81621730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202180004633.8A Pending CN114531942A (en) | 2021-12-14 | 2021-12-14 | Intelligent power grid measuring method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114531942A (en) |
WO (1) | WO2023108396A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117595503A (en) * | 2023-11-21 | 2024-02-23 | 合肥原力众合能源科技有限公司 | Micro-grid controller adopting WAPI network |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116528153B (en) * | 2023-07-05 | 2023-09-15 | 北京国科恒通科技股份有限公司 | Acquisition method, device and storage medium of power distribution network equipment |
CN117278334B (en) * | 2023-11-22 | 2024-03-15 | 深圳市脉山龙信息技术股份有限公司 | Intelligent operation and maintenance management method and system for Internet of things |
CN118466297A (en) * | 2024-05-16 | 2024-08-09 | 南方电网储能股份有限公司信息通信分公司 | An industrial IoT platform management system and method based on big data |
CN118427624B (en) * | 2024-07-02 | 2024-09-24 | 江苏智融能源科技有限公司 | Intelligent monitoring system and method for regulation and control data of power distribution network based on Internet of things |
CN119299038B (en) * | 2024-12-10 | 2025-04-01 | 国网安徽省电力有限公司营销服务中心 | A time frequency remote measurement transmission terminal and method for electric energy metering device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150281278A1 (en) * | 2014-03-28 | 2015-10-01 | Southern California Edison | System For Securing Electric Power Grid Operations From Cyber-Attack |
CN105024848A (en) * | 2015-06-01 | 2015-11-04 | 辽宁立德电力工程设计有限公司 | Smart power grid information management system based on wireless sensor network |
US10728336B2 (en) * | 2016-03-04 | 2020-07-28 | Sabrina Akhtar | Integrated IoT (Internet of Things) system solution for smart agriculture management |
CN110401262B (en) * | 2019-06-17 | 2021-03-30 | 北京许继电气有限公司 | GIS equipment state intelligent monitoring system and method based on edge computing technology |
-
2021
- 2021-12-14 WO PCT/CN2021/137755 patent/WO2023108396A1/en active Application Filing
- 2021-12-14 CN CN202180004633.8A patent/CN114531942A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117595503A (en) * | 2023-11-21 | 2024-02-23 | 合肥原力众合能源科技有限公司 | Micro-grid controller adopting WAPI network |
Also Published As
Publication number | Publication date |
---|---|
WO2023108396A1 (en) | 2023-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114531942A (en) | Intelligent power grid measuring method | |
CN111478902B (en) | Power edge gateway equipment and sensing data uplink storage method based on same | |
US8670946B2 (en) | Utility device management | |
EP3509893B1 (en) | Roaming method | |
CN112600892A (en) | Block chain equipment and system for Internet of things and working method | |
CN107094155A (en) | A kind of secure storage method of data and device based on alliance's block chain | |
CN110535653A (en) | A kind of safe distribution terminal and its means of communication | |
CN110798309A (en) | Smart meter access system based on Beidou short message communication transmission | |
CN112583796B (en) | A method, system, IoT management platform and storage medium for terminal equipment to access power Internet of Things | |
CN114123487B (en) | Distributed power online centralized monitoring system and method based on electric power Internet of Things | |
CN104618317A (en) | Trust based Internet of Things data security system | |
CN107204666A (en) | The remote sensing information joint debugging method of transformer station four and system based on mobile message technology | |
CN112087301A (en) | Gas meter safety certification system based on state cryptographic algorithm | |
CN110633956A (en) | An information security protection system for interactive service microgrid | |
CN105656633A (en) | Safety certification method for smart grid AMI system | |
CN110912915B (en) | Communication safety early warning system based on data acquisition | |
CN111769632B (en) | A distributed power supply secure communication method and system using NB-IOT technology | |
CN117318295A (en) | Comprehensive data sensing system and method for power distribution network | |
JP5377614B2 (en) | Communication management device | |
CN105162253A (en) | Wireless communication system for intellectualization of primary equipment | |
CN105812428A (en) | Method and system for household public resource management | |
CN114238936A (en) | Password service platform for business application system security and processing method thereof | |
CN113301024A (en) | Electric meter identity authentication method, device and system based on consensus mechanism | |
Sidhartha et al. | Secure and Fault-tolerant Advanced Metering Infrastructure | |
He et al. | Design of Multi-Layer Information Security Protection Scheme for Vehicle-to-Grid System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220524 |
|
RJ01 | Rejection of invention patent application after publication |